Amazon Price: $30.00 $27.08 You save: $2.92 (10%). (as of April 22, 2019 02:24 –
In the world of technology, cybersecurity is, without a doubt, one of the most dynamic topics of our times. Protecting Our Future brings together a range of experts from across the cybersecurity spectrum and shines a spotlight on operational challenges and needs across the workforce: in military, health care, international relations, telecommunications, finance, education, utilities, government, small businesses, and nonprofits. Contributors offer an assessment of strengths and weaknesses within each subfield, and, with deep subject-matter expertise, they introduce practitioners, as well as those considering a future in cybersecurity, to the challenges and opportunities when building a cybersecurity workforce.
Contributors include: Melody L. Balcet, Anthony M. Bargar, Shana Kayne Beach, Tom Connors, Kyle M. Foley, James H. Jones, Jr., Gregory P. Keeley, Jane LeClair, K. Maman, Ernest McDuffie, Sean Murphy, Kai Roer, and Geoff Schwartz.
Amazon Price: N/A (as of April 22, 2019 01:02 –
The highly successful security book returns with a new edition, completely updated
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
Continue reading “The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws”
Amazon Price: $39.99 (as of April 22, 2019 06:54 –
What people are saying about Inside Cyber Warfare
"The necessary handbook for the 21st century."
Continue reading “Inside Cyber Warfare: Mapping the Cyber Underworld”
Amazon Price: $17.00 $9.86 You save: $7.14 (42%). (as of April 22, 2019 01:10 –
By Glenn Greenwald, star of Citizenfour, the Academy Award-winning documentary on Edward Snowden
In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.
Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.
Amazon Price: $60.00 $44.40 You save: $15.60 (26%). (as of April 21, 2019 15:57 –
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.
Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures Creating a Network of Trust Using X.509 Certificates A Usable, Secure Communications Protocol: Client-Side TLS Adding Server-Side TLS 1.0 Support Advanced SSL Topics Adding TLS 1.2 Support to Your TLS Library Other Applications of SSL A Binary Representation of Integers: A Primer Installing TCPDump and OpenSSL Understanding the Pitfalls of SSLv2
Set up and launch a working implementation of SSL with this practical guide.