Stealing The Network: How to Own the Box (Cyber-Fiction)

Rating: 
Amazon Price: N/A (as of April 25, 2018 19:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats", "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions

Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: $29.99 (as of April 25, 2018 23:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

2015 Revision!

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Paws-itively Puppies: The Secret Personal Internet Address & Password Log Book for Puppy & Dog Lovers (Disguised Password Book Series) (Volume 2)

Rating: 
Amazon Price: $8.99 $5.39 You save: $3.60 (40%). (as of April 26, 2018 05:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Are you always forgetting your logins, usernames and passwords? Do you have lots of sticky notes or labels around the house to remember them? Would you like to find a better way?

Paws-itively Puppies is a secret password book that is disguised as a paperback dog photobook. Add all your website information in one handy place to organize your internet life.
Continue reading “Paws-itively Puppies: The Secret Personal Internet Address & Password Log Book for Puppy & Dog Lovers (Disguised Password Book Series) (Volume 2)”

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Rating: 
Amazon Price: $59.95 $28.78 You save: $31.17 (52%). (as of April 26, 2018 11:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Continue reading “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software”

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family

Rating: 
Amazon Price: N/A (as of April 25, 2018 22:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Digital devices have made our busy lives a little easier and they do great things for us, too – we get just-in-time coupons, directions, and connection with loved ones while stuck on an airplane runway. Yet, these devices, though we love them, can invade our privacy in ways we are not even aware of. The digital devices send and collect data about us whenever we use them, but that data is not always safeguarded the way we assume it should be to protect our privacy. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching.

Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Payton and Claypoole skillfully introduce readers to the many ways we are “watched” and how to change behaviors and activities to recapture and regain more of our privacy. The authors suggest remedies from tools, to behavior changes, to speaking out to politicians to request their privacy back. Anyone who uses digital devices for any reason will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.