CyberWar

Si Vis Pacem, Para Bellum

By

Metasploit: The Penetration Tester’s Guide

Rating: 
Amazon Price: N/A (as of April 24, 2017 23:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Read More

By

Android Security Internals: An In-Depth Guide to Android’s Security Architecture

Rating: 
Amazon Price: N/A (as of April 25, 2017 01:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now.
Read More

By

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition: Security Secrets and Solutions, Second Edition

Amazon Price: N/A (as of April 25, 2017 01:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware

Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail. Counter today’s most virulent network attack types Find out how malware infects, survives, and propagates across an enterprise Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Learn how hackers use archivers, encryptors, and packers to obfuscate code Defend against keylogging, redirect, click fraud, and identity theft threats

By

Mr. Robot and Philosophy (Popular Culture and Philosophy)

Amazon Price: $19.95 $13.56 You save: $6.39 (32%). (as of April 24, 2017 21:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Mr. Robot has been hailed, not only as one of the most haunting and unnerving dramas ever to appear on television, but also as the first accurate popular presentation of how computer hacking and cyberterrorism actually work. Mr. Robot and Philosophy is aimed at thoughtful fans of this addictive show who will welcome the opportunity to explore Elliot Alderson's world from a philosophical perspective.
The developing story of Mr. Robot constantly raises ethical and metaphysical issues. What happens to our personal identity when it’s extended into cyberspace and an array of electronic devices? Are we in control of our online lives or are we being controlled? What does our right to privacy mean in a world where millions of people can observe what we’re doing and saying? Is a virtual currency true money and could it replace traditional money? Can there be healthy forms of drug addiction? Can some types of so-called mental illness be useful and beneficial?
Does it make any sense to unleash destruction upon the existing corporate economic structures, and can we expect something better to emerge from the ruins of a digital meltdown?

By

Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition

Amazon Price: $60.00 $34.90 You save: $25.10 (42%). (as of April 24, 2017 17:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The latest exclusive Hacking Exposed strategies for defending against the world’s number one attack type: malware
Fully updated to cover the most current tools, techniques, and exploits, Hacking Exposed Malware & Rootkits, Second Edition walks you through the process of defending against the consistent onslaught of malware and rootkit assaults using failsafe methods. The second edition includes all-new real-world case studies and cutting-edge examples to reveal how hackers use readily available tools to infiltrate and hijack networks. The book takes a step-by-step approach to explaining countermeasures to provide the best training in the detection and elimination of malicious, embedded code. The latest intrusion detection, baits, antivirus, anti-rootkit, and anti-spyware technologies are all covered in detail. Counter today’s most virulent network attack types Find out how malware infects, survives, and propagates across an enterprise Detect, kill, and remove virtual, user-mode, and kernel-mode rootkits Learn how hackers use archivers, encryptors, and packers to obfuscate code Defend against keylogging, redirect, click fraud, and identity theft threats

/* */