Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

Rating: 
Amazon Price: $43.95 $9.99 You save: $33.96 (77%). (as of April 23, 2018 08:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes–which include client and network hub devices–up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g ("Wi-Fi”) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.

Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy "homebrew” Wi-Fi networks, both large and small.
Continue reading “Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!”

Linksys WRT54G Ultimate Hacking

Rating: 
Amazon Price: $41.95 $41.95 (as of April 22, 2018 23:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.

*Never before seen and documented hacks, including wireless spectrum analysis
*Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
*Full coverage on embedded device development using the WRT54G and OpenWRT

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

Rating: 
Amazon Price: N/A (as of April 22, 2018 15:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against:
• Espionage
• Hactivism
• Insider threats
• State-sponsored attacks
• Non-state actors such as organized criminals and terrorists
The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors’ other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth.

• Provides a sound understanding of the tools and tactics used in cyber warfare.
• Describes both offensive and defensive tactics from an insider’s point of view.
• Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology.

The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues

Amazon Price: $120.00 $110.55 You save: $9.45 (8%). (as of April 23, 2018 03:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the fieldFocuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examplesCovers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensicsIncludes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts

Cyber Security and IT Infrastructure Protection

Rating: 
Amazon Price: $49.95 $41.95 You save: $8.00 (16%). (as of April 22, 2018 15:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.

Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Continue reading “Cyber Security and IT Infrastructure Protection”