The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Rating: 
Amazon Price: $9.99 (as of November 19, 2019 13:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Cybersecurity Program Development for Business: The Essential Planning Guide

Rating: 
Amazon Price: $49.95 $30.02 You save: $19.93 (40%) (as of November 19, 2019 16:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot.

It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read." —Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight
Continue reading “Cybersecurity Program Development for Business: The Essential Planning Guide”

Security Engineering: A Guide to Building Dependable Distributed Systems

Rating: 
Amazon Price: $55.19 (as of November 19, 2019 10:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

The New Relationship Marketing: How to Build a Large, Loyal, Profitable Network Using the Social Web

Rating: 
Amazon Price: $24.95 $14.29 You save: $10.66 (43%) (as of November 19, 2019 20:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

One of the top social media thought leaders shares her secrets to expanding your business through relationshipsPeople have always done business with people they know, like, and trust. That's the essence of "relationship marketing." Today, the popularity of online social networking has caused a paradigm shift in relationship marketing. This book helps businesspeople and marketers master this crucial new skill set. Relationship marketing specialist Mari Smith outlines a step-by-step plan for building a sizable, loyal network comprised of quality relationships that garner leads, publicity, sales, and more.
If you're a businessman or businesswoman feeling the pressure to shift your approach to using social media marketing, to better understand the new soft skills required for success on the social web, and to improve your own leadership and relationship skills through emotional and social intelligence, this book is for you.

Outlines how to become a significant "center of influence" for your customers and prospects
Continue reading “The New Relationship Marketing: How to Build a Large, Loyal, Profitable Network Using the Social Web”

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Rating: 
Amazon Price: $50.00 $27.91 You save: $22.09 (44%) (as of November 19, 2019 12:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.
Continue reading “Unauthorised Access: Physical Penetration Testing For IT Security Teams”