Network Attacks and Exploitation: A Framework

Rating: 
Amazon Price: N/A (as of October 15, 2019 18:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals.
Continue reading “Network Attacks and Exploitation: A Framework”

Mastering Bitcoin: A Beginner’s Guide To Bitcoin, Cryptocurrencies and Investing

Rating: 
Amazon Price: N/A (as of February 28, 2018 06:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Welcome to the World of Bitcoin and Other Cryptocurrencies!!!

Introduction to Cyberdeception

Amazon Price: $79.99 $62.25 You save: $17.74 (22%). (as of October 15, 2019 08:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.

Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application.
Continue reading “Introduction to Cyberdeception”

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Rating: 
Amazon Price: $60.00 $57.72 You save: $2.28 (4%). (as of October 15, 2019 16:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skillsDives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizationsDelves into network administration for Windows, Linux, and VMwareExamines penetration testing, cyber investigations, firewall configuration, and security tool customizationShares techniques for cybersecurity testing, planning, and reporting
Continue reading “Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions”

Spam Nation: The Inside Story of Organized Cybercrime_from Global Epidemic to Your Front Door

Rating: 
Amazon Price: $14.99 $14.99 (as of October 14, 2019 22:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life.

In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies—and countless viruses, phishing, and spyware attacks—he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.
Continue reading “Spam Nation: The Inside Story of Organized Cybercrime_from Global Epidemic to Your Front Door”