Honeypots: A New Paradigm to Information Security

Amazon Price: $42.54 (as of January 23, 2020 20:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.

C# 7.0 Pocket Reference: Instant Help for C# 7.0 Programmers

Rating: 
Amazon Price: $19.99 $16.84 You save: $3.15 (16%) (as of January 23, 2020 18:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

When you need answers for programming with C# 7.0, this tightly focused reference tells you exactly what you need to know—without long introductions or bloated examples. Easy-to-browse and ideal as a quick reference, this guide will help experienced C#, Java, and C++ programmers get up to speed with the latest version of the C# language.

All programs and code snippets in this book are available as interactive samples in LINQPad. You can edit these samples and instantly see the results without needing to set up projects in Visual Studio. Written by the authors of C# 7.0 in a Nutshell, this pocket reference covers C# 7.0 without skimping on detail, including:All of C#’s fundamentalsFeatures new to C# 7.0, including tuples, pattern matching, and deconstructorsAdvanced topics: operator overloading, type constraints, iterators, nullable types, operator lifting, lambda expressions, and closuresLINQ: sequences, lazy execution, standard query operators, and query expressionsUnsafe code and pointers, custom attributes, preprocessor directives, and XML documentation

Radware’s DDoS Handbook: The Ultimate Guide to Everything You Need to Know about DDoS Attacks

Rating: 
Amazon Price: $0.99 (as of January 23, 2020 20:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

DDoS attacks are the most persistent and damaging cyber-attacks. They reflect hackers' frustratingly high levels of tenacity and creativity – and create complex and dynamic challenges for anyone responsible for cyber security. Radware's DDoS Handbook offers expert advice, actionable tools and tips to help detect and stop DDoS attacks.

Guide to Firewalls and Network Security

Rating: 
Amazon Price: $235.95 $46.28 You save: $189.67 (80%) (as of January 23, 2020 13:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The second edition offers updated content and brand new material, from enhanced coverage of non-firewall subjects like information and network security to an all-new section dedicated to intrusion detection in the context of incident response.

Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet’s Greatest Threat

Rating: 
Amazon Price: $43.84 (as of January 23, 2020 12:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware’s ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware’s intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.
Continue reading “Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat”