Hacking provides an introduction to the community of hackers and an analysis of the meaning of hacking in twenty-first century societies.
One the one hand, hackers infect the computers of the world, entering where they are not invited, taking over not just individual workstations but whole networks. On the other, hackers write the software that fuels the Internet, from the most popular web programmes to software fundamental to the Internet's existence. Beginning from an analysis of these two main types of hackers, categorised as crackers and Free Software/Open Source respectively, Tim Jordan gives the reader insight into the varied identities of hackers, including:
* Hacktivism; hackers and populist politics
* Cyberwar; hackers and the nation-state
* Digital Proletariat; hacking for the man
* Viruses; virtual life on the Internet
* Digital Commons; hacking without software
* Cypherpunks; encryption and digital security
* Nerds and Geeks; hacking cultures or hacking without the hack
* Cybercrime; blackest of black hat hacking
Hackers end debates over the meaning of technological determinism while recognising that at any one moment we are all always determined by technology. Hackers work constantly within determinations of their actions created by technologies as they also alter software to enable entirely new possibilities for and limits to action in the virtual world. Through this fascinating introduction to the people who create and recreate the digital media of the Internet, students, scholars and general readers will gain new insight into the meaning of technology and society when digital media are hacked.
Amazon Price:$31.00$13.72You save:$17.28 (56%)(as of August 9, 2020 22:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Short Message Service (SMS) is widely used to provide communication between users around the world. In the last years, it has become a lucrative way for cybercriminals to infect mobile devices with botnets and launch malicious attacks without the user's knowledge such as: SMS spam and SMS premium rate fraud. SMS spam is one of the dangerous malicious activities as the user is charged for each sent SMS spam. Existing solutions to this issue are no longer adequate as they are either costly in terms of resources, inefficient, or require user intervention with some knowledge on security. In this book, we design, analyze, and implement a system that detects any attempt to send out malicious SMS spams from the mobile device. The proposed system combines the rule-based and the content-based approaches into one detection process. It achieves good performance in terms of detection time and execution cost, and offers a good tradeoff between resilience against attacks and user interaction with the system. This book is intended for multiple audiences: academic, professional, students, and anyone else who is interested in IT security, and particularly in mobile security and botnet detection.
Amazon Price:$49.95$32.99You save:$16.96 (34%)(as of August 9, 2020 11:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way.
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out–binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs to understand what they really do, rather than what we think they should do. While reverse engineering and disassembly are critical first steps in many forms of binary analysis, there is much more to be learned. Continue reading “Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly”
Amazon Price:$79.99$63.24You save:$16.75 (21%)(as of August 10, 2020 10:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
Amazon Price:$60.00$23.33You save:$36.67 (61%)(as of August 9, 2020 11:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Master the tools and techniques of mobile forensic investigations
Conduct mobile forensic investigations that are legal, ethical, and highly effective using the detailed information contained in this practical guide. Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation fully explains the latest tools and methods along with features, examples, and real-world case studies. Find out how to assemble a mobile forensics lab, collect prosecutable evidence, uncover hidden files, and lock down the chain of custody. This comprehensive resource shows not only how to collect and analyze mobile device data but also how to accurately document your investigations to deliver court-ready documents. Continue reading “Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation (Networking & Comm – OMG)”