Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Machine Learning in Cyber Trust: Security, Privacy, and ReliabilityMany networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Price: $129.00

Click here to buy from Amazon

The Ultimate Unofficial Guide to Strategies for Minecrafters: Everything You Need to Know to Build, Explore, Attack, and Survive in the World of Minecraft

Rating: 
Amazon Price: $18.95 $11.71 You save: $7.24 (38%) (as of December 6, 2019 11:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This adventure series is created especially for readers who love the fight of good vs. evil, magical academies like Hogwarts in the Harry Potter saga, and games like Minecraft, Terraria, and Pokemon GO.

Your go-to book for uncovering the secrets of Minecraft!
Continue reading “The Ultimate Unofficial Guide to Strategies for Minecrafters: Everything You Need to Know to Build, Explore, Attack, and Survive in the World of Minecraft”

Web Application Vulnerabilities: Detect, Exploit, Prevent

Web Application Vulnerabilities: Detect, Exploit, PreventIn this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.

· Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
· See why Cross Site Scripting attacks can be so devastating.
· Download working code from the companion Web site.

Price: $62.95

Click here to buy from Amazon

Techno Security’s Guide to Securing SCADA: Protecting Critical Infrastructure

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical InfrastructureAround the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.

This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a “sit-down” with the leaders in the field

Price: $72.95

Click here to buy from Amazon

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Gray Hat Python: Python Programming for Hackers and Reverse EngineersPython is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won’t cut it.

You’ll learn how to:

  • Automate tedious reversing and security tasks
  • Design and program your own debugger
  • Learn how to fuzz Windows drivers and create powerful fuzzers from scratch
  • Have fun with code and library injection, soft and hard hooking techniques, and other software trickery
  • Sniff secure traffic out of an encrypted web browser session
  • Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more

The world’s best hackers are using Python to do their handiwork. Shouldn’t you?

Price: $39.95

Click here to buy from Amazon