High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Rating: 
Amazon Price: $45.17 (as of January 21, 2020 16:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.

CEH v9: Certified Ethical Hacker Version 9 Kit

Rating: 
Amazon Price: $70.00 $48.34 You save: $21.66 (31%) (as of January 21, 2020 05:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Combines the popular Sybex CEH v9: Certified Ethical Hacker Version 9 Study Guide ISBN 978-1-119-25224-5 updated for the CEH v9 exam with the all new CEH v9: Certified Ethical Hacker Version 9 Practice Tests ISBN: 978-1-119-25215-3. With these you get:

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.
Continue reading “CEH v9: Certified Ethical Hacker Version 9 Kit”

Hadoop Security: Protecting Your Big Data Platform

Rating: 
Amazon Price: $31.81 (as of January 21, 2020 11:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Here Comes Everybody: The Power of Organizing Without Organizations

Rating: 
Amazon Price: $14.99 (as of January 21, 2020 16:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Read Clay Shirky's posts on the Penguin Blog.

A revelatory examination of how the wildfirelike spread of new forms of social interaction enabled by technology is changing the way humans form groups and exist within them, with profound long-term economic and social effects-for good and for ill
A handful of kite hobbyists scattered around the world find each other online and collaborate on the most radical improvement in kite design in decades. A midwestern professor of Middle Eastern history starts a blog after 9/11 that becomes essential reading for journalists covering the Iraq war. Activists use the Internet and e-mail to bring offensive comments made by Trent Lott and Don Imus to a wide public and hound them from their positions. A few people find that a world-class online encyclopedia created entirely by volunteers and open for editing by anyone, a wiki, is not an impractical idea. Jihadi groups trade inspiration and instruction and showcase terrorist atrocities to the world, entirely online. A wide group of unrelated people swarms to a Web site about the theft of a cell phone and ultimately goads the New York City police to take action, leading to the culprit's arrest.
Continue reading “Here Comes Everybody: The Power of Organizing Without Organizations”