Amazon Price: $17.99 $11.99 You save: $6.00 (33%) (as of October 28, 2020 12:37 –
“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security.
Continue reading “Dark Territory: The Secret History of Cyber War”
Amazon Price: $25.99 (as of October 31, 2020 16:55 –
Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.
Continue reading “Computer Forensics InfoSec Pro Guide”
Amazon Price: $50.00 $43.39 You save: $6.61 (13%) (as of October 25, 2020 05:21 –
Build a better defense against motivated, organized, professional attacks
Continue reading “Advanced Penetration Testing: Hacking the World's Most Secure Networks”
Amazon Price: $55.00 $50.87 You save: $4.13 (8%) (as of October 28, 2020 22:00 –
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.
The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying—all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation
The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.
Amazon Price: $9.99 (as of October 30, 2020 20:53 –
"Chilling . . . Extraordinary and urgent." — Washington Post
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”