Cybersecurity For Dummies (For Dummies (Computer/Tech))

Rating: 
Amazon Price: $24.99 $14.19 You save: $10.80 (43%) (as of August 12, 2020 03:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
  • Brand: Wiley
  • Manufacturer: For Dummies

Manufacturer Info

  • PartNumber: 54153784

Product Info

  • IsAdultProduct: no
  • ReleaseDate: 2019-09-27T00:00:01Z
  • NumberOfItems: 1

EU GDPR & EU-US Privacy Shield: A Pocket Guide

Rating: 
Amazon Price: $14.95 (as of August 12, 2020 17:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
  • Manufacturer: It Governance Publishing

Product Info

  • ReleaseDate: 2017-04-03T00:00:01Z
  • NumberOfItems: 1

Surviving Cyberwar

Amazon Price: N/A (as of August 12, 2020 01:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

  • Brand: Bernan Press
  • Manufacturer: Bernan Press

Product Info

  • ReleaseDate: 2020-07-31T00:00:01Z
  • NumberOfItems: 1

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Rating: 
Amazon Price: $39.95 $35.36 You save: $4.59 (11%) (as of August 12, 2020 18:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools – and how to build your own when the pre-built ones won't cut it.
Continue reading “Gray Hat Python: Python Programming for Hackers and Reverse Engineers”

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

Rating: 
Amazon Price: $9.99 (as of August 12, 2020 21:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.