Cyber Security Principles: Computer Security – Hazards and Threats – 2nd Edition

Rating: 
Amazon Price: $2.99 (as of January 21, 2020 01:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Welcome to the ULTIMATE guide on Cyber Security!
All the important information and Principles in ONE Guide!

******2nd Edition******
Continue reading “Cyber Security Principles: Computer Security – Hazards and Threats – 2nd Edition”

Linux Bible

Rating: 
Amazon Price: $25.17 (as of January 20, 2020 21:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The industry favorite Linux guide, updated for Red Hat Enterprise Linux 7 and the cloud

Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 14.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 7, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file systems, the new boot process and services management, firewalld, and the GNOME 3 desktop. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow.
Continue reading “Linux Bible”

Hadoop Security: Protecting Your Big Data Platform

Rating: 
Amazon Price: $31.81 (as of January 21, 2020 11:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Honeypots: The Truth Becomes Impossible to See…

Rating: 
Amazon Price: $1.99 (as of January 21, 2020 14:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Honeypots have played a prominent role in business, government, and warfare. They maneuver themselves between a beautiful lie and a painful truth. Elizabeth A. Faust, is an elite spy, a Honeypot, a women who uses the power of seduction and deception to get the crucial information she seeks. Both men and women are drawn to her, they become trapped by the allure of her mind, her body, and her scent. The men and women in this story are like you and me, when we give ourselves over, we surrender. In this state we can easily be deceived because the truth becomes impossible to see.

Here Comes Everybody: The Power of Organizing Without Organizations

Rating: 
Amazon Price: $14.99 (as of January 21, 2020 16:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Read Clay Shirky's posts on the Penguin Blog.

A revelatory examination of how the wildfirelike spread of new forms of social interaction enabled by technology is changing the way humans form groups and exist within them, with profound long-term economic and social effects-for good and for ill
A handful of kite hobbyists scattered around the world find each other online and collaborate on the most radical improvement in kite design in decades. A midwestern professor of Middle Eastern history starts a blog after 9/11 that becomes essential reading for journalists covering the Iraq war. Activists use the Internet and e-mail to bring offensive comments made by Trent Lott and Don Imus to a wide public and hound them from their positions. A few people find that a world-class online encyclopedia created entirely by volunteers and open for editing by anyone, a wiki, is not an impractical idea. Jihadi groups trade inspiration and instruction and showcase terrorist atrocities to the world, entirely online. A wide group of unrelated people swarms to a Web site about the theft of a cell phone and ultimately goads the New York City police to take action, leading to the culprit's arrest.
Continue reading “Here Comes Everybody: The Power of Organizing Without Organizations”