Selinux: NSA’s Open Source Security Enhanced Linux

Rating: 
Amazon Price: $39.95 $31.47 You save: $8.48 (21%) (as of December 6, 2019 08:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system–including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE–all of it free and open source.

SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days–when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system–are prevented on a properly administered SELinux system.
Continue reading “Selinux: NSA’s Open Source Security Enhanced Linux”

Inside Cyber Warfare: Mapping the Cyber Underworld

Rating: 
Amazon Price: $44.99 $22.99 You save: $22.00 (49%) (as of December 6, 2019 08:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations
Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

Hackers: Heroes of the Computer Revolution

Rating: 
Amazon Price: $29.99 $15.99 You save: $14.00 (47%) (as of December 6, 2019 12:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
Continue reading “Hackers: Heroes of the Computer Revolution”

Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

Rating: 
Amazon Price: $31.81 (as of December 6, 2019 01:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase

Linux iptables Pocket Reference (Pocket Reference (O’Reilly))

Rating: 
Amazon Price: $7.19 (as of December 5, 2019 23:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered onLinux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.Do you watch for all types of ICMP traffic–some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications,followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.