- Manufacturer: Packt Publishing
- PartNumber: black & white illustrations
- IsAdultProduct: no
- ReleaseDate: 2013-10-25T00:00:01Z
- NumberOfItems: 1
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.
In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.
Continue reading “Global Information Warfare: The New Digital Battlefield, Second Edition”
Develop better cybersecurity by taking a wider view of the threats
Many books on cybersecurity focus on technical responses to the cybercriminal, the cyberactivist and the state-sponsored hacker. As important as this is, relatively inexperienced hackers can still break into systems that have not taken account of human fallibility and other known vulnerabilities.
Continue reading “CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition”
The latest techniques for averting UC disaster
“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” ―Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast
Continue reading “Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition”
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Continue reading “Metasploit Penetration Testing Cookbook, Second Edition”