Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Rating: 
Amazon Price: $49.95 $43.67 You save: $6.28 (13%). (as of June 17, 2019 14:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.Contains practical and cost-effective recommendations for proactive and reactive protective measuresTeaches users how to establish a viable threat intelligence programFocuses on how social networks present a double-edged sword against security programs

SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition

Rating: 
Amazon Price: $60.00 $34.81 You save: $25.19 (42%). (as of June 17, 2019 12:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domains

Thoroughly revised for the April 2015 exam update, SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition enables you to take the exam with complete confidence. To aid in self-study, each chapter includes Exam Tips that highlight key exam information, chapter summaries that reinforce salient points, and end-of-chapter questions that are an accurate reflection of the content and question format of the real exam.
Continue reading “SSCP Systems Security Certified Practitioner All-in-One Exam Guide, Second Edition”

Principles of Computer Security: CompTIA Security+ and Beyone [With CDROM] (Official Comptia Guide)

Rating: 
Amazon Price: $57.50 $13.64 You save: $43.86 (76%). (as of June 17, 2019 11:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Essential Skills for a Successful IT Security Career
Learn the fundamentals of computer and information security while getting complete coverage of all the objectives for the latest release of the CompTIA Security+ certification exam. This up-to-date, full-color guide discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Written and edited by leaders in the field, Principles of Computer Security: CompTIA Security+ and Beyond, Third Edition will help you pass CompTIA Security+ exam SY0-301 and become an IT security expert. From McGraw-Hill—a Gold-Level CompTIA Authorized Partner, this book offers Official CompTIA Approved Quality Content.
Find out how to: Ensure operational, organizational, and physical security Use cryptography and public key infrastructures (PKIs) Secure remote access, wireless, and virtual private networks (VPNs) Harden network devices, operating systems, and applications Defend against network attacks, such as denial of service, spoofing, hijacking, and password guessing Combat viruses, worms, Trojan horses, logic bombs, time bombs, and rootkits Manage e-mail, instant messaging, and web security Understand secure software development requirements Enable disaster recovery and business continuity Implement risk, change, and privilege management measures Handle computer forensics and incident response Understand legal, ethical, and privacy issues
The CD-ROM features: Two full practice exams PDF copy of the book
Each chapter includes: Learning objectives Photographs and illustrations Real-world examples Try This! and Cross Check exercises Key terms highlighted Tech Tips, Notes, and Warnings Exam Tips End-of-chapter quizzes and lab projects

Detecting and Mitigating Robotic Cyber Security Risks (Advances in Information Security, Privacy, and Ethics)

Amazon Price: $210.00 $141.34 You save: $68.66 (33%). (as of June 17, 2019 07:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats.

Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.

A Guide to Kernel Exploitation: Attacking the Core

Rating: 
Amazon Price: $52.95 $40.77 You save: $12.18 (23%). (as of June 17, 2019 10:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.
The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.Covers a range of operating system families – UNIX derivatives, Mac OS X, WindowsDetails common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditionsDelivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks