Hack Attacks Testing: How to Conduct Your Own Security Audit

Hack Attacks Testing: How to Conduct Your Own Security AuditLearn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as:
* Building a multisystem Tiger Box
* Basic Windows 2000 Server installation and configuration for auditing
* Basic Linux and Solaris installation and configuration
* Basic Mac OS X installation and configuration for auditing
* ISS, CyberCop, Nessus, SAINT, and STAT scanners
* Using security analysis tools for Mac OS X
* Vulnerability assessment
Bonus CD!
The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.

Price: $50.00

Click here to buy from Amazon

Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)

Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.

An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections:

 

  • Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field
  • National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government
  • Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends

 

Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.

Price: $59.95

Click here to buy from Amazon

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and SecurityA multidisciplinary view of Information Technology as it is used by governments and criminal organizations alike.

Why buy a multi-billion-dollar satellite and go to extreme lengths to try to avoid governmental detection when you can just buy a bit of airtime and send one of several million messages going out at any given time?—from Bombs and Bandwidth

Information Technology (IT) has become central to the way governments, businesses, social movements and even terrorist and criminal organizations pursue their increasingly globalized objectives. With the emergence of the Internet and new digital technologies, traditional boundaries are increasingly irrelevant, and traditional concepts—from privacy to surveillance, vulnerability, and above all, security—need to be reconsidered. In the post-9/11 era of “homeland security,” the relationship between IT and security has acquired a new and pressing relevance. Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.

Contributors include: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables Gray, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.

Price: $17.95

Click here to buy from Amazon

Group Policy: Fundamentals, Security, and the Managed Desktop

Rating: 
Amazon Price: $59.99 $40.39 You save: $19.60 (33%). (as of October 15, 2019 04:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Get up to speed on the latest Group Policy tools, features, and best practices

Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools and techniques. This updated edition covers Windows 10 and Windows Server vNext, bringing you up to speed on all the newest settings, features, and best practices. Microsoft Group Policy MVP Jeremy Moskowitz teaches you the major categories of Group Policy, essential troubleshooting techniques, and how to manage your Windows desktops.
Continue reading “Group Policy: Fundamentals, Security, and the Managed Desktop”