by Brandon Perry
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices.After a crash course in C# and some of its advanced features, you'll learn how to: Generate shellco...
Price: $17.99 | Publisher: No Starch Press | Release: 2017
FREE EBOOK - Exploring the Data Jungle
by Brian Godsey
Some people like to believe that all data is ready to be used immediately. Not so! Data in the wild is hard to track and harder to understand, and the first job of data scientists to identify and prepare data so it can be used. To find your way through the data jungle successfully, you need the right perspective and guidance. (There's no point hacking at overgrowth with a spoon after all!) Identify and...
Publisher: Manning | Release: 2017
Hacking Exposed Malware & Rootkits, 2nd Edition
by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate...
Price: $6.00 | Publisher: McGraw-Hill | Release: 2016
Hacking Exposed Industrial Control Systems
by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...
Price: $35.87 | Publisher: McGraw-Hill | Release: 2016
by Troy Mott
We're surrounded with a myriad of communication tools: email, Skype, Twitter, Facebook, and Snapchat, to name a few. Slack is a newer communication tool, borrowing IRC concepts and transcending them with an intuitive interface that allows countless customizations and integrations - from other communication tools to bots, Kayak, Google, Hacker News, and more. Slack glues together all of your favorite ap...
Publisher: O'Reilly Media | Release: 2016
by Srinivasa Rao Kotipalli, Mohammed A. Imran
With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...
Price: $30.99 | Publisher: Packt Publishing | Release: 2016
by Edmund Weitz
Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and optimization, to name just a few. Written by an author who has used...
Price: $35.13 | Publisher: Apress | Release: 2016
by James Strickland
We all hate to throw electronics away. Use your 5 volt Arduino and have fun with them instead! Raid your electronics junk box to build the Cestino (Arduino compatible) board and nine other electronics projects, from a logic probe to a microprocessor explorer, and learn some advanced, old-school techniques along the way. Don't have a well-stocked junk box? No problem. Nearly all the components used in t...
Price: $38.77 | Publisher: Apress | Release: 2016
Building a Comprehensive IT Security Program
by Jeremy Wittkop
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing ...
Price: $39.99 | Publisher: Apress | Release: 2016
Cyber-Physical Attack Recovery Procedures
by Luis Ayala
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those...
Price: $44.99 | Publisher: Apress | Release: 2016