• Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine... [Read More]

    • ASIN: 1597499579
    • ASIN: 1597499579
    • ISBN: 9781597499576
    • Brand: Syngress
    • Manufacturer: Syngress

  • Fundamentals of Information Systems Security

    Note: This is a standalone book and does not include virtual labs access.Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification. The book... [Read More]

    • ASIN: 128411645X
    • ASIN: 128411645X
    • ISBN: 9781284116458
    • Manufacturer: Jones & Bartlett Learning

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacke... [Read More]

    • ASIN: 1593271441
    • UPC: 884870524442
    • ASIN: 1593271441
    • ISBN: 1593271441
    • Brand: imusti
    • Manufacturer: No Starch Press

  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


    • ASIN: 1593272901
    • ASIN: 1593272901
    • ISBN: 1593272901
    • Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

    Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.   In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.   Then, five m... [Read More]

    • ASIN: 0770436196
    • ASIN: 0770436196
    • ISBN: 9780770436193
    • Brand: imusti
    • Manufacturer: Broadway Books

  • The Next 100 Years: A Forecast for the 21st Century

    China fragments, a new Cold War with Russia, Mexcio challenges U.S., the new great powers Turkey, Poland and Japan.  The Next 100 Years is a fascinating, eye-opening and often shocking look at what lies ahead for the U.S. and the world from one of our most incisive futurists. In his thought-provoking new book, George Friedman, founder of STRATFOR—the preeminent private intelligence and forecasting firm—focuses on what he knows best, the future. Positing that civilization is at the dawn of a new era, he offers a lucid, highly readable forecast of the changes we can expect around the worl... [Read More]

    • ASIN: 0767923057
    • ASIN: 0767923057
    • ISBN: 9780767923057
    • Brand: Anchor
    • Manufacturer: Anchor

  • Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

    Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats.Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle... [Read More]

    • ASIN: 1484238516
    • ASIN: 1484238516
    • ISBN: 1484238516
    • Manufacturer: Apress

  • Duel to the Death (Ali Reynolds Series Book 13)

    The New York Times bestselling author J.A. Jance returns with the thirteenth pulse-pounding thriller in the “engaging and entertaining” (Los Angeles Times) Ali Reynolds series.After taking down the man responsible for his best friend’s death, Stuart Ramey believes the case is finally closed. That is, until Stu discovers he’s been left with a multimillion dollar fortune in Bitcoin in a desperate attempt by Frigg, a rogue A.I. program created by the killer, to keep itself from being fully deactivated. To take Frigg down for good, Stu enlists the help of Ali Reynolds and the rest of his c... [Read More]

    • ASIN: B074ZJP3BT
    • ASIN: B074ZJP3BT
    • Manufacturer: Gallery Books

  • Cyber-Security and Threat Politics (CSS Studies in Security and International Relations)

    This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific... [Read More]

    • ASIN: 0415569885
    • ASIN: 0415569885
    • ISBN: 0415569885
    • Manufacturer: Routledge

  • Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack

    This book will teach you how you can protect yourself from most common hacking attacks -- by knowing how hacking actually works! After all, in order to prevent your system from being compromised, you need to stay a step ahead of any criminal hacker. You can do that by learning how to hack and how to do a counter-hack.Within this book are techniques and tools that are used by both criminal and ethical hackers – all the things that you will find here will show you how information security can be compromised and how you can identify an attack in a system that you are trying to protect. At the s... [Read More]

    • ASIN: B01N4FFHMW
    • ASIN: B01N4FFHMW

  • Python: Cyber Security and Python Programming Step-by-Step Guides

    ☆Get this book for FREE on Audible! Click on the cover and follow the link!☆Write a beautiful and straightforward python code in no time.This book gives you everything you need to become a python master.Click the Buy now-button to learn more.

    • ASIN: B07644D3MV
    • ASIN: B07644D3MV

  • DAEMON (Daemon Series)

    Daniel Suarez's New York Times bestselling debut high-tech thriller is “so frightening even the government has taken note” (Entertainment Weekly).Daemons: computer programs that silently run in the background, waiting for a specific event or time to execute. They power almost every service. They make our networked world possible. But they also make it vulnerable... When the obituary of legendary computer game architect Matthew Sobol appears online, a previously dormant daemon activates, initiating a chain of events that begins to unravel our interconnected world. This daemon reads news he... [Read More]

    • ASIN: 0451228731
    • ASIN: 0451228731
    • ISBN: 9780451228734
    • Manufacturer: Signet Books

  • Computer and Information Security Handbook

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed ch... [Read More]

    • ASIN: 0123943973
    • ASIN: 0123943973
    • ISBN: 0123943973
    • Manufacturer: Morgan Kaufmann

  • Hacking: World Class Hacking, Python and Cyber Security Strategies For Up-and-Coming Hackers

    ☆Get this book for FREE on Audible! Click on the cover and follow the link!☆Hack your way in, take what you want, and get out without being noticed.This hacking book gives you everything you need to become a skilled programmer in no time. Click the Buy now-button to learn more.

    • ASIN: B075J9TVWV
    • ASIN: B075J9TVWV

  • Stalker

    Someone is always watching…Derek Flint is a loner. He lives with his mother and spends hisevenings watching his clients on the CCTV cameras he has installed inside their homes. He likes their companionship – even if it’s through a screen.When a series of crimes hits Derek’s neighbourhood, DC Beth Mayes begins to suspect he’s involved. How does he know so much about the victims’ lives? Why won’t he let anyone into his office? And what is his mother hiding in that strange, lonely house?As the crimes become more violent, Beth must race against the clock to find out who is behind the... [Read More]

    • ASIN: B077W4X2FN
    • ASIN: B077W4X2FN
    • Manufacturer: Avon

  • Computer Network Security and Cyber Ethics, 4th ed. - eBook

    In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves

    • UPC: 953399444

  • Army Cyber Mission Force: Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices - eBook

    The 2010 US Army Training and Doctrine Commands Concept Capability Plan for Cyberspace Operations directed the Army to begin development of a Cyber Mission Force. The direction to build a Cyber Mission Force followed a

    • UPC: 231330152

  • Computer Network Security and Cyber Ethics

    "This book increases public awareness of nature and motives of cyber vandalism, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves. Integrates security education and awareness with morality and ethics. Addressing

    • UPC: 33433642

  • Which Programming Languages Should You Learn for Cybersecurity 2019

    Top Programming Languages for Cyber Security / Hacking 2019

    Essential Programming Language For ETHICAL HACKER