My library button
  • Book cover of The Art of Computer Virus Research and Defense
    Peter Szor

     · 2005

    A guide to computer viruses covers such topics as virus behavior, malware, technical defenses, and worm blocking.

  • Book cover of Network Security Assessment

    Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.

  • Book cover of Antivirus Bypass Techniques

    Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key FeaturesGain a clear understanding of the security landscape and research approaches to bypass antivirus softwareBecome well-versed with practical techniques to bypass antivirus solutionsDiscover best practices to develop robust antivirus solutionsBook Description Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions. The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you've covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software. By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software. What you will learnExplore the security landscape and get to grips with the fundamentals of antivirus softwareDiscover how to gather AV bypass research leads using malware analysis toolsUnderstand the two commonly used antivirus bypass approachesFind out how to bypass static and dynamic antivirus enginesUnderstand and implement bypass techniques in real-world scenariosLeverage best practices and recommendations for implementing antivirus solutionsWho this book is for This book is for security researchers, malware analysts, reverse engineers, pentesters, antivirus vendors looking to strengthen their detection capabilities, antivirus users and companies that want to test and evaluate their antivirus software, organizations that want to test and evaluate antivirus software before purchase or acquisition, and tech-savvy individuals who want to learn new topics.

  • Book cover of Black Ice
    Dan Verton

     · 2003

    Internet security expert Verton investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this is having and will continue to have on privacy and civil liberties, and how to prepare and prevent against cyber-terrorism.

  • Book cover of Surveillance Valley
    Yasha Levine

     · 2018

    The internet is the most effective weapon the government has ever built. In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project. A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea -- using computers to spy on people and groups perceived as a threat, both at home and abroad -- drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology. But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news -- and the device on which you read it.

  • Book cover of Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices

    "This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication"--Provided by publisher.

  • Book cover of Transformational Security Awareness

    Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That’s what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

  • Book cover of Learn Social Engineering

    Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book Description This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is for This book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

  • Book cover of Database Nation

    Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

  • Book cover of Cyberbullying Prevention and Response

    Just as the previous generation was raised in front of televisions, adolescents at the turn of the 21st century are being raised in an internet-enabled world where blogs, social networking, and instant messaging are competing with face-to-face and telephone communication as the dominant means through which personal interaction takes place. Unfortunately, a small but growing proportion of our youth are being exposed online to interpersonal violence, aggression, and harassment via cyberbullying. The mission of this book is to explore the many critical issues surrounding this new phenomenon. Key features include the following. Comprehensive – The book provides a comprehensive, up-to-date look at the major issues that teachers, school administrators, counsellors, social workers, and parents need to be aware of with respect to cyberbullying identification, prevention, and response. Practical – While the information is informed by research, it is written in an accessible way that all adults will be able to understand and apply. Expertise – Justin W. Patchin and Sameer Hinduja are Co-Directors of the Cyberbullying Research Center (www.cyberbullying.us). Chapter authors represent a carefully selected group of contributors who have demonstrated both topical expertise and an ability to write about the topic in clear, easily accessible language. This book is appropriate for teachers, administrators, parents and others seeking research-based guidance on how to deal with the rising tide of cyberbullying issues. It is also appropriate for a variety of college level courses dealing with school violence and educational administration.