Kamis, 09 Mei 2013

Wow! eBook: Information Security Risk Assessment Toolkit - 5 new eBooks


Wow! eBook: Information Security Risk Assessment Toolkit - 5 new eBooks

Link to Wow! eBook

Information Security Risk Assessment Toolkit

Posted: 09 May 2013 08:46 AM PDT

Book Description

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments.  Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored.  Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.

  • Based on authors' experiences of real-world assessments, reports, and presentations
  • Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment
  • Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment

Table of Contents
Chapter 1. Information Security Risk Assessments
Chapter 2. A Practical Approach
Chapter 3. Data Collection
Chapter 4. Data Analysis
Chapter 5. Risk Assessment
Chapter 6. Risk Prioritization and Treatment
Chapter 7. Reporting
Chapter 8. Maintenance and Wrap Up

Book Details

  • Paperback: 278 pages
  • Publisher: Syngress (October 2012)
  • Language: English
  • ISBN-10: 1597497355
  • ISBN-13: 978-1597497350
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Information Security Risk Assessment Toolkit appeared first on Wow! eBook.

UTM Security with Fortinet: Mastering FortiOS

Posted: 09 May 2013 08:43 AM PDT

Book Description

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet’s FortiGate in the enterprise.

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area

Table of Contents
Part I: General Introduction
Chapter 1. Introduction to Unified Threat Management (UTM)
Chapter 2. FortiGate Hardware Platform Overview
Chapter 3. FortiOS Introduction

Part II: UTM Technologies Explained
Chapter 4. Connectivity and Networking Technologies
Chapter 5. Base Network Security
Chapter 6. Application Security
Chapter 7. Extended UTM Functionality
Chapter 8. Analyzing Your Security Information with FortiAnalyzer
Chapter 9. Managing Your Security Configurations with FortiManager

Part III: Implementing a Security (UTM) Project
Chapter 10. Designing a Security Solution
Chapter 11. Security on Distributed Enterprises/Retail (UTM Goes Shopping)
Chapter 12. Security on Financial Institutions (UTM Goes to the Bank)

Appendix A. Troubleshooting the Project
Appendix B. Troubleshooting Technically

Book Details

  • Paperback: 452 pages
  • Publisher: Syngress (December 2012)
  • Language: English
  • ISBN-10: 1597497479
  • ISBN-13: 978-1597497473
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post UTM Security with Fortinet: Mastering FortiOS appeared first on Wow! eBook.

Client-Side Attacks and Defense

Posted: 09 May 2013 08:39 AM PDT

Book Description

Individuals wishing to attack a company’s network have found a new path of least resistance-the end user. A client- side attack is one that uses the inexperience of the end user to create a foothold in the user’s machine and therefore the network. Client-side attacks are everywhere and hidden in plain sight. Common hiding places are malicious Web sites and spam. A simple click of a link will allow the attacker to enter. This book presents a framework for defending your network against these attacks in an environment where it might seem impossible.

The most current attacks are discussed along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. The severity of these attacks is examined along with defences against them, including antivirus and anti-spyware, intrusion detection systems, and end-user education.

  • Design and implement your own attack, and test methodologies derived from the approach and framework presented by the authors
  • Learn how to strengthen your network’s host- and network-based defense against attackers’ number one remote exploit-the client-side attack
  • Defend your network against attacks that target your company’s most vulnerable asset-the end user

Table of Contents
Chapter 1. Background on Attacks
Chapter 2. A Closer Look at Client-Side Attacks
Chapter 3. A History of Web Browsers
Chapter 4. The Problem with Browsers
Chapter 5. Exploring and Exploiting Active Content
Chapter 6. Browser Defenses
Chapter 7. E-mail Client Attacks
Chapter 8. E-mail Client Defenses
Chapter 9. Web Applications
Chapter 10. Web Applications and Client Defenses
Chapter 11. Other Client-Side Attack Targets
Chapter 12. Malware
Chapter 13. Client-Side Countermeasures
Chapter 14. The Road Ahead

Book Details

  • Paperback: 296 pages
  • Publisher: Syngress (October 2012)
  • Language: English
  • ISBN-10: 1597495905
  • ISBN-13: 978-1597495905
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Client-Side Attacks and Defense appeared first on Wow! eBook.

The Hacker’s Guide to OS X

Posted: 09 May 2013 08:34 AM PDT

Book Description

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

  • Provides relevant information including some of the latest OS X threats
  • Easily accessible to those without any prior OS X experience
  • Useful tips and strategies for exploiting and compromising OS X systems
  • Includes discussion of defensive and countermeasure applications and how to use them
  • Covers mobile IOS vulnerabilities

Table of Contents
Chapter 1. Introduction
Chapter 2. Pre carbon
Chapter 3. Post carbon
Chapter 4. Filesystem
Chapter 5. Footprint
Chapter 6. Application and System Vulnerabilities
Chapter 7. Defensive Applications
Chapter 8. Offensive Tactics
Chapter 9. Reverse Engineering
Chapter 10. Mobile Platforms
Chapter 11. Awesome Tips

Book Details

  • Paperback: 248 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 1597499501
  • ISBN-13: 978-1597499507
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post The Hacker’s Guide to OS X appeared first on Wow! eBook.

The Basics of Cyber Warfare

Posted: 09 May 2013 08:31 AM PDT

Book Description

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.

The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.

  • Provides a sound understanding of the tools and tactics used in cyber warfare.
  • Describes both offensive and defensive tactics from an insider’s point of view.
  • Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology.

Table of Contents
Chapter 1. Cyber Threatscape
Chapter 2. Cyberspace Battlefield Operations
Chapter 3. Cyber Doctrine
Chapter 4. Tools and Techniques
Chapter 5. Offensive Tactics and Procedures
Chapter 6. Psychological Weapons
Chapter 7. Defensive Tactics and Procedures
Chapter 8. Challenges We Face
Chapter 9. Where is Cyber Warfare Headed?

Book Details

  • Paperback: 164 pages
  • Publisher: Syngress (November 2012)
  • Language: English
  • ISBN-10: 0124047378
  • ISBN-13: 978-0124047372
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post The Basics of Cyber Warfare appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar