Koncocoo

Best Computer Viruses

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Covers 100% of exam 2015 CISSP candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more…. More than 1,400 practice questions More than 1000 electronic flashcards Searchable key term glossary Interactive test engine. More than 1000 Electronic Flashcards to reinforce learning and last minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Reviews
"Exam Essentials is the special section where the author has taken the time to highlight all of the things he thinks you MUST know to take the test. If I didn't understand one of the Exam Essential items I went to that chapter and read in extreme detail about the concept and took notes so I would not have to look it up again. The trick I used was walking around my apartment (in my mind) and visually associating things with the test. During the last phase I simply did all the practice questions the author provided both in the book and on their website. At the end of all the thousands of test questions I had another 2 or 3 pages of notes to add to my memory. On another note I did one practice exam a day to be sure I could not remember questions because of the sheer volume of them. The questions felt like they were written by a lawyer and required an intense concentration to even understand what they were asking. The practice questions were tricky in this book but they are not written the same strange way as the real exam in my opinion."
"I found the book to be well put together as are most of the sybex books. The book is a good supplement to a layered study approach. I wouldn't recommend just reading the book and taking the exam."
"If you don't want to read my really long review I summarize as get the Kindle version, read the entire thing, take advantage of the Sybex online content (sample tests) and that should be enough to pass. There were a few questions that I don't think the book covered but I felt like they were practical things that a security engineer would already know. In the case of this book, there is a lot of formatting that is lost in the Kindle version. The Kindle tends to squish whitespace and indents and such so some of the visual layout just becomes text. Another annoyance on the Kindle was that the TOC drop down interface only had the chapter heads and no easy jump to a specific subsection. I used highlights to mark things I knew I wanted to review multiple times like the big encryption algorithm comparison table and some of the model definitions or process summaries. One awesome feature is that after you are registered and verified your purchase you can download a PDF version of the book. The PDF also has all the perfectly excellent formatting that the paper book includes. The Sybex online material also includes electronic versions of all the chapter tests. This becomes painfully apparent if you select several chapters but only want (AKA have time for) a limited number of questions. This seems like a pretty awesome bonus and it is nice but the interface for the exams is slightly different from the chapter tests. In the online help is says this is a feature to mimic the actual CISSP exam which generates a giant WTF from me. I theorize that as long as you are in the review screen you won't have problems but there is some sort of session check when you transition."
Find Best Price at Amazon
CISSP All-in-One Exam Guide, Seventh Edition
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new. 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC) 2® . Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference. Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, an information security instructorand the author of several international bestselling books on information security which have sold over a million copies and have been translated into six languages.
Reviews
"It's pretty clear which parts are Shon Harris and which parts aren't."
"I was able to pass the exam first try with this book, the sybex book, and cybrary."
"Don't just say "Unfortunately you will run into questions on the CISSP exam that will be this confusing..." (p. 186)."
"This book is a deep dive into the 8 security domains. They know they need to apply these settings because there is a CVE or IAVA/STIG notice but they don't understand why and how an attacker could utilize that specific exploit vector. Which in my opinion makes it much easier for referencing specific concepts and ideas."
"It was such a chore reading through each chapter and I knew it was time to change up so I purchased this book. In addition to using this book, I also used SkillSoft, practice exams, Quizlet, and YouTube videos."
"This book is the one to turn to for your CISSP exam."
Find Best Price at Amazon
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Covers 100% of exam 2015 CISSP candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more…. More than 1000 Electronic Flashcards to reinforce learning and last minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks. James Michael Stewart, CISSP, CEH, CHFI, Security+, has focused on security, certification, and various operating systems for more than 20 years. Mike Chapple, PhD, CISSP, is Senior Director for IT Service Delivery at the University of Notre Dame.
Reviews
"Exam Essentials is the special section where the author has taken the time to highlight all of the things he thinks you MUST know to take the test. If I didn't understand one of the Exam Essential items I went to that chapter and read in extreme detail about the concept and took notes so I would not have to look it up again. The trick I used was walking around my apartment (in my mind) and visually associating things with the test. During the last phase I simply did all the practice questions the author provided both in the book and on their website. At the end of all the thousands of test questions I had another 2 or 3 pages of notes to add to my memory. On another note I did one practice exam a day to be sure I could not remember questions because of the sheer volume of them. The questions felt like they were written by a lawyer and required an intense concentration to even understand what they were asking. The practice questions were tricky in this book but they are not written the same strange way as the real exam in my opinion."
"I found the book to be well put together as are most of the sybex books. The book is a good supplement to a layered study approach. I wouldn't recommend just reading the book and taking the exam."
"If you don't want to read my really long review I summarize as get the Kindle version, read the entire thing, take advantage of the Sybex online content (sample tests) and that should be enough to pass. There were a few questions that I don't think the book covered but I felt like they were practical things that a security engineer would already know. In the case of this book, there is a lot of formatting that is lost in the Kindle version. The Kindle tends to squish whitespace and indents and such so some of the visual layout just becomes text. Another annoyance on the Kindle was that the TOC drop down interface only had the chapter heads and no easy jump to a specific subsection. I used highlights to mark things I knew I wanted to review multiple times like the big encryption algorithm comparison table and some of the model definitions or process summaries. One awesome feature is that after you are registered and verified your purchase you can download a PDF version of the book. The PDF also has all the perfectly excellent formatting that the paper book includes. The Sybex online material also includes electronic versions of all the chapter tests. This becomes painfully apparent if you select several chapters but only want (AKA have time for) a limited number of questions. This seems like a pretty awesome bonus and it is nice but the interface for the exams is slightly different from the chapter tests. In the online help is says this is a feature to mimic the actual CISSP exam which generates a giant WTF from me. I theorize that as long as you are in the review screen you won't have problems but there is some sort of session check when you transition."
Find Best Price at Amazon

Best Computer Networking

CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide―updated to cover the 2015 release of the CompTIA Network+ exam. Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networking devices IPv6 Remote connectivity Wireless networking Virtualization and cloud computing Network operations Managing risk Network security Network monitoring and troubleshooting. Mike Meyers, CompTIA A+, CompTIA Network+, CompTIA Security+, is the industry's leading authority on CompTIA certifications and the bestselling author of eight editions of CompTIA A+ Certification All-in-One Exam Guide .
Reviews
"Very good overview."
"Very understandable, pulls together concepts in very logical fashion with good detail."
"Mike Meyer's in depth look at objectives on the test has been very helpful in my studying!"
"Will take the test next week."
"great gift for beginners."
"necessary for exam study."
Find Best Price at Amazon

Best Web Encryption

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Computer Cryptography

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Privacy & Online Safety

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon