Koncocoo

Best Web Encryption

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon
CISSP All-in-One Exam Guide, Seventh Edition
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new. 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC) 2® . Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference. Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, an information security instructorand the author of several international bestselling books on information security which have sold over a million copies and have been translated into six languages.
Reviews
"It's pretty clear which parts are Shon Harris and which parts aren't."
"I was able to pass the exam first try with this book, the sybex book, and cybrary."
"Don't just say "Unfortunately you will run into questions on the CISSP exam that will be this confusing..." (p. 186)."
"This book is a deep dive into the 8 security domains. They know they need to apply these settings because there is a CVE or IAVA/STIG notice but they don't understand why and how an attacker could utilize that specific exploit vector. Which in my opinion makes it much easier for referencing specific concepts and ideas."
"It was such a chore reading through each chapter and I knew it was time to change up so I purchased this book. In addition to using this book, I also used SkillSoft, practice exams, Quizlet, and YouTube videos."
"This book is the one to turn to for your CISSP exam."
Find Best Price at Amazon
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. In the information age, the fear that drives cryptographic improvements is both capitalistic and libertarian--corporations need encryption to ensure that their secrets don't fall into the hands of competitors and regulators, and ordinary people need encryption to keep their everyday communications private in a free society. Similarly, the battles for greater decryption power come from said competitors and governments wary of insurrection.
Reviews
"The author does a brilliant job of telling the history of encryption and cryptanalysis including the consequences of each."
"What is in the book –. The book goes beyond many others in the area of codes and ciphers in that it discusses very up to date topics (at least up to 1999 when the book was written), such as the ciphers being used for Internet transactions and questions of privacy and code breaking. However, this material is not as detailed as the material in books such as Budainsky’s “Battle of Wits”, Kahn’s “Seizing the Enigma” or Sebag-Montefiore’s “The Battle for the Code”, so if this is your primary interest I would direct you to these sources."
"A very thorough, detailed (perhaps even so not exhaustive) coverage of a very complex subject."
"From secrecy during wartime, hieroglyphics, encrypting emails and online transactions, it was fascinating reading how various forms of cryptography were developed, decoded, cracked and then improved upon."
"The various techniques for creating and breaking secret messages throughout history are explained well and made more interesting by the historic contexts of those techniques."
"I'll be honest I'm a complete novice and just picked this book up because it really drew my attention."
"The book is well written, and provides an excellent look at the history of cryptography and cryptanalysis, covering in detail the impact that these two competing disciplines played in the outcomes or many wars and key political events of post medieval times, It also provides a very accessible introduction into how cryptography works (i.e. it spares the reader the mathematical details of the more advanced algorithms)."
"Read it for history, entertainment, enjoyment, and a few laughs."
Find Best Price at Amazon

Best Privacy & Online Safety

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Management Information Systems

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise. Do you want to understand how a system designed using integration patterns can be implemented using Java Web services, .NET message queuing, and a TIBCO-based publish-subscribe architecture? Utilizing years of practical experience, seasoned experts Gregor Hohpe and Bobby Woolf show how asynchronous messaging has proven to be the best strategy for enterprise integration success. The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold.
Reviews
"Arrived on time, used , but in very good and clean condition, almost like new."
"Going further, when you consider that an application can coordinate its own interaction with internal subsystems using Enterprise Integration Patterns, this design philosophy truly applies everywhere."
"Excelente."
"In the present resurgence of functional languages, this book should be highly regarded for its depth of focus on messaging patterns and their proper use."
"We were trying to explain the problems with passing a large file up and down a messaging bus to our bioinformatics users, when I ran across Enterprise Integration Patterns."
"This is the third pattern book in my collection (the other two are Analysis Patterns by Martin Fowler and the definitive Design Patterns by the Gang of Four) and IMHO this is the best example yet of where patterns can really improve the development process."
"This book is a must for any developer, manager, or systems architect engaged in designing, developing, or deploying distributed systems based on messaging patterns."
"great book, must read for everyone looking at Enterprise Integration. However I feel that this book needs a upgrade by referencing new technologies."
Find Best Price at Amazon

Best Computer Networking

CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide―updated to cover the 2015 release of the CompTIA Network+ exam. Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networking devices IPv6 Remote connectivity Wireless networking Virtualization and cloud computing Network operations Managing risk Network security Network monitoring and troubleshooting. Mike Meyers, CompTIA A+, CompTIA Network+, CompTIA Security+, is the industry's leading authority on CompTIA certifications and the bestselling author of eight editions of CompTIA A+ Certification All-in-One Exam Guide .
Reviews
"Very good overview."
"Very understandable, pulls together concepts in very logical fashion with good detail."
"Mike Meyer's in depth look at objectives on the test has been very helpful in my studying!"
"Will take the test next week."
"great gift for beginners."
"necessary for exam study."
Find Best Price at Amazon

Best E-Commerce

Mastering Bitcoin: Programming the Open Blockchain
The second edition includes: A broad introduction to bitcoin--ideal for non-technical users, investors, and business executives An explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architects Details of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principles New developments such as Segregated Witness, Payment Channels, and Lightning Network Improved explanations of keys, addresses and wallets User stories, analogies, examples, and code snippets illustrating key technical concepts. With experience ranging from hardware and electronics to high level business and financial systems technology consulting and years as CTO/CIO/CSO in many companies — he combines authority and deep knowledge with an ability to make complex subjects easy to understand. His expertise includes Bitcoin, crypto-currencies, Information Security, Cryptography, Cloud Computing, Data Centers, Linux, Open Source and robotics software development.
Reviews
"Deep complex book for programmers."
"This is an outstanding introduction to the technology behind Bitcoin and cryptocurrency."
"Good technical introduction to bitcoin."
"Fantastic book if you want to learn what Bitcoin is and how it works."
"detailed, comprehensive, and masterful."
"great book very technical."
"He also tackles ways one might lose their bitcoins, and the ideas that are quite different from the centralized payment systems and banks we've become familiar with: one of these being the transference back to the asset owner of the responsibility for security--with suggestions as to how to go about securing them, even providing ways of leaving them to the family even in the event of death of the owner."
"One of the best technical books about blockchain technology I have ever come across."
Find Best Price at Amazon

Best Computer Cryptography

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Computer Viruses

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Covers 100% of exam 2015 CISSP candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more…. More than 1,400 practice questions More than 1000 electronic flashcards Searchable key term glossary Interactive test engine. More than 1000 Electronic Flashcards to reinforce learning and last minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Reviews
"Exam Essentials is the special section where the author has taken the time to highlight all of the things he thinks you MUST know to take the test. If I didn't understand one of the Exam Essential items I went to that chapter and read in extreme detail about the concept and took notes so I would not have to look it up again. The trick I used was walking around my apartment (in my mind) and visually associating things with the test. During the last phase I simply did all the practice questions the author provided both in the book and on their website. At the end of all the thousands of test questions I had another 2 or 3 pages of notes to add to my memory. On another note I did one practice exam a day to be sure I could not remember questions because of the sheer volume of them. The questions felt like they were written by a lawyer and required an intense concentration to even understand what they were asking. The practice questions were tricky in this book but they are not written the same strange way as the real exam in my opinion."
"I found the book to be well put together as are most of the sybex books. The book is a good supplement to a layered study approach. I wouldn't recommend just reading the book and taking the exam."
"If you don't want to read my really long review I summarize as get the Kindle version, read the entire thing, take advantage of the Sybex online content (sample tests) and that should be enough to pass. There were a few questions that I don't think the book covered but I felt like they were practical things that a security engineer would already know. In the case of this book, there is a lot of formatting that is lost in the Kindle version. The Kindle tends to squish whitespace and indents and such so some of the visual layout just becomes text. Another annoyance on the Kindle was that the TOC drop down interface only had the chapter heads and no easy jump to a specific subsection. I used highlights to mark things I knew I wanted to review multiple times like the big encryption algorithm comparison table and some of the model definitions or process summaries. One awesome feature is that after you are registered and verified your purchase you can download a PDF version of the book. The PDF also has all the perfectly excellent formatting that the paper book includes. The Sybex online material also includes electronic versions of all the chapter tests. This becomes painfully apparent if you select several chapters but only want (AKA have time for) a limited number of questions. This seems like a pretty awesome bonus and it is nice but the interface for the exams is slightly different from the chapter tests. In the online help is says this is a feature to mimic the actual CISSP exam which generates a giant WTF from me. I theorize that as long as you are in the review screen you won't have problems but there is some sort of session check when you transition."
Find Best Price at Amazon