Book picks similar to
Privacy On The Line: The Politics Of Wiretapping And Encryption by Whitfield Diffie
intelligence
cryptography
infosec
non-fiction
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Knife Skills Illustrated: A User's Manual
Peter Hertzmann - 2007
Peter Hertzmann teaches you skills that encompass everything you need to do with a knife in the kitchen, whether you're a four-star chef or an at-home beginner. This comprehensive guide fills a gaping void in culinary literature.
Habeas Data: Privacy vs. the Rise of Surveillance Tech
Cyrus Farivar - 2018
That means all of the technologies that have made our lives easier, faster, better, and/or more efficient have also simultaneously made it easier to keep an eye on our activities. Or, as we recently learned from reports about Cambridge Analytica, our data might be turned into a propaganda machine against us. In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.
Who Controls America
Mark Mullen - 2017
All of the mentioned are just puppets on an invisible string doing the biddings of a few unseen puppeteers. Yes, that’s right. A few elite and undisclosed organizations send our children off to war, restrict the growth of the middle class, and limit educational opportunities for American citizens. The sad truth is this is nothing new. Thomas Jefferson and Benjamin Franklin warned of the dangers and destructive power of these elites if left unchecked. These few unchosen were able, and continue, to use the Federal Reserve Banking System, universities, and war to create economic recessions and depressions that provide unnoticed benefits to a select group of social manipulators. In this stunning new book, Mark Mullen takes us on an intellectual journey through the world of secret partnerships created by unfamiliar ideologues designed to acquire most of the nation’s wealth and power. In Who Controls America, Mullen shines a light on those few elites who place greed, power, and profits above the interests of the American citizen and the pursuit of the American Dream.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon - 2009
From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
Running the World: The Inside Story of the National Security Council and the Architects of American Power
David Rothkopf - 2005
The people at the top of the American national security establishment, the President and his principal advisors, the core team at the helm of the National Security Council, are without question the most powerful committee in the history of the world.Yet, in many respects, they are among the least understood. A former senior official in the Clinton Administration himself, David Rothkopf served with and knows personally many of the NSC's key players of the past twenty-five years. In Running the World he pulls back the curtain on this shadowy world to explore its inner workings, its people, their relationships, their contributions and the occasions when they have gone wrong. He traces the group's evolution from the final days of the Second World War to the post-Cold War realities of global terror—exploring its triumphs, its human dramas and most recently, what many consider to be its breakdown at a time when we needed it most.Drawing on an extraordinary series of insider interviews with policy makers including Condoleezza Rice, Colin Powell, Henry Kissinger, senior officials of the Bush Administration, and over 130 others, the book offers unprecedented insights into what must change if America is to maintain its unprecedented worldwide leadership in the decades ahead.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Jack Koziol - 2004
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
CIA & JFK: The Secret Assassination Files
Jefferson Morley - 2016
Kennedy, Jefferson Morley is asked, “So who killed JFK? What’s your theory?” Morley, a former reporter for the Washington Post and author of Our Man in Mexico: Winston Scott and the Hidden History of the CIA, invariably disappoints. “I don’t know. It’s too early to tell.” Fifty-plus years after JFK’s death, this answer is laughable but serious. The JFK story remains unsettled well into the 21st century, no matter what the various conspiracy and anti-conspiracy theorists may proclaim. Indeed, the complex reality of how a president of the United States came to be gunned down on a sunny day, and no one lost his liberty — or his job — continues to live and grow in popular memory. This is a book that reveals deceit and deception on the part of the CIA relating to the Kennedy assassination and why the CIA should reveal to the American people what it is still keeping secret. Employing his investigative reporting skills through interviews and examination of long-secret records, Morley reveals that the CIA was closely monitoring the movements of accused assassin Lee Harvey Oswald in the months preceding the assassination of President Kennedy. Questions naturally arise: Did the CIA suspect that Oswald was up to no good? Or was its surveillance part of a CIA scheme to frame Oswald for the assassination of President Kennedy? Why did the CIA keep its surveillance secret from the Warren Commission?Morley also reveals a close relationship between the CIA and an American anti-Castro group that began advertising Oswald’s connections to communism and the Soviet Union immediately after the assassination? That raises questions: Why didn’t the CIA reveal that relationship to official agencies investigating the assassination of President Kennedy? Why did a federal judge and the chief counsel of the House Select Committee on Assassinations accuse the CIA of deceit and deception?The U.S. government retains almost 3,600 assassination-related records, consisting of tens of thousands of pages that have never been seen by the public. More than 1,100 of these records are held by the CIA.What is in those secret files? What do they reveal about JFK’s death? Why has the CIA been so reluctant to release them? And when will they finally be revealed to the public? Will they answer the disturbing questions that the revelations in this book raise?
The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries
Andrei Soldatov - 2015
Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
Blue Team Field Manual (BTFM)
Alan J. White - 2017
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.