Ken Dunham - Böcker
Visar alla böcker från författaren Ken Dunham. Handla med fri frakt och snabb leverans.
6 produkter
6 produkter
Malicious Bots
An Inside Look into the Cyber-Criminal Underground of the Internet
Häftad, Engelska, 2019
877 kr
Skickas inom 10-15 vardagar
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote
1 626 kr
Skickas inom 10-15 vardagar
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual seeking this role and also has value to other types of cyber leaders. Knowledge and understanding of traditional books can only get you so far – Cyber CISO Marksmanship has powerful perspectives, real-world accounts, and insights you won’t find anywhere else!Key features included with Cyber CISO Marksmanship: Over a century of CISO experience is represented by the authors of this book Unique storytelling format based upon real-world accounts from leading CISOs Sharpshooter perspectives from multiple CISOs for each story Bottom Line Up Front (BLUF) for quick reference on outcomes for each story Sharpshooter icon for what works Misfire icon for pitfalls to avoid All book owners are invited to participate in online content at CyberCISOMarksmanship.com and face-to-face events Book owners who are CISOs qualify to join, for free, a private CISO online community (by CISOs for CISOs)While this book is written for CISOs or those desiring to be in that role soon, it is also helpful to other cyber leaders.
661 kr
Skickas inom 10-15 vardagar
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual seeking this role and also has value to other types of cyber leaders. Knowledge and understanding of traditional books can only get you so far – Cyber CISO Marksmanship has powerful perspectives, real-world accounts, and insights you won’t find anywhere else!Key features included with Cyber CISO Marksmanship: Over a century of CISO experience is represented by the authors of this book Unique storytelling format based upon real-world accounts from leading CISOs Sharpshooter perspectives from multiple CISOs for each story Bottom Line Up Front (BLUF) for quick reference on outcomes for each story Sharpshooter icon for what works Misfire icon for pitfalls to avoid All book owners are invited to participate in online content at CyberCISOMarksmanship.com and face-to-face events Book owners who are CISOs qualify to join, for free, a private CISO online community (by CISOs for CISOs)While this book is written for CISOs or those desiring to be in that role soon, it is also helpful to other cyber leaders.
Malicious Bots
An Inside Look into the Cyber-Criminal Underground of the Internet
Inbunden, Engelska, 2008
1 087 kr
Skickas inom 10-15 vardagar
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book! With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer. Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively prote
686 kr
Tillfälligt slut
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tactical and practical book shows you how to use to use dynamic malware analysis to check the behavior of an application/malware as it has been executed in the system. It also describes how you can apply static analysis to break apart the application/malware using reverse engineering tools and techniques to recreate the actual code and algorithms used.The book presents the insights of experts in the field, who have already sized up the best tools, tactics, and procedures for recognizing and analyzing Android malware threats quickly and effectively. You also get access to an online library of tools that supplies what you will need to begin your own analysis of Android malware threats. Tools available on the book’s site include updated information, tutorials, code, scripts, and author assistance.This is not a book on Android OS, fuzz testing, or social engineering. Instead, it is about the best ways to analyze and tear apart Android malware threats. After reading the book, you will be able to immediately implement the tools and tactics covered to identify and analyze the latest evolution of Android threats.Updated information, tutorials, a private forum, code, scripts, tools, and author assistance are available at AndroidRisk.com for first-time owners of the book.
560 kr
Skickas inom 7-10 vardagar
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.* Visual PayloadsView attacks as visible to the end user, including notation of variants.* Timeline of Mobile Hoaxes and ThreatsUnderstand the history of major attacks and horizon for emerging threates.* Overview of Mobile Malware FamiliesIdentify and understand groups of mobile malicious code and their variations.* Taxonomy of Mobile MalwareBring order to known samples based on infection, distribution, and payload strategies.* Phishing, SMishing, and Vishing AttacksDetect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.* Operating System and Device VulnerabilitiesAnalyze unique OS security issues and examine offensive mobile device threats.* Analyze Mobile MalwareDesign a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.* Forensic Analysis of Mobile MalwareConduct forensic analysis of mobile devices and learn key differences in mobile forensics.* Debugging and Disassembling Mobile MalwareUse IDA and other tools to reverse-engineer samples of malicious code for analysis.* Mobile Malware Mitigation MeasuresQualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents. Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks Analyze Mobile Device/Platform Vulnerabilities and Exploits Mitigate Current and Future Mobile Malware Threats