eBooks-it.org Logo
eBooks-IT.org Inner Image

Eric Cole eBooks

Download free Eric Cole eBooks

Insider Threat

Protecting the Enterprise from Sabotage, Spying and Theft
Insider Threat Image
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography...

Hiding in Plain Sight

Steganography and the Art of Covert Communication
Hiding in Plain Sight Image
Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guysFirst book to describe international terrorists' cybersecurity tool of choice in an accessible languageAuthor is a top security consultant for the CIA and provides gripping stories that show how steganography worksAppendix provides tools to help people detect and counteract stenanography...

Advanced Persistent Threat

Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat Image
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual...

Hackers Beware

The Ultimate Guide to Network Security
Hackers Beware Image
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to break into systems. Hackers Beware is unique in that it gives specific exploits, exactly how they work and how to protect against them. This book will help readers understand what security threats they are up against and what they need to do to protect against them. Some books cover this from a high level but do not get into the details of specific exploits and cover it in a case by case fashion. This book will co...


2007 - 2017 © eBooks-IT.org