Download Zero Day Ebook PDF

Zero Day

Zero Day
A Novel

by Ezekiel Boone

  • Publisher : Simon and Schuster
  • Release : 2018-02-27
  • Pages : 336
  • ISBN : 1501125133
  • Language : En, Es, Fr & De
GET BOOK

The United States goes to war against the queen spiders that threaten to overtake the human race forever in this thrilling and horrifying finale of the “captivating, engaging, and completely terrifying” (My Guilty Obsession) internationally bestselling Hatching series. The world is on the brink of apocalypse. Zero Day has come. The only thing more terrifying than millions of spiders is the realization that those spiders work as one. But among the government, there is dissent: do we try to kill all of the spiders, or do we gamble on Professor Guyer’s theory that we need to kill only the queens? For President Stephanie Pilgrim, it’s an easy answer. She’s gone as far as she can—more than two dozen American cities hit with tactical nukes, the country torn asunder—and the only answer is to believe in Professor Guyer. Unfortunately, Ben Broussard and the military men who follow him don’t agree, and Pilgrim, Guyer, and the loyal members of the government have to flee, leaving the question: what’s more dangerous, the spiders or ourselves?

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
A Book

by Mohssen Mohammed,Al-Sakib Khan Pathan

  • Publisher : CRC Press
  • Release : 2016-04-19
  • Pages : 337
  • ISBN : 1466557281
  • Language : En, Es, Fr & De
GET BOOK

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de

The Zero Day Proposal

The Zero Day Proposal
A Book

by Fabrina Glitchlace

  • Publisher : Fabrina Glitchlace
  • Release : 2018-09-03
  • Pages : 127
  • ISBN : 1775092917
  • Language : En, Es, Fr & De
GET BOOK

Daniqua was just a regular single woman; hungry, horny, and trying to make it on her own in the world. But her past came calling and now her weekend plans are FUBAR. Will she play her role, prevent nuclear annihilation, and win financial freedom? What will be her answer to The Zero Day Proposal?

Zero Days, Thousands of Nights

Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits

by Lillian Ablon,Andy Bogart

  • Publisher : Rand Corporation
  • Release : 2017-03-09
  • Pages : 132
  • ISBN : 0833097792
  • Language : En, Es, Fr & De
GET BOOK

Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.

Zero Day

Zero Day
A Book

by DAVID. BALDACCI

  • Publisher : Unknown Publisher
  • Release : 2019-04-04
  • Pages : 624
  • ISBN : 9781529003208
  • Language : En, Es, Fr & De
GET BOOK

Zero Day is the explosive first instalment in David Baldacci's thrilling John Puller series. Distinguished as a top investigator in the US government, John Puller is called in to conduct an enquiry into the brutal murders of a family in a remote area of West Virginia. It soon becomes clear that the case has wider implications and as the body count rises he teams up with local homicide detective Samantha Cole. As the web of deceit is revealed, it quickly becomes apparent that there's much more to this case than they had first thought. It is an investigation where nothing is as it seems, and nothing can be taken at face value. When Puller and Cole discover a dangerous situation in the making, Puller finds he must turn to the one person who can help avert certain catastrophe. A person he has known all his life. In a breathtaking rollercoaster race against time, Cole fears for the community in which she was raised, and Puller knows he has to overcome the enemies of his country to avoid far reaching disaster. But in the end, you can't kill what you can't see is coming . . .

Zero Days

Zero Days
The Real Life Adventure of Captain Bligh, Nellie Bly, and 10-year-old Scrambler on the Pacific Crest Trail

by Barbara Egbert

  • Publisher : Wilderness Press
  • Release : 2007-11-29
  • Pages : 224
  • ISBN : 0899974384
  • Language : En, Es, Fr & De
GET BOOK

In April 2004, Barbara Egbert and Gary Chambers and their precocious 10-year-old daughter Mary embarked on a 2,650-mile hike from Mexico to Canada along the famed Pacific Crest Trail. This the well-told tale of their epic adventure, which required love, perseverance, and the careful rationing of toilet paper. Six months later, Mary would become the youngest person ever to successfully walk the entire trail.The trio weathered the heat of the Mojave, the jagged peaks of the Sierra, the rain of Oregon, and the final cold stretch through the Northern Cascades. They discovered which family values, from love and equality to thrift and cleanliness, could withstand a long, narrow trail and 137 nights together in a 6-by-8-foot tent. Filled with tidbits of wisdom, practical advice, and humor, this story will both entertain and inspire readers to dream about and plan their own epic journey.

From Aconite to the Zodiac Killer

From Aconite to the Zodiac Killer
The Dictionary of Crime

by Amanda Lees

  • Publisher : Hachette UK
  • Release : 2020-07-23
  • Pages : 320
  • ISBN : 1472143280
  • Language : En, Es, Fr & De
GET BOOK

'The Dictionary of Crime is now the first book I reach for when beginning a new novel. An essential resource, it's packed with explanations, insider information, contemporary and historical slang, as well as some downright bizarre laws and practices. It's funny, fascinating and a damn good read' M. W CRAVEN, winner of the 2019 Crime Writers Association Gold Dagger for best crime novel of the year for The Puppet Show 'A really good idea . . . executed neatly to come up with the perfect gift for crime lovers' MAT COWARD, Morning Star 'I found myself rolling around in it for hours, like a gangster's moll on a bed full of money. Sheer delight!' CATRIONA McPHERSON 'Where was this book when I started writing? From Aconite to the Zodiac Killer is the essential companion for any serious reader or writer of crime' LEYE ADENLE, author of When Trouble Sleeps 'A fascinating compendium of crime facts which should be on the shelves of every crime writer - and every crime reader' SIMON BRETT 'This is a dangerous book in so many ways, chock full of ways of killing people, from undetectable poisons to various types of guns. It contains riveting accounts of notorious murderers, is crammed with fascinating details of slang, and precise particulars of police procedures. The perfect gift for any true crime enthusiast and an indispensable guide for all crime fiction writers.' S. W. WILLIAMS, author of Small Deaths and How to Write Crime Fiction 'A remarkable achievement. At once elucidating and compelling, indispensable and unputdownable. It reads like a page-turning thriller. Whether a crime writer who needs to distinguish a blood agent from a bum beef or a reader with an interest in queer coal makers, this lexicon will keep you hooked, and leave you sublimely informed.' GARY DONNELLY, author of Killing in Your Name and Blood Will Be Born 'Fascinating, insightful and taking up permanent residency on my desk. Amanda Lees' Dictionary of Crime is my new bible!' CHRIS WHITTAKER, award-winning author of Tall Oaks, All The Wicked Girls and We Begin at the End 'What a little gem this is - such a great idea and a valuable resource for writers. I found myself dipping into it at intervals and marvelling at the extent of the research that's gone into it, as well as chuckling over some of the more unusual entries. My personal favourites? BINGO seat, nicker, moll buzzer and lully-prigger. Wouldn't have had a clue what they meant . . . but I'm determined to work them in somewhere in a future novel!' G. J. MINETTT, author of The Syndicate 'A fascinating journey through the dark side of the human psyche. Highly recommended for anyone interested in criminals and crime' PATRICK REDMOND, bestselling author of The Wishing Game An essential popular A-Z reference guide for fans of crime fiction and true crime, in books, TV and film, helping to make sense of everything from asphyxiation to VX nerve agent. This is an indispensable guide for fans of true crime and crime fiction, whether in books, film or on TV, who want to look behind the crime, to understand the mechanics of an investigation, to walk in their favourite detectives' shoes and, most importantly, to solve the clues. To do that, one needs to be fluent in the language of the world of crime. We need to know what that world-weary DI is talking about when she refers to another MISPER. We have to immediately grasp the significance of the presence of paraquat, and precisely why it is still a poison of choice. If you want to know how many murders it takes for a killer to be defined as a serial killer, what Philip Marlowe means when he talks about being 'on a confidential lay' and why the 'fruit of a poisonous tree' is a legal term rather than something you should avoid on a country walk, this is the reference book you've been waiting for. It covers police and procedural terms and jargon of many different countries; acronyms; murder methods; criminal definitions, including different types of killers; infamous killers and famous detectives; notorious cases often referred to in crime fiction and true crime; gangster slang, including that of the Eastern European mafia; definitions of illegal drugs; weapons; forensic terminology; types of poisons; words and phrases used in major crime genres, including detective fiction, legal thrillers, courtroom dramas, hardboiled crime, Scandi and Tartan Noir, cosy crime and psychological thrillers; criminology terms; and the language of the courts and the legal systems of British, American, French, Nordic and other countries. From Aconite to the Zodiac Killer is an essential, go-to resource for readers and even for writers of crime fiction. More than simply a glossary, this is a guide that provides a doorway into a supergenre, and one that is not just for readers, but also for the many fans of film and TV dramas, of podcasts, and crime blogs. It is also an indispensable resource for writers or would-be writers of crime fiction.

Network Security Metrics

Network Security Metrics
A Book

by Lingyu Wang,Sushil Jajodia,Anoop Singhal

  • Publisher : Springer
  • Release : 2017-11-15
  • Pages : 207
  • ISBN : 3319665057
  • Language : En, Es, Fr & De
GET BOOK

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since “you cannot improve what you cannot measure”, a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

ICCWS 2020 15th International Conference on Cyber Warfare and Security

ICCWS 2020 15th International Conference on Cyber Warfare and Security
A Book

by Prof. Brian K. Payne ,Prof. Hongyi Wu

  • Publisher : Academic Conferences and publishing limited
  • Release : 2020-03-12
  • Pages : 129
  • ISBN : 1912764539
  • Language : En, Es, Fr & De
GET BOOK

The Cybersecurity Dilemma

The Cybersecurity Dilemma
Hacking, Trust and Fear Between Nations

by Ben Buchanan

  • Publisher : Oxford University Press
  • Release : 2017-02-01
  • Pages : 129
  • ISBN : 0190694807
  • Language : En, Es, Fr & De
GET BOOK

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Encyclopedia of Cyber Warfare

Encyclopedia of Cyber Warfare
A Book

by Paul J. Springer

  • Publisher : ABC-CLIO
  • Release : 2017-07-07
  • Pages : 379
  • ISBN : 1440844259
  • Language : En, Es, Fr & De
GET BOOK

This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century. • Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare that enables readers to better understanding of the impact of cyber warfare on modern conflicts • Includes a detailed chronology that documents the evolution and use of cyber warfare over the past few decades • Supplies further readings and a lengthy bibliography that offer a wealth of options to students conducting extensive research on the subject

Zero Day

Zero Day
A Book

by David Baldacci

  • Publisher : MacMillan Hardback Omes
  • Release : 2011
  • Pages : 400
  • ISBN : 9780230754904
  • Language : En, Es, Fr & De
GET BOOK

This is the new heart-racing thriller from the number one International bestselling author. John Puller is a former war hero and now the best military investigator in the U.S. Army's Criminal Investigative Division. He is a loner with few possessions by preference, but he has an indomitable spirit and an unstoppable determination for finding the truth. His father was the most decorated U.S. Marine in history, but now resides in a nursing home far from his battlefield glory. Puller's older brother, also a military vet, is serving a life sentence in Leavenworth Penitentiary. Puller is called out to a remote, rural area far from any military outpost to investigate into the brutal murder of a family in their home. The dead husband was in the army and the wife worked for a Pentagon contractor. The local homicide detective, a woman with personal demons of her own, clashes with Puller over the investigation. What neither of them knows is what is waiting for them across the street from the murdered family's home. It is something that will turn an already complicated case on its head. As Puller digs through deception after red herring, he realizes that absolutely nothing, and nobody, he's so far seen in this small town, are what they seem. He is truly one man against an overwhelming force.

Personal Cybersecurity

Personal Cybersecurity
How to Avoid and Recover from Cybercrime

by Marvin Waschke

  • Publisher : Apress
  • Release : 2017-01-12
  • Pages : 240
  • ISBN : 1484224302
  • Language : En, Es, Fr & De
GET BOOK

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems. Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage. Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed. What You'll Learn Discover how computer security works and what it can protect us from See how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systems Identify the critical vulnerabilities of a computer connected to the Internet Manage your computer to reduce vulnerabilities to yourself and your employer Discover how the adoption of newer forms of biometric authentication affects you Stop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

The Cyberdimension

The Cyberdimension
A Political Theology of Cyberspace and Cybersecurity

by Eric Trozzo

  • Publisher : Wipf and Stock Publishers
  • Release : 2019-04-29
  • Pages : 292
  • ISBN : 1532651198
  • Language : En, Es, Fr & De
GET BOOK

In 2013, Edward Snowden released a trove of documents revealing the extent of government electronic surveillance. Since then, we have been inundated with reports of vicious malware attacks, election hacking, data breaches, potential cyberwars, fights over Net Neutrality, and fake internet news. Where once discussion of cyberspace was full of hope of incredible potential benefits for humanity and global connection, it has become the domain of fear, anxiety, conflict, and authoritarian impulses. As the cloud of the Net darkens into a storm, are there insights from Christian theology about our online existence? Is the divine present in this phenomenon known as cyberspace? Is it a realm of fear or a realm of hope? In The Cyberdimension, Eric Trozzo engages these questions, seeking not only a theological means of speaking about cyberspace in its ambiguity, but also how the spiritual dimension of life provokes resistance to the reduction of life to what can be calculated. Rather than focusing on the content available online, he looks to the structure of cyberspace itself to find a chastened yet still expectant vision of divinity amidst the political, economic, and social forces at play in the cyber realm.

Managing Cyber Attacks in International Law, Business, and Relations

Managing Cyber Attacks in International Law, Business, and Relations
In Search of Cyber Peace

by Scott J. Shackelford

  • Publisher : Cambridge University Press
  • Release : 2014-07-10
  • Pages : 129
  • ISBN : 1107354773
  • Language : En, Es, Fr & De
GET BOOK

This book presents a framework to reconceptualize internet governance and better manage cyber attacks. It examines the potential of polycentric regulation to increase accountability through bottom-up action. It also provides a synthesis of the current state of cybersecurity research, bringing features of cyber attacks to light and comparing and contrasting the threat to all relevant stakeholders. Throughout the book, cybersecurity is treated holistically, covering issues in law, science, economics and politics. This interdisciplinary approach is an exemplar of how strategies from different disciplines as well as the private and public sectors may cross-pollinate to enhance cybersecurity. Case studies and examples illustrate what is at stake and identify best practices. The book discusses technical issues of Internet governance and cybersecurity while presenting the material in an informal, straightforward manner. The book is designed to inform readers about the interplay of Internet governance and cybersecurity and the potential of polycentric regulation to help foster cyber peace.

Cybercrime: An Encyclopedia of Digital Crime

Cybercrime: An Encyclopedia of Digital Crime
A Book

by Nancy E. Marion,Jason Twede

  • Publisher : ABC-CLIO
  • Release : 2020-10-31
  • Pages : 485
  • ISBN : 1440857350
  • Language : En, Es, Fr & De
GET BOOK

This important reference work is an extensive, up-to-date resource for students wanting to immerse themselves in the world of cybercrime, or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. It includes entries on such topics as the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly evolving field. Includes an introductory overview essay that discusses all aspects of cybercrime—how it's defined, how it developed, and its massive expansion in recent years Offers a wide array of entries regarding cybercrime and the many ways it can be committed Explores the largest, most costly cyber attacks on a variety of victims, including corporations, governments, consumers, and individuals Provides up-to-date information on the ever-evolving field of cybercrime

Introduction to Computer Networks and Cybersecurity

Introduction to Computer Networks and Cybersecurity
A Book

by Chwan-Hwa (John) Wu

  • Publisher : CRC Press
  • Release : 2016-04-19
  • Pages : 1336
  • ISBN : 1498760139
  • Language : En, Es, Fr & De
GET BOOK

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective

Cybersecurity Fundamentals

Cybersecurity Fundamentals
A Real-World Perspective

by Kutub Thakur,Al-Sakib Khan Pathan

  • Publisher : CRC Press
  • Release : 2020-04-28
  • Pages : 288
  • ISBN : 1000059634
  • Language : En, Es, Fr & De
GET BOOK

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems. Examples of those systems include intrusion detection systems (IDS), intrusion prevention systems (IPS), and security firewalls. It demonstrates how modern technologies can be used to create and manage passwords for secure data. This book also covers aspects of wireless networks and their security mechanisms. The details of the most commonly used Wi-Fi routers are provided with step-by-step procedures to configure and secure them more efficiently. Test questions are included throughout the chapters to ensure comprehension of the material. Along with this book’s step-by-step approach, this will allow undergraduate students of cybersecurity, network security, and related disciplines to gain a quick grasp of the fundamental topics in the area. No prior knowledge is needed to get the full benefit of this book.

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook
A Book

by Joxean Koret,Elias Bachaalany

  • Publisher : John Wiley & Sons
  • Release : 2015-09-28
  • Pages : 384
  • ISBN : 1119028752
  • Language : En, Es, Fr & De
GET BOOK

"The Antivirus Hacker's handbook shows you how to hack your own system's defenses to discover its weaknesses, so you can apply the appropriate extra protections to keep you network locked up tight."-- Back cover.

Wine production from vegetables and preliminary component analysis: an overview

Wine production from vegetables and preliminary component analysis: an overview
A Book

by Prem Jose Vazhacharickal,Rathi C.R,Syamjith Reji,Jiby John Mathew,Sajeshkumar N.K

  • Publisher : Prem Jose
  • Release : 2022
  • Pages : 129
  • ISBN : 1709797835
  • Language : En, Es, Fr & De
GET BOOK

Wine is psychoactive drug commonly used for its intoxicating effects typically made of fermented juice of fruits. The leafy vegetables also called protherbs, greens, salad greens, plant leaves eaten as a vegetable, accompanied by tender petioles and shoots. They come from a very wide variety of plants, share a great deal with other leaf vegetables in nutrition and cooking methods. Leaf vegetables are typically low in calories and fat and high in protein per calorie, dietary fibre, vitamin C, pro vitamin A carotenoids, folate, manganese and vitamin K. In this study the process of fermentation of leafy vegetable extract is mixed with the spices like cardamom, star anise, nutmeg for increasing the quality and microbial property. The fermented wines are then analysed for acetic acid test, tartaric acid test, estimation of alcohol content by boiling method and estimation of tannin content. The fermented wine is early contaminated with common bacteria like Lactobacillus and Acetobacter. An antibacterial test is also done with leaf vegetable wine. This test proved that the three spices cardamom, star anise, nutmeg has the antibacterial property against Lactobacillus and Acetobacter and helps to increase the quality and medicinal value.