Amazon Price: N/A (as of January 23, 2019 10:32 –
A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Continue reading “Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World”
Amazon Price: $49.95 $48.95 You save: $1.00 (2%). (as of January 23, 2019 10:32 –
Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around.
In this updated book, Laura offers step-by-step instructions on the key functions and features of Wireshark, including: Filter on addresses, protocols, fields or traffic characteristics Create custom columns for more efficient analysis Find the source of delays with filters and coloring rules Perform unattended captures with auto-stop conditions Filter on keywords using wildcards and regular expressions Graph and compare user, subnet and application traffic Reassemble and extract a file from captured traffic Identify DNS and HTTP errors fast Export important packet details to .csv format …and more
Continue reading “Wireshark 101: Essential Skills for Network Analysis – Second Edition: Wireshark Solution Series”
Amazon Price: N/A (as of January 23, 2019 09:07 –
This important report has been professionally converted for accurate flowing-text e-book format reproduction. As the Department of Defense executes its mission in its newest warfare domain, cyberspace, some have questioned its choices with regard to command and control of its cyber forces. This thesis examines historical cases of new warfare domains and how the Department of Defense structured the command and control elements of its forces dedicated to the air and space domains. It explores the current cyber command and control construct, and looks at two others that would likely be employed if a change in command and control were to occur. Those examined include a new functional combatant command focused on cyber, similar to U.S. Special Operations Command, and a stand-alone U.S. Cyber Force. This thesis considers the benefits and drawbacks of each, and seeks to serve as an informative tool should policymakers determine a new command and control model is necessary for cyber forces.
CHAPTER I – INTRODUCTION * A. BACKGROUND * B. RESEARCH QUESTIONS * C. BENEFITS OF STUDY * D. SCOPE AND LIMITATIONS * E. METHODOLOGY * F. ORGANIZATION OF THESIS * CHAPTER II – AIR DOMAIN * A. HISTORY * B. WHY AN AIR FORCE? * 1. The Nuclear Mission * 2. Airpower Strategy * C. RELATIONSHIP TO CYBER DOMAIN * D. SUMMARY * CHAPTER III – SPACE DOMAIN * A. HISTORY * B. WHY NOT A SPACE FORCE? * C. RELATIONSHIP TO CYBER DOMAIN * D. SUMMARY * CHAPTER IV – COMPETING CYBER COMMAND STRUCTURES * A. HISTORICAL APPLICATION TO CYBER DOMAIN * B. CURRENT STRUCTURE * 1. Benefits of Current Structure * 2. Drawbacks of Current Structure * C. MODIFIED JOINT STRUCTURE * 1. Benefits of a Modified Joint Structure * 2. Drawbacks of a Modified Joint Structure * 3. Application to the Cyber Domain * D. STAND-ALONE FORCE * 1. Benefits of a Stand-Alone Force * 2. Drawbacks of a Stand-Alone Force * E. COMPARISON OF ALTERNATIVES * 1. Comparison of Modified Joint Structure to Current Structure * 2. Comparison of Stand-Alone Force Structure to Current Structure * F. SUMMARY * CHAPTER V – CONCLUSION AND FUTURE WORK * A. CONCLUSION * B. FUTURE WORK * LIST OF REFERENCES
Amazon Price: $29.99 $29.99 (as of January 22, 2019 22:27 –
Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
Overview Detect an intruder on camera and set off an alarm Listen in or record conversations from a distance Find out what the other computers on your network are up to Unleash your Raspberry Pi on the world
Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.
Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.
Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.
Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.
What you will learn from this book Install and configure Raspbian OS for maximum mischief Schedule a prank to happen when your foe least expects it Listen in or talk to people from a distance Detect an intruder with motion detection and set off an alarm Distort your voice in weird and wonderful ways Push unexpected images into browser windows Knock all visitors off your Wi-Fi network Control the Pi with your smartphone Keep your data secret with encryption
A playful, informal approach to using the Raspberry Pi for mischief!
Who this book is written for
Raspberry Pi for Secret Agents is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along and if you’re completely new to Linux, you’ll pick up much of the basics for free.
Apart from the Raspberry Pi board itself, a USB microphone and/or a webcam is required for most of the audio/video topics and a Wi-Fi dongle is recommended for the networking examples. A Windows/Mac OS X/Linux computer (or second Raspberry Pi) is also recommended for remote network access.
Amazon Price: $17.99 $17.77 You save: $0.22 (1%). (as of January 23, 2019 10:27 –
As Janell Burley Hofmann, mother of five, wrapped her 13-year-old's iPhone on Christmas Eve, she was overwhelmed by questions: "Will my children learn to sit and wonder without Googling? Should I know their passwords for online accounts? Will they experience the value of personal connection without technology?"
To address her concerns, she outlined boundaries and expectations in a contract for her son to sign upon receiving his first cell phone. When Hofmann's editor at The Huffington Post posted the contract, now known as iRules, it resonated on a massive scale and went viral, resulting in a tsunami of media coverage and requests. It quickly became apparent that people across the country were hungry for more.
Continue reading “iRules: What Every Tech-Healthy Family Needs to Know about Selfies, Sexting, Gaming, and Growing up”