CyberWar

Si Vis Pacem, Para Bellum

By

The Dark Net Black Book: Linking you to the other side.

Rating: 
Amazon Price: N/A (as of March 23, 2017 00:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 'Exploration of the Deep Web' Kash Laden showed you exactly how to get on to the Dark Net safely and anonymously. In the eye opening 'Dark Net Black Book' you will find at least 100 links to hidden websites on the Dark Net.

The aim of this guide is to give you a taste of what is down there, beyond the surface of the known internet. Each link has been tested and is known to have worked at the time of publication. Due to the nature of the Dark Net, some links die off. However, in an unprecedented move, you will be pleased to know that this guide will be updated every three months to ensure the validity of each link within.
Read More

By

The Nature of War in the Information Age: Clausewitzian Future (Strategy and History)

Rating: 
Amazon Price: N/A (as of March 22, 2017 08:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

There has been a great deal of speculation recently concerning the likely impact of the 'Information Age' on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.

Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of 'Information Power' and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.

By

Keyllama 4MB USB Value Keylogger

Rating: 
Amazon Price: $61.59 $61.59 (as of March 23, 2017 00:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

KeyLlama records everything typed on a USB keyboard. Absolutely no software is required and KeyLlama is completely invisible to any software. The KeyLlama USB is the stealthiest hardware keylogger in existence – it is impossible to detect!

Unlike many other keyloggers, these work with both low and full-speed USB Keyboards. Most newer USB keyboards operate at "full-speed." Most lower cost keyloggers do not work with full-speed keyboards. If they don't specifically state it will work, it almost certainly won't.
Read More

By

Hands-On Ethical Hacking and Network Defense

Rating: 
Amazon Price: $39.99 $29.63 You save: $10.36 (26%). (as of March 22, 2017 23:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"–professional security testers–to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.

/* */