Amazon Price: $95.00 $92.14 You save: $2.86 (3%). (as of July 6, 2015 08:38 –
Cybercrime is a growing problem in the modern world. Despite the many advantages of computers, they have spawned a number of crimes, such as hacking and virus writing, and made other crimes more prevalent and easier to commit, including music piracy, identity theft and child sex offences. Understanding the psychology behind these crimes helps to determine what motivates and characterises offenders and how such crimes can be prevented. This textbook on the psychology of the cybercriminal is the first written for undergraduate and postgraduate students of psychology, criminology, law, forensic science and computer science. It requires no specific background knowledge and covers legal issues, offenders, effects on victims, punishment and preventative measures for a wide range of cybercrimes. Introductory chapters on forensic psychology and the legal issues of cybercrime ease students into the subject, and many pedagogical features in the book and online provide support for the student.
Amazon Price: $50.00 $39.29 You save: $10.71 (21%). (as of July 6, 2015 04:55 –
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
Cyberspace and the Use of Force focuses specifically on one of the most challenging, contentious, and important issues in international law; how to determine what constitutes a use of force between states in CyberSpace under the contemporary international law paradigm of conflict management defined by the Charter of the United Nations. This text provides a detailed analysis of existing international law and state practice that reveals which state activities in CyberSpace may constitute a use of force and an armed attack that invokes a state’s right to use force in self-defense. Though referenced in detail for lawyers, this text provides the necessary legal background to make it a useful desk reference for government officials, military operators, students, and others who are interested in the application of international law in CyberSpace.
Click here to buy from Amazon
Amazon Price: $32.99 (as of July 5, 2015 17:52 –
The Alfa AWUS036H is the latest version of the most powerful card available. This has a stunning 1000mW output power. So if you are looking for a device to connect to an outdoor 2.4 GHz antenna, such as on a boat or an RV, this is a perfect solution. It outperforms wireless cards that are built in to newer laptops. Adding this to your laptop or desktop computer will enhance range and signal quality at longer distances. And works with Win98SE/200/ME/XP, Windows Vista, Windows 7, Linux (kernel 2.6.6 and later) and Macintosh (OS version 10.4). And the necessary drivers for ALL of these operating systems are included on CD-ROM
* Connects at a full 54Mbps via USB 2.0, up to 8 times faster than a USB 1.1 adapter
* High gain upgradeable
* Compact size for greater flexibility
* Also compatible with USB 1.1 desktop and notebook computers
* Plug-and-Play Compatible with windows 98SE, 2000, Millennium, XP and Linux
* High security 64/128/256bit WEP Encryption, TKIP, WPA, 802.11
Instituto Sagres gave the lecture “The Intelligence and Cyber Power”. The event occurred on 19 September 2012 and was part of the Cyber Intelligence Symposium, organized by the Brazilian Army¬†Intelligence School (EsIMEx).
The approach is an analogy with the rise of Air Power and its Theories, as well as Air Forces, from the invention of the balloon, by priest Bartolomeu de Gusm√£o, to the present day, under the focus of Intelligence for military use. Examines aspects of the emergence of Air Power Theories and as in its early days the air vector was seen only as a tool for Intelligence, without any military value as stated¬†by Marshal Foch in 1910, notably with use only for the (Aerial) Reconnaissance, replacing the cavalry and later seen as a replacement to the high spots on the ground, as the Military Doctrine of the time. In this analogy, we have uncovered a probable metric for¬†chronology of¬†emergent Cyber Power in function of the use of the Fifth Dimension: Cyberspace; until then only seen as a source of Intelligence, without any military value. The author leads the audience to question at what timeline point,¬†in the use of Cyberspace, we would be: at the time of the Duque de Caxias balloons (or¬†American¬†Civil War)¬†or UAV? The speaker brings to reflect the questioning of how far away we are from what could be Cyber Power Theories and Cyber Forces (the next Force among¬†Armed Forces) and how Intelligence has and will have a key role in this evolution.
View the original article here