CyberWar

Si Vis Pacem, Para Bellum

By

Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan

Rating: 
Amazon Price: N/A (as of May 24, 2017 17:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase

By

Raspberry Pi for Secret Agents

Rating: 
Amazon Price: $29.99 $29.92 You save: $0.07 (%). (as of May 24, 2017 11:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
Overview Detect an intruder on camera and set off an alarm Listen in or record conversations from a distance Find out what the other computers on your network are up to Unleash your Raspberry Pi on the world
In Detail
Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.
Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.
Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.
Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.
What you will learn from this book Install and configure Raspbian OS for maximum mischief Schedule a prank to happen when your foe least expects it Listen in or talk to people from a distance Detect an intruder with motion detection and set off an alarm Distort your voice in weird and wonderful ways Push unexpected images into browser windows Knock all visitors off your Wi-Fi network Control the Pi with your smartphone Keep your data secret with encryption
Approach
A playful, informal approach to using the Raspberry Pi for mischief!
Who this book is written for
Raspberry Pi for Secret Agents is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along and if you’re completely new to Linux, you’ll pick up much of the basics for free.
Apart from the Raspberry Pi board itself, a USB microphone and/or a webcam is required for most of the audio/video topics and a Wi-Fi dongle is recommended for the networking examples. A Windows/Mac OS X/Linux computer (or second Raspberry Pi) is also recommended for remote network access.

By

The Secret Sentry: The Untold History of the National Security Agency

Rating: 
Amazon Price: N/A (as of May 25, 2017 11:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In February of 2006, Matthew Aid's discovery of a massive secret historical document reclassification program then taking place at the National Archives made the front page of the New York Times. This discovery is only the tip of the iceberg of Aid's more than twenty years of intensive research, culled from thousands of pages of formerly top secret documents. In The Secret Sentry, he details the untold history of America's most elusive and powerful intelligence agency, the National Security Agency (NSA), since the end of World War II. This will be the first comprehensive history of the NSA, most recently in the news with regards to domestic spying, and will reveal brand new details about controversial episodes including the creation of Israel, the Bay of Pigs, the Berlin Wall, and the invasion of Iraq. Since the beginning of the Cold War, the NSA has become the most important source of intelligence in the US government: 60% of the president's daily briefing comes from the NSA. Matthew Aid will reveal just how this came to be, and why the NSA has gone to such great lengths to keep its history secret.

By

Protection of Information and the Right to Privacy – A New Equilibrium? (Law, Governance and Technology Series)

Amazon Price: $129.00 $129.00 (as of May 24, 2017 19:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks internationally. The focus of the book is on how we may reconcile high levels of information security with robust degrees of informational privacy, also in connection with recent challenges presented by phenomena such as “big data” and security scandals, as well as new legislation initiatives, such as those concerning “the right to be forgotten” and the use of personal data in biomedical research. The book seeks to offer analyses and solutions of the new tensions, in order to build a fair, shareable and sustainable balance in this vital area of human interactions.

By

Social Engineer: The Brody Taylor Series of Cyber Crime and Suspense Thrillers (Deep Web Thriller Series)

Rating: 
Amazon Price: N/A (as of May 25, 2017 02:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Secrets. Lies. Choices.

When a pharmaceutical company hires Brody Taylor, elite hacker and social engineer, to fortify their digital-defences against a Chinese blackhat cyberattack, Brody stumbles across a secret the company strives to keep under wraps.
Read More

/* */