Amazon Price: N/A (as of May 9, 2017 20:51 –
When Kris Storm, the new manager of an elite cybersecurity team at Illuminate, a global internet powerhouse, receives an order to sift through web traffic to further the presidential ambitions of the mayor of New York, she stomps out the door in protest. But her staunch belief in the protection of an individual's right to privacy is tested when her boss abruptly shuts down the project a few weeks later. By then, a disturbing trail of terrorist activity, albeit circumstantial, has emerged: Brighton Beach, bitcoins, identity theft, liquid explosives, jihad, Boston Marathon. Now, Kris must decide whether to dig deeper, or stay constitutionally safe on the sidelines. Her hesitancy, however, is costly. By the time Kris and her partner, street savvy FBI agent Jim Bright, finally identify the bombers and their target, Yankee Stadium, they must speed to the Bronx.
Excerpt from The Fourth Amendment:
Kris sprinted down the plaza, passing by revelers downing beers on the patio of the Hard Rock Café, while Jim headed for the Stadium. A uniformed cop signaled her to slow down but he did not move to stop her.
Crossing one hundred sixty-first street, Kris reached the steps leading up to the elevated platform for the 4 train. She was halfway up when she heard a roar swelling from deep inside the Stadium, the banks of bright lights on its roof casting a warm glow on the Bronx skyline. She froze, pulling out her phone to check ESPN. The game was going on. Life was still normal. The Yankees were batting: Ripcurl Reilly in the on deck circle.
A train rumbled overhead, burrowing deeper into the Bronx. Wrong way. Kris wanted to head in the other direction, towards Manhattan. She started back up the steps again but then stopped. Turken lived in Brighton Beach. She remembered the subway ride home after her disagreement with Jim. Turken and his accomplice would likely head back home on the D train, which ran underground, not the 4. She spun around jumping two steps at a time to reach the street. The stairs leading down to the D were right in front of her.
Kris cast one last glance at the gleaming edifice across the street before beginning her descent. She had just reached the fifth step when another wave of sound rose from the Stadium.
Amazon Price: N/A (as of May 24, 2017 08:44 –
The move on the part of the US military, which began in 1996, to Network-Centric Warfare (NCW), meant the combination of sensor grids, C&C grids, and precision targeting to increase speed to command, and represented a military offset. Along with networking comes exposure to cyber attacks, attacks that will be used in future wars.
Amazon Price: $6.95 (as of May 24, 2017 09:08 –
The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to help facility and infrastructure engineers and building managers understand vulnerability of SCADA systems and building and industrial control systems to cyber-attack. The book includes definitions of technical terms related to automated equipment controls common to industry, utilities and buildings. Although written for facility engineers, much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Dictionary attack Cinderella attack Time Bomb attack Fork Bomb attack Logic Bomb attack Bluesnarfing Smurf attack Vampire Tap Water Holing Pass the Hash attack Tiny Fragment attack Protocol Fuzzing attack Replay attack Amplification attack Man in the Middle attack and many more. I also include steps to take to prevent a cyber-attack.
Amazon Price: N/A (as of May 24, 2017 14:54 –
If the experts could point to any single book as a starting point for understanding the subject of intelligence from the late twentieth century to today, that single book would be Allen W. Dulles's The Craft of Intelligence. This classic of spycraft is based on Allen Dulles's incomparable experience as a diplomat, international lawyer, and America's premier intelligence officer. Dulles was a high-ranking officer of the CIA's predecessor–the Office of Strategic Services–and was present at the inception of the CIA, where he served eight of his ten years there as director. Here he sums up what he learned about intelligence from nearly a half-century of experience in foreign affairs.
In World War II his OSS agents penetrated the German Foreign Office, worked with the anti-Nazi underground resistance, and established contacts that brought about the Nazi military surrender in North Italy. Under his direction the CIA developed both a dedicated corps of specialists and a whole range of new intelligence devices, from the U-2 high-altitude photographic plane to minute electronic listening and transmitting equipment.
Amazon Price: $89.95 $61.15 You save: $28.80 (32%). (as of May 24, 2017 12:55 –
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.
Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.