CyberWar

Si Vis Pacem, Para Bellum

By

Ransomware: Protect Your Network

Rating: 
Amazon Price: N/A (as of May 23, 2017 06:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Ransomware is a plague on the business world. This brief book explains what it is, how to identify it and some precautions you can take to protect your network. It is not meant to be a comprehensive security manual but just the basics on what a business owner or office manager needs to know. Detailed protection planning should then be discussed with the company's IT department or IT provider.

By

Exploiting Hard Disk Firmware for Data Hiding

Amazon Price: N/A (as of May 23, 2017 06:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How do criminals continue to use computers for illegitimate purposes? Are current forensics tools good enough? Explore the ways in which it may be easy for criminals to take advantage of computer technology for criminals purposes and the challenges that computer forensics experts face in today's technically savvy world and bringing criminals to justice. This book is intended for people that work in the computer forensics field that wish to extend their knowledge, computer students or just people with an interest in computer forensics. The results have been derived mainly from primary research via testing in a lab, some secondary research has also been used, however the results are quite surprising. This project was concluded in April 2013 and is based around how data can be hidden in the firmware of a computer and recovered for use in a court of law and the problems associated with it, read the book to find out more……..

By

Network Security Through Data Analysis: Building Situational Awareness

Rating: 
Amazon Price: N/A (as of May 23, 2017 13:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it.

Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.Explore network, host, and service sensors for capturing security dataStore data traffic with relational databases, graph databases, Redis, and HadoopUse SiLK, the R language, and other tools for analysis and visualizationDetect unusual phenomena through Exploratory Data Analysis (EDA)Identify significant structures in networks with graph analysisDetermine the traffic that’s crossing service ports in a networkExamine traffic volume and behavior to spot DDoS and database raidsGet a step-by-step process for network mapping and inventory

By

Cyberwarfare as an Element of PRC National Power and its Implications for U.S. National Security

Amazon Price: N/A (as of May 23, 2017 13:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is a plausibility probe that examines cyberwarfare (CyW) issues as they relate to the Sino-U.S. relationship, particularly the People’s Republic of China’s (PRC) CyW capabilities and strategy and associated implications for U.S. national security. It argues that the PRC is investing in CyW capabilities capable of not only robust intelligence collection but also to achieve major military effects in deterrence, limited, and total war scenarios. In light of PRC capabilities and the U.S. reliance on the cyber domain, U.S. vulnerabilities remain significant and must be vigorously addressed.

By

The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals

Rating: 
Amazon Price: $59.95 $38.80 You save: $21.15 (35%). (as of May 23, 2017 03:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals provides practical cyber threat information, guidance, and strategies to lawyers and law firms of all sizes. The guide considers the interrelationship between lawyer and client, establishing what legal responsibilities and professional obligations are owed to the client in the event of a cyber attack. The book provides strategies to help law firms defend against the cyber threat, and also offers information on how to best to respond if breached.

/* */