Terrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists’ actual use of the Internet.
In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of websites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on a seven-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures and warns that this cyberwar may cost us dearly in terms of civil rights.
Illustrated with numerous examples taken from terrorist websites, Terror on the Internetoffers the definitive introduction to this emerging and dynamic arena. Weimann lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. A publication of the United States Institute of Peace, distributed by Potomac Books, Inc.
Click here to buy from Amazon
Amazon Price: $69.95 $47.56 You save: $22.39 (32%). (as of August 17, 2017 06:20 –
This authoritative Handbook provides a clear and detailed introduction to cyber crime, offering you an effective operational guide to the complexities and challenges of investigating cyber-related crimes.
Written by a team of cyber crime experts, this unique book provides all police practitioners and partners with an operational reference and resource addressing all manner of cyber crime threats, including online anti-social behavior, hate crime, organized cyber crime, fraud, online child exploitation, and cyber terrorism and the terrorist use of the Internet. Presented in three main parts, Part 1 offers an overview of the different types of cyber crime along with explanations of the national structures and strategies in place to combat them, as well as case studies and scenarios. Part 2 offers practical guidance on the different categories of cyber crime and features contributions from organizations such as the National Crime Agency, and Part 3 covers the key legislation, police powers and points to prove relevant to each key category of offending and is written by the Police National Legal Database. All sections in Part 3 are accompanied by explanatory notes and related case law, ensuring quick and clear translation of cyber crime powers and provisions.
Continue reading “Blackstone's Handbook of Cyber Crime Investigation”
Amazon Price: $49.99 $39.06 You save: $10.93 (22%). (as of August 17, 2017 10:06 –
Machine learning has become an integral part of many commercial applications and research projects, but this field is not exclusive to large companies with extensive research teams. If you use Python, even as a beginner, this book will teach you practical ways to build your own machine learning solutions. With all the data available today, machine learning applications are limited only by your imagination.
You’ll learn the steps necessary to create a successful machine-learning application with Python and the scikit-learn library. Authors Andreas Müller and Sarah Guido focus on the practical aspects of using machine learning algorithms, rather than the math behind them. Familiarity with the NumPy and matplotlib libraries will help you get even more from this book.
Continue reading “Introduction to Machine Learning with Python: A Guide for Data Scientists”
Experts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.
Click here to buy from Amazon
Amazon Price: N/A (as of September 24, 2016 16:41 –
As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses’ network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.