Amazon Price: $52.00 $52.00 (as of July 23, 2017 14:55 –
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts.
• Provides a detailed overview and thorough analysis of Chinese cyber activities
Continue reading “Cyber Dragon: Inside China's Information Warfare and Cyber Operations (Praeger Security International)”
Amazon Price: N/A (as of July 22, 2017 23:50 –
Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Book appendixes can be downloaded here: http://www.apress.com/9781484200650?gtmf=s
Major topics of the book include the following:
Continue reading “Modern X86 Assembly Language Programming: 32-bit, 64-bit, SSE, and AVX”
Amazon Price: N/A (as of July 23, 2017 12:16 –
Young attorney Pen Wilkinson's life was changed in an instant by a car accident, which killed her young niece and turned Pen into a paraplegic. Four years later, Pen's now-estranged sister calls with horrifying news: Her surviving child, a teenage son named Kenny, has vanished. Pen abandons her preparation for a major trial and travels across the country to search for Kenny, a computer prodigy. She contends with other players, including the FBI, a team of deadly mercenaries, and a hacker backed by Russian thugs, in a frantic search for Kenny, who holds the key to preventing a cyber disaster that could send the world economy into . . . Freefall.
Amazon Price: N/A (as of July 23, 2017 03:01 –
Social media penetrate our lives: Facebook, YouTube, Twitter and many other platforms define daily habits of communication and creative production. This book studies the rise of social media, providing both a historical and a critical analysis of the emergence of major platforms in the context of a rapidly changing ecosystem of connective media. Author Jose van Dijck offers an analytical prism that can be used to view techno-cultural as well as socio-economic aspects of this transformation as well as to examine shared ideological principles between major social media platforms. This fascinating study will appeal to all readers interested in social media.
Amazon Price: $45.95 $41.31 You save: $4.64 (10%). (as of July 22, 2017 16:14 –
Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility. Cyber security is much more than technology Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other known vulnerabilities will still allow hackers to easily break into a system that has not taken account of these factors. CyberWar, CyberTerror, CyberCrime and CyberActivism encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practices to create a culture of cybersecurity awareness within their organizations that complements their technology-based defences. A cyber aware workforce equals better security This second edition takes a deep look at the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology. This enables you to move towards a cyber aware organisational culture that is more robust and better able to deal with a wider range of threats. Related references, as well as recommendations for additional reading, are included at the end of each chapter making this a valuable resource for trainers, researchers and cybersecurity practitioners. Order this book today and see how international standards can boost your cyber defences About the author Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cybersecurity and related privacy services to senior commercial, department of defence and federal government clients working in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is also an Associate Professor at the University of Maryland University College, specializing in courses in Cybersecurity, Cyberterror, IT in Organizations and Ethics in an Internet Society.