Amazon Price: $29.95 $9.70 You save: $20.25 (68%). (as of September 25, 2018 00:46 –
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.
The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.
Continue reading “Steal This Computer Book 4.0: What They Won’t Tell You About the Internet”
Amazon Price: $13.95 $13.95 (as of September 25, 2018 01:31 –
All Empires Collapse Eventually and America is No Exception.
From author Bobby Akart, The Loyal Nine is a gripping novel of an America teetering on the edge of economic and societal collapse. This is book one in the post-apocalyptic fiction series titled The Boston Brahmin.
With social unrest sweeping the country, Europe on the brink of war and the U.S. economy under siege by foreign nations, a new threat emerges. The nation is caught in the crosshairs of a power struggle between wealthy oligarchs and the political leaders who claim to have the country's best interests at heart.
Continue reading “The Loyal Nine: (The Boston Brahmin Book 1) (Volume 1)”
Amazon Price: $40.00 (as of September 25, 2018 09:06 –
A straightforward guide to optimizing information assets in the networked enterprise, this book includes extended, unpublished case studies from major industry with thorough implementation guidance. The text is supported by many tables, flow charts and graphical models.
Amazon Price: $165.00 $63.21 You save: $101.79 (62%). (as of September 24, 2018 19:47 –
This book examines cyberspace superiority in nation-state conflict from both a theoretical and a practical perspective.
This volume analyses superiority concepts from the domains of land, maritime, and air to build a model that can be applied to cyberspace. Eight different cyberspace conflicts between nation states are examined and the resulting analysis is combined with theoretical concepts to present the reader with a conclusion. Case studies include the conflict between Russia and Estonia (2007), North Korea and the US and South Korea (2009) and Saudi Arabia and Iran in the Aramco attack (2012). The book uses these case studies to examine cyberspace superiority as an analytical framework to understand conflict in this domain between nation-states. Furthermore, the book makes the important distinction between local and universal domain superiority, and presents a unique model to relate this superiority in all domains, as well as a more detailed model of local superiority in cyberspace. Through examining the eight case studies, the book develops a rigorous system to measure the amount of cyberspace superiority achieved by a combatant in a conflict, and seeks to reveal if cyberspace superiority proves to be a significant advantage for military operations at the tactical, operational, and strategic levels.
This book will be of much interest to students of cyber-conflict, strategic studies, national security, foreign policy and IR in general.
Amazon Price: $19.95 (as of September 25, 2018 03:50 –
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.
This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:
Continue reading “SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys”