CyberWar

Si Vis Pacem, Para Bellum

By

The Complete Guide to Shodan: Collect. Analyze. Visualize. Make Internet Intelligence Work For You.

Amazon Price: N/A (as of April 28, 2017 06:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn everything there is to know about Shodan from the founder himself. The book covers all aspects from the website through to the developer API with exercises to help test your understanding.

By

The Hobbyist’s Guide to the RTL-SDR: Really Cheap Software Defined Radio

Rating: 
Amazon Price: N/A (as of April 28, 2017 11:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Available for PC, Mac, smart phones, tablets or Kindle devices

A comprehensive guide to the RTL2832U RTL-SDR software defined radio by the authors of the RTL-SDR Blog. The RTL-SDR is a super cheap software defined radio based on DVB-T TV dongles that can be found for under $20.
Read More

By

Incident Response & Computer Forensics, Third Edition

Rating: 
Amazon Price: N/A (as of April 28, 2017 19:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The definitive guide to incident response–updated for the first time in a decade!

Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind–and remediation strategies for–today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

By

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare

Rating: 
Amazon Price: $27.95 (as of April 29, 2017 01:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.

Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.
Read More

By

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security

Bombs and Bandwidth: The Emerging Relationship Between Information Technology and SecurityA multidisciplinary view of Information Technology as it is used by governments and criminal organizations alike.

Why buy a multi-billion-dollar satellite and go to extreme lengths to try to avoid governmental detection when you can just buy a bit of airtime and send one of several million messages going out at any given time?—from Bombs and Bandwidth

Information Technology (IT) has become central to the way governments, businesses, social movements and even terrorist and criminal organizations pursue their increasingly globalized objectives. With the emergence of the Internet and new digital technologies, traditional boundaries are increasingly irrelevant, and traditional concepts—from privacy to surveillance, vulnerability, and above all, security—need to be reconsidered. In the post-9/11 era of “homeland security,” the relationship between IT and security has acquired a new and pressing relevance. Bombs and Bandwidth, a project of the Social Science Research Council, assembles leading scholars in a range of disciplines to explore the new nature of IT-related threats, the new power structures emerging around IT, and the ethical and political implications arising from this complex and important field.

Contributors include: Ralf Bendrath, Michael Dartnell, Robert J. Deibert, Dorothy Denning, Chris Hables Gray, Rose Kadende-Kaiser, Susan Landau, Robert Latham, Timothy Lenoir, Martin Libicki, Carolyn Nordstrom, Rafal Rohozinski, Marc Rotenberg, Janice Gross Stein, Rachel Yould.

Price: $17.95

Click here to buy from Amazon

/* */