Cyber-Physical Attacks: How They Work and How to Protect Against Them

Rating: 
Amazon Price: $49.95 $44.96 You save: $4.99 (10%). (as of August 15, 2018 19:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-Physical Attacks: How They Work and How to Protect Against Them presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.
The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.
Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future. Demonstrates how to identify and protect against cyber-physical threatsWritten for undergraduate students and non-experts, especially physical security professionals without computer science backgroundSuitable for training police and security professionals Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectorsIncludes online resources for those teaching security management

The Wizards Of Langley: Inside The Cia’s Directorate Of Science And Technology

Rating: 
Amazon Price: N/A (as of August 15, 2018 08:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this, the first full-length study of the Directorate of Science and Technology, Jeffrey T. Richelson walks us down the corridors of CIA headquarters in Langley, Virginia, and through the four decades of science, scientists, and managers that produced the CIA we have today. He tells a story of amazing technological innovation in service of intelligence gathering, of bitter bureaucratic infighting, and sometimes, as in the case of its mind-control” adventure, of stunning moral failure. Based on original interviews and extensive archival research, The Wizards of Langley turns a piercing lamp on many of the agency’s activities, many never before made public.

Propaganda, Power and Persuasion: From World War I to Wikileaks (International Library of Historical Studies)

Amazon Price: N/A (as of August 15, 2018 22:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As Philip Taylor has written, ‘The challenge (of the modern information age) is to ensure that no single propaganda source gains monopoly over the information and images that shape our thoughts. If this happens, the war propagandists will be back in business again.’

Propaganda came of age in the Twentieth Century. The development of mass- and multi-media offered a fertile ground for propaganda while global conflict provided the impetus needed for its growth. Propaganda has however become a portmanteau word, which can be interpreted in a number of different ways. What are the characteristic features of propaganda, and how can it be defined?
Continue reading “Propaganda, Power and Persuasion: From World War I to Wikileaks (International Library of Historical Studies)”

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

Rating: 
Amazon Price: N/A (as of August 7, 2017 01:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!”
—Stephen Northcutt, CEO, SANS Institute “Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery “Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It’s technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field.”
—From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World “What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks.”
—Lenny Zeltser, coauthor of Malware: Fighting Malicious Code “Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery “In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis’s real strength is in his ability to show complex topics in an understandable form. By the time he’s done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both.”
—William Stearns, network security expert, www.stearns.org “This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written.”
—Warwick Ford, coauthor of Secure Electronic Commerce

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks.
Continue reading “Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)”

Building Internet Firewalls: Internet and Web Security

Rating: 
Amazon Price: $59.99 $28.25 You save: $31.74 (53%). (as of August 15, 2018 22:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks–and the need to protect both business and personal data–have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Continue reading “Building Internet Firewalls: Internet and Web Security”