CyberWar

Si Vis Pacem, Para Bellum

By

Book of Super Secure Online Passwords That You Can Use: Well over a hundred trillion password combinations

Amazon Price: N/A (as of April 28, 2017 16:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

We live in a current internet age where long and random passwords made up of letters, digits and symbols, that are changed on a semi-regular basis, are the only way to keep you safe from cyber-criminals. (Sadly, your pet's name no longer cuts it as a secure password!) Constantly thinking of new passwords every few months can be a real nuisance – especially if you consider the current security advice that you should have a different password for every important account. What a headache!

This book is here to help – it is rammed full with a 1000 random passwords for you to use, passwords that would be almost impossible to crack. When you combine two password segments together, the combinations are so numerous, the number so big, you would not be able to make sense of it! ( Over 10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 ) Safe to say, the passwords in this book are very secure!
Read More

By

Detection of SMS Spam Botnets in Mobile Devices: Design, Analysis, Implementation

Amazon Price: $31.00 $29.59 You save: $1.41 (5%). (as of April 28, 2017 13:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Short Message Service (SMS) is widely used to provide communication between users around the world. In the last years, it has become a lucrative way for cybercriminals to infect mobile devices with botnets and launch malicious attacks without the user's knowledge such as: SMS spam and SMS premium rate fraud. SMS spam is one of the dangerous malicious activities as the user is charged for each sent SMS spam. Existing solutions to this issue are no longer adequate as they are either costly in terms of resources, inefficient, or require user intervention with some knowledge on security. In this book, we design, analyze, and implement a system that detects any attempt to send out malicious SMS spams from the mobile device. The proposed system combines the rule-based and the content-based approaches into one detection process. It achieves good performance in terms of detection time and execution cost, and offers a good tradeoff between resilience against attacks and user interaction with the system. This book is intended for multiple audiences: academic, professional, students, and anyone else who is interested in IT security, and particularly in mobile security and botnet detection.

By

Qualification of SCADA Systems: Incorporating Case Study 1

Qualification of SCADA Systems: Incorporating Case Study 1Terrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.

Price:

Click here to buy from Amazon

By

Encyclopedia of Cyber Warfare

Amazon Price: $89.00 $84.60 You save: $4.40 (5%). (as of April 28, 2017 07:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.

• Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare that enables readers to better understanding of the impact of cyber warfare on modern conflicts
Read More

By

Age of Context: Mobile, Sensors, Data and the Future of Privacy

Rating: 
Amazon Price: N/A (as of April 28, 2017 14:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we’ll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we’re running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

/* */