SEO Black Book – A Guide to the Search Engine Optimization Industry’s Secrets (The SEO Series 1)

Rating: 
Amazon Price: N/A (as of January 22, 2018 13:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An SEO Guide for 2015 :: Learn the Real Mechanics behind Search Engine Optimization
Search Engine Optimization has evolved. We saw that evolution begin in 2011, when Google first began its release of the now-infamous algorithm adjustments. It started with Google Panda in February of that same year, which aided in killing off low-quality content that didn't abide by Google's Webmaster Guidelines.

But it didn't end there…
Continue reading “SEO Black Book – A Guide to the Search Engine Optimization Industry's Secrets (The SEO Series 1)”

Open Source Intelligence (OSINT) Done Right: An Indictment of 25 years of expensive passive failure.

Rating: 
Amazon Price: N/A (as of January 22, 2018 20:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This briefing has been funded and approved for delivery in its present form, in April 2016, to the military, police, and national intelligence services of Denmark. It was also presented in Norway, but less formally. As NATO and a number of countries “re-think” Open Source Intelligence (OSINT), this briefing and the related white paper, should help focus on the essentials that have been neglected for the past quarter century.

It is nothing less than an indictment of 25 years of expensive passive failure associated with the mis-direction of OSINT away from active human sourcing as I originally envisioned, toward passive online searching that is, as one study recently concluded, over 80% absolute garbage.
Continue reading “Open Source Intelligence (OSINT) Done Right: An Indictment of 25 years of expensive passive failure.”

Botnets (SpringerBriefs in Cybersecurity)

Amazon Price: N/A (as of January 23, 2018 06:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities.

Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts.
Continue reading “Botnets (SpringerBriefs in Cybersecurity)”

Information Security: An Analysis of Networks and Perimeter Defenses within a Military Base

Amazon Price: N/A (as of January 23, 2018 07:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Information security is paramount to reducing unauthorized access to sensitive information, achieving mission success, and could very well save soldiers’ lives. Part I and II will follow the history that developed the network and that molded it to its current state. Additionally, Part III will describe the potential demands and threats towards future military networks.