Amazon Price: $20.72 $15.95 (as of April 28, 2017 06:33 –
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.
Amazon Price: N/A (as of April 28, 2017 14:25 –
You already have the tools to make a threat intel program! With the growing number of threats against companies, threat intelligence is becoming a business essential. This book will explore steps facts and myths on how to effectively formalize and improve the intel program at your company by:
•Separating good and bad intelligence
•Creating a threat intelligence maturity model
•Quantifying threat risk to your organization
•How to build and structure a threat intel team
•Ways to build intel talent from within
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you’re concerned about Internet security, national security, or even personal security. As recent events have proven, you don’t have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It’s up to date and comprehensive, with:
* Clear, concise, and accurate definitions of more than 875 hacker terms
* Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools
* Entries covering general terms, legal terms, legal cases, and people
* Suggested further reading for definitions
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today’s Fear of a Cyber-Apocalypse Era. An appendix entitled “How Do Hackers Break into Computers?” details some of the ways crackers access and steal information.
Knowledge is power. With this dictionary, you’re better equipped to be a white hat and guard against cybercrime.
Click here to buy from Amazon
Amazon Price: N/A (as of April 29, 2017 03:58 –
Celebrants and skeptics alike have produced valuable analyses of the Internet’s effect on us and our world, oscillating between utopian bliss and dystopian hell. But according to Robert W. McChesney, arguments on both sides fail to address the relationship between economic power and the digital world.
McChesney’s award-winning Rich Media, Poor Democracy skewered the assumption that a society drenched in commercial information is a democratic one. In Digital Disconnect McChesney returns to this provocative thesis in light of the advances of the digital age, incorporating capitalism into the heart of his analysis. He argues that the sharp decline in the enforcement of antitrust violations, the increase in patents on digital technology and proprietary systems, and other policies and massive indirect subsidies have made the Internet a place of numbing commercialism. A small handful of monopolies now dominate the political economy, from Google, which garners an astonishing 97 percent share of the mobile search market, to Microsoft, whose operating system is used by over 90 percent of the world’s computers. This capitalistic colonization of the Internet has spurred the collapse of credible journalism, and made the Internet an unparalleled apparatus for government and corporate surveillance, and a disturbingly anti-democratic force.