CyberWar

Si Vis Pacem, Para Bellum

By

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Rating: 
Amazon Price: $49.95 $39.28 You save: $10.67 (21%). (as of April 29, 2017 00:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.
Read More

By

The Virtual Battlefield: Perspectives on Cyber Warfare

The Virtual Battlefield: Perspectives on Cyber WarfareAll political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections – Strategic Viewpoints and Technical Challenges & Solutions – and highlights the growing connection between computer security and national security.

IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.

Some of the areas we publish in:

-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences

Price: $152.00

Click here to buy from Amazon

By

Optimal Shop 4 In 1 Network Cable Tester RJ45/RJ11/USB/BNC LAN Cable Cat5 Cat6 Wire Tester

Rating: 
Amazon Price: $15.99 $15.99 (as of April 28, 2017 11:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Buyers Please Note:Optimal Shop PRODUCT,Optimal Shop Is a USA registered trademark. Beware of counterfeit products using Optimal Shop copyrighted photos or descriptions without authorization, and beware of products imitating Optimal Shop branding. Please help fight counterfeiting.

Specifications:
Read More

By

Chinese Cyber Warfare: China’s Cyber Incursions, Strategic Method, Information Warfare Threat – Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing

Amazon Price: N/A (as of April 29, 2017 04:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's Cyber Incursions: A Theoretical Look at What They See and Why They Do It Based on a Different Strategic Method of Thought – This 2013 paper discusses the strategy behind China's cyber activities. The paper examines the Chinese concept of strategy and how it motivates China's cyber actions. These actions take the form of reconnaissance and system sabotage concepts that result in the fulfillment of strategy and in the development of a preemptive and offensive information deterrence disposition. The paper then examines China's response to the recent Mandiant security firm's report that accused the People's Liberation Army of compliance in attacking 115 US companies since 2006. China's next generation of quantum communications research is briefly discussed as well. The conclusions list the author's opinion regarding how to handle the Chinese in the future, through confrontation or dialogue, based on their thought process. This author argues for interceding into Chinese strategic concepts and changing the objective basis behind their cyber activities. China's invasive cyber activities make perfect sense—to them. Through extensive reconnaissance activities, China gains leverage in three areas: its ability to establish a cyber strategic advantageous posture over potential opponents; its ability to identify key nodes in an opponent's network and gain the potential ability to conduct system sabotage against them if necessary; and its ability to develop a cyber deterrence concept of Chinese-make through the construction of a new type of "show of force," such as the identification and revelation of a potential opponent's cyber geography that deters an opponent from acting. Cyber espionage activities are activated due to a specific strategic thought process and resulting paradigm that subsequently uncovers strategic opportunities.

Chinese Information Warfare: A Phantom Menace or Emerging Threat? Mao Tse-tung counseled, "To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds." Few concepts mesh so contextually with Mao than the Chinese approach to Information Warfare (IW). As the People's Republic of China struggles with its national military strategy, IW offers opportunities to win wars without the traditional clash of arms.
Read More

By

RTL-SDR for Everyone: Second Edition 2016 Guide including Raspberry Pi 2

Rating: 
Amazon Price: N/A (as of April 28, 2017 10:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This guide is for:
1) beginners and
2) anyone wishing to maximize RTL dongle performance.
Chapters cover all you need to know for the best reception with $10 RTL-SDR dongles. Wideband and specialist antennas, modding and noise reduction tips aided with images and diagrams.
My blog at http://rtlsdr4everyone.blogspot.com is only a fraction of the know-how in this book – if you want to take performance to the next level, or simply have no time to waste searching for information on the Internet, then this book is for you.
Readable on all platforms: Windows and Mac, Android and iPad, iPhone and Ipod touch.

/* */