Amazon Price: N/A (as of December 11, 2017 13:04 –
Carl Von Clausewitz described the purpose of war as "the compulsory submission of the enemy to our will." Unlike conventional military conflicts of the past, war in the information age is more a battle of wills than artillery, and doesn't necessarily end with decisive conclusions or clear winners. Cyber warfare between nations is conducted not only without the consent or participation of citizens but often without their knowledge, with little to see in the way of airstrikes and troop movements.
The weapons are information systems, intelligence, propaganda and the media. The combatants are governments, multinational corporations, hackers and whistleblowers. The battlefields are economies, command and control networks, election outcomes and the hearts and minds of populations. As with Russia's bloodless 2014 annexation of the Crimea, the cyberwar is fought before the infantry arrives. Written by a United States intelligence community insider, this book describes the covert aspects of modern wars and the agencies who fund and fight them.
Amazon Price: $18.00 (as of December 11, 2017 21:13 –
The world of communication has been making rapid strides. Information Technology has made this world smaller and more accessible. Perhaps the biggest and the most signifi cant change in IT is the advent of the Internet—with it, transferring information, even across continents and oceans, has become easy and instantaneous. Given the changing scenario, security of information has become an important and inseparable aspect of communication. When the message is received only by the intended recipient, the information is said to have been secure. But, if the information passes through the hands of other people before reaching the intended recipient, the security of the information is considered to have been breached. Information security is essential from both, the online and offl ine points-of-view. Information may be in the form of documents and CDs, stored in databases, or in hard disks. This book deals with the concept of information security, the various measures and counter-measures which one needs to take to make the information systems secure and the laws which govern the concept. Structure of the Book This book is divided into 8 chapters, sequenced to give a better understanding of the concepts. Each chapter contains Learning Objectives, Summary, and Solved and Unsolved Questions to aid comprehension of the concepts. The Glossary at the end of the book adds value to the learning. The last two chapters dealing with Cyber Security and Cyber Laws are accompanied by an appendix each. Important topics and concepts have been covered in great detail in the book—including, but not limited to—access control measures, threats, physical security, intrusion detection, cyber security and cyber crime. The 8 chapters together cover the entire syllabus of GBTU’s Information Security and Cyber Laws paper of the BTech course, making the book a student’s ideal companion. I hope that the readers are benefi ted from my effort in bringing out this book. I sincerely thank Vikas Publishing House for their help in giving the book its fi nal shape. Comments and suggestions from the readers are welcome.
Amazon Price: N/A (as of December 11, 2017 06:18 –
An exhilarating thrill-ride through the underbelly of cyber espionage in the vein of David Ignatius’s The Director and the television series Leverage, CSI: Cyber, and Person of Interest, which follows five iconoclastic hackers who are coerced into serving the U.S. government.
An Anonymous-style rabble rouser, an Arab spring hactivist, a black-hat hacker, an old-school cipherpunk, and an online troll are each offered a choice: go to prison or help protect the United States, putting their brains and skills to work for the government for one year.
Continue reading “Zeroes: A Novel”
Amazon Price: $19.99 $19.99 (as of December 11, 2017 07:32 –
Incredible Performance from 2 Dual-Band Antennas
Alfa's AWUS036AC is designed for those with a serious need for wireless Internet speed. Its 2x dual-band antenna (2.4GHz / 5GHz) setup lets you connect to AC networks at a tire-burning 867Mbps and to N networks up to a whopping 300Mbps. As the new wireless draft 802.11ac technology was developed to optimize the handling of heavy data transfer demands like video streaming and large files syncing, the AWUS036AC is the ultimate tool for taking advantage of the next wave in wireless connectivity. Yet, despite all its power and speed, this little Alfa comes in a really small form factor akin to a USB thumb drive.
Removable Rubber Duck Antennas for Powerful Flexibility
The AWUS036AC ships with 2 detachable 5dBi dual-band dipole antennas. While these are powerful in their own right, the RP-SMA female antenna port can accept antenna upgrades to boost your wireless range and signal even more. Once your antenna of choice is connected, this turns into a standalone Wi-Fi receiver that puts the connected world at your fingertips. Alfa is also seriously invested in your privacy, it includes support for enterprise class wireless security WEP 64-Bit, WEP 128-Bit, WPA-PSK and WPA2-PSK.
Continue reading “Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter w/2x 5dBi External Antennas – 2.4GHz 300Mbps / 5Ghz 867Mbps – 802.11ac & A, B, G, N”
Cyberspace, where information–and hence serious value–is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Click here to buy from Amazon