The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online

Rating: 
Amazon Price: N/A (as of August 22, 2017 04:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A groundbreaking exploration of how cyberspace is changing the way we think, feel, and behave

Mary Aiken is the world’s leading expert in forensic cyberpsychology—a discipline that combines psychology, criminology, and technology to investigate the intersection where technology and human behavior meet. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, security, and our perception of the world. Cyberspace is an environment full of surveillance, but who is looking out for us? The Cyber Effect offers a fascinating and chilling look at a future we can still do something about.
Continue reading “The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online”

WiebeTech UltraDock v5 Drive Dock

Rating: 
Amazon Price: N/A (as of August 22, 2017 02:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

The WiebeTech UltraDock v5 connects to any bare hard drive-IDE/PATA, SATA, or other types with optional adapters-so you can access, read, set up, diagnose, or repair it. An intuitive LCD and menu makes it convenient to view drive information and perform tasks. You can even detect, remove, create, or modify Host Protected Areas (HPAs) and Device Configuration Overlays (DCOs). The UltraDock v5 puts drive information at your fingertips. Quickly access selected important SMART data such as hours used, number of power cycles, and disk health. It can also display the model and serial number reported by the drive's firmware. The UltraDock v5 has USB 3.0/2.0, eSATA, FireWire 400, and FireWire 800 connections. But if you need to work with a non-standard drive, or encrypt one, there are a variety of adapters available for additional flexibility.

USAF Cyberspace Operations Doctrine Document – AFDD 3-12

USAF Cyberspace Operations Doctrine Document - AFDD 3-12AFDD 3-12 is the US Air Force’s foundational doctrine publication for Air Force operations in, through, and from the cyberspace domain. It defines Cyberspace Superiority and speaks to US Air Force support of maintaining Cyberspace Superiority, a common military function.

“Today, we live in a globally-networked society that is increasingly dependent upon cyberspace access and security. Our ability to gain and maintain superiority in cyberspace has become essential to our ability to deliver global reach, power, and vigilance. As an integral member of the joint warfighting team, the Air Force is committed to growing, sustaining, and presenting highly skilled and well-equipped forces to joint force commanders who can deliver decisive effects in, from, and through cyberspace, while assuring our mission against an asymmetric cyber threat.

Freedom of action in the cyberspace domain enables our command, control, communication, computers, intelligence, surveillance, and reconnaissance capabilities. Our modern defenses, industrial base, and global commerce, as well as that of our nation’s enemies, depend on free use of land, sea, air, space, and cyberspace. Leverage in cyberspace affords influence and control across all other domains. This leverage increases our forces’ access, speed, reach, stealth, and precision.

Controlling the portions of cyberspace integral to our mission is a fundamental prerequisite to effective operations across the range of military operations. While we appreciate the power that cyber-enabled capabilities add, we also maintain a healthy respect for the asymmetric power that cyberspace affords our adversaries. We must maintain a constant commitment to educate, train, and equip our Airman to prevail in the contested domain of cyberspace.

In the past decade, technological advances have provided the means to generate decisive and magnified effects in domains that traditionally could only be achieved via kinetic means. We must continually adapt our operating concepts to leverage emerging cyberspace capabilities to ensure the Air Force maintains the decisive advantage over our adversaries.”

MAURICE H. FORSYTH
Major General, USAF
Commander, LeMay Center for Doctrine
Development and Education

Download AFDD 3-12

 

Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station for 2.5 or 3.5in HDD, SSD [Support UASP and 4TB] (EC-DFLT)

Rating: 
Amazon Price: $22.99 $22.99 (as of August 22, 2017 23:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Description:

The Sabrent EC-DFLT SATA Lay-Flat Docking Station supports the direct insertion of Desktop 2.5"/3.5" SATA Hard Drives. It is a caseless solution that makes swapping hard drives easier than ever before. Plus, now you can take advantage of the lightening speed of USB 3.0 to quickly transfer files up to 5 Gbps!
Continue reading “Sabrent USB 3.0 to SATA External Hard Drive Lay-Flat Docking Station for 2.5 or 3.5in HDD, SSD [Support UASP and 4TB] (EC-DFLT)”

Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress

Amazon Price: N/A (as of August 22, 2017 21:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

AN ACT

To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.
Continue reading “Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress”