CyberWar

Si Vis Pacem, Para Bellum

By

Internet Core Protocols: The Definitive Guide: Help for Network Administrators

Rating: 
Amazon Price: N/A (as of April 25, 2017 14:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If you've ever been responsible for a network, you know that sinking feeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work.

When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protocols has been the Internet RFCs–and they're hardlywhat you want to be reading late at night when your network is down. There hasn't been a good book on the fundamentals of IP networking aimed at network administrators–until now.
Read More

By

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It

Rating: 
Amazon Price: N/A (as of April 25, 2017 04:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

NEW YORK TIMES and WALL STREET JOURNAL BESTSELLER

One of the world’s leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies against you—and how this makes everyone more vulnerable than ever imagined.
Read More

By

SRS – How to make a Pen Test and Hacking Platform

Amazon Price: N/A (as of April 25, 2017 16:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a short book describing the specifications and requirements needed to build your own penetration or hacking platform.

By

Outsourcing War to Machines: The Military Robotics Revolution (Praeger Security International)

Amazon Price: $63.00 $63.00 (as of April 24, 2017 16:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Military robots are already being used in conflicts around the globe and are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization.

• Clearly identifies the links between the technological developments of the most recent innovations and the ethical and legal challenges of the future
Read More

By

Low Tech Hacking: Street Smarts for Security Professionals

Rating: 
Amazon Price: N/A (as of April 25, 2017 15:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.

Contains insider knowledge of what could be your most likely Low Tech threatIncludes timely advice from some of the top security minds in the worldCovers many detailed countermeasures that you can employ to improve your security posture

/* */