Amazon Price: N/A (as of March 29, 2016 02:11 –
It’s 2009, and America’s economic interest in China is increasing at a rapid pace, along with China’s ambition to become a superpower. A high-profile, joint-venture deal between two U.S. and Chinese cyber technology companies has unforeseen consequences as Will Donovan meets Lu Li—and life as he knows it is never the same again.
Continue reading “Two Tales of the Moon”
Amazon Price: $49.95 $49.95 (as of February 21, 2018 21:33 –
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.
Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.
Continue reading “Low Tech Hacking: Street Smarts for Security Professionals”
Amazon Price: N/A (as of February 22, 2018 09:10 –
Supercomputing research–the goal of which is to make computers that are
ever faster and more powerful–has been at the cutting edge of computer technology
since the early 1960s. Until recently, research cost in the millions of dollars, and
many of the companies that originally made supercomputers are now out of
business.The early supercomputers used distributed computing and parallel processing
to link processors together in a single machine, often called a mainframe.
Exploiting the same technology, researchers are now using off-the-shelf PCs to
produce computers with supercomputer performance. It is now possible to make a
supercomputer for less than $40,000. Given this new affordability, a number of
universities and research laboratories are experimenting with installing such
Beowulf-type systems in their facilities.This how-to guide provides step-by-step
instructions for building a Beowulf-type computer, including the physical elements
that make up a clustered PC computing system, the software required (most of which
is freely available), and insights on how to organize the code to exploit
parallelism. The book also includes a list of potential pitfalls.
Amazon Price: $170.00 $115.95 You save: $54.05 (32%). (as of February 21, 2018 19:56 –
Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.
Continue reading “Cyber Resilience Best Practices”
Amazon Price: $14.95 $12.58 You save: $2.37 (16%). (as of February 21, 2018 15:35 –
IT BEGAN WITH A TANTALIZING,
ANONYMOUS EMAIL: “I AM A SENIOR MEMBER
OF THE INTELLIGENCE COMMUNITY.”
What followed was the most spectacular intelligence breach ever, brought about by one
extraordinary man. Edward Snowden was a 29-year-old computer genius working for the
National Security Agency when he shocked the world by exposing the near-universal mass
surveillance programs of the United States government. His whistleblowing has shaken
the leaders of nations worldwide, and generated a passionate public debate on the dangers
of global monitoring and the threat to individual privacy.
Continue reading “The Snowden Files: The Inside Story of the World's Most Wanted Man (Vintage)”