During the course of nearly two years, the Center for Technology and National Security Policy (CTNSP), National Defense University (NDU), has conducted extensive research to identify and explore major cyber issues. These activities were performed in response to a request in the 2006 Quadrennial Defense Review (QDR). The result of that research is documented in a book entitled Cyberpower and National Security.
An essential anti-phishing desk reference for anyone with an email address
Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program.
Continue reading “Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails”
REVOLUTION OS tells the inside story of the hackers and computer programmers who rebelled against Microsoft and the idea of proprietary software to create GNU, Linux, and the Open Source movement. Shot on location in Silicon Valley on 35mm film and in widescreen, REVOLUTION OS captures an offbeat group of characters who are three-parts libertarian, two-parts communist, and one-part bad garage band.
Keep Your Screen Confidential and Private
Many things in life are better when shared. Your laptop screen is not among them. This removable MacBook Pro Touch privacy screen keeps your confidential and private information just that — private. This filter mounts to your laptop screen and utilizes privacy technology so only people in front of your computer (or directly behind you) can see your display. Nosy coworkers, competitors, and strangers will only see a black screen.
Continue reading “Easy On/Off Magnetic Privacy Screen for 13 Inch MacBook Pro Touch Bar (NOT Compatible with early 2016 Models)”
Dr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you're just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Live Hacking is straightforward, easy to read, and a reference that you'll use again and again. It's the kind of book you'll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots.