Corporate Cyberwar

Corporate CyberwarCorporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Price: $20.00

Click here to buy from Amazon

 Related articles

Surviving Cyberwar

Surviving CyberwarMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.

 

Price: $65.00

Click here to buy from Amazon

Chained Exploits: Advanced Hacking Attacks from Start to Finish

Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits–both how to perform them and how to prevent them.

Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering.

Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures— both technical and human. Coverage includes:

  • Constructing convincing new phishing attacks
  • Discovering which sites other Web users are visiting
  • Wreaking havoc on IT security via wireless networks
  • Disrupting competitors’ Web sites
  • Performing–and preventing–corporate espionage
  • Destroying secure files
  • Gaining access to private healthcare records
  • Attacking the viewers of social networking pages
  • Creating entirely new exploits
  • and more

Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council’s Instructor of Excellence Award.

Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council’s Instructor of Excellence Award.

Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad.

informit.com/aw

Cover photograph © Corbis /

Jupiter Images

$49.99 US

$59.99 CANADA

Price: $49.99

Click here to buy from Amazon

Quantum Attacks on Public-Key Cryptosystems

Quantum Attacks on Public-Key CryptosystemsThe cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies on the three infeasible number-theoretic problems; no polynomial-time algorithms exist for these three problems. However, quantum polynomial-time algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems introduces the basic concepts and ideas of quantum computing and quantum computational complexity. The book discusses quantum algorithms for IFP, DLP and ECDLP, based on Shor's seminal work. It also presents some possible alternative post-quantum cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.

This book is intended for graduate-level students and researchers in computing science, mathematics and digital communications as a second text or reference book. Cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

Price: $99.00

Click here to buy from Amazon

Analysis and Evaluation of Denial of Service attacks: on IEEE 802.11 Networks

Analysis and Evaluation of Denial of Service attacks: on IEEE 802.11 NetworksDespite their popularity and wider deployment, IEEE 802.11 WLANs have been found to be vulnerable to security threats soon after their emergence requiring adoption of security measures. However, the introduced security measures didn't provide solutions for Denial of Service (DoS) attacks. This book characterizes the DoS attacks based on their ease of applicability and the degree of severity they introduce, and evaluates countermeasures for efficiency and effectiveness in defending against the attacks. Among various DoS attacks, Authentication Request Flooding (AuthRF) and Association Request Flooding (AssRF), which are practical and needing lesser effort to cause damage, were selected for study using OMNET++ simulation environment embedding INET Framework. Designs and models have been developed for the selected attacks and for two versions of defenses: countermeasure and enhanced countermeasures. The studied attacks, AuthRF and AssRF, required less effort and caused severe damage. Both versions of defenses, Countermeasure and Enhanced countermeasure, are effective although they incur delay.

Price: $60.00

Click here to buy from Amazon