Cyber Adversary Characterization: Auditing the Hacker Mind

Cyber Adversary Characterization: Auditing the Hacker MindThe wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? “Inside the Mind of a Criminal Hacker” sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind – necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly “know thy enemy” in order to prepare the best defense.

* . The breadth of material in “Inside the Criminal Mind” will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Price: $51.95

Click here to buy from Amazon

Cyber Terrorism: Political And Economic Implications

Cyber Terrorism: Political And Economic ImplicationsCyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, Cyber Terrorism: Political and Economic Implications puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.

Price: $84.95

Click here to buy from Amazon

Terror on the Internet: The New Arena, the New Challenges

Terror on the Internet: The New Arena, the New ChallengesTerrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists’ actual use of the Internet.

In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of websites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on a seven-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures and warns that this cyberwar may cost us dearly in terms of civil rights.

Illustrated with numerous examples taken from terrorist websites, Terror on the Internetoffers the definitive introduction to this emerging and dynamic arena. Weimann lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. A publication of the United States Institute of Peace, distributed by Potomac Books, Inc.

Price: $24.95

Click here to buy from Amazon

Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction)

Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction)The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious “Zero-Day” attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the “inside” of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.

* The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious “Zero-Day” attack will appeal to every corner of the IT community.

* This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists.

* Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Price: $51.95

Click here to buy from Amazon

Cyber Infrastructure Protection

Cyber Infrastructure ProtectionThe Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack of security as a core element in the initial design of these information systems has made common desktop software, infrastructure services, and information networks increasingly vulnerable to continuous and innovative breakers of security. Worms, viruses, and spam are examples of attacks that cost the global economy billions of dollars in lost productivity. Sophisticated distributed denial of service (DDoS) attacks that use thousands of web robots (bots) on the Internet and telecommunications networks are on the rise. The ramifications of these attacks are clear: the potential for a devastating largescale network failure, service interruption, or the total unavailability of service. Yet many security programs are based solely on reactive measures, such as the patching of software or the detection of attacks that have already occurred, instead of proactive measures that prevent attacks in the first place. Most of the network security configurations are performed manually and require experts to monitor, tune security devices, and recover from attacks. On the other hand, attacks are getting more sophisticated and highly automated, which gives the attackers an advantage in this technology race. A key contribution of this book is that it provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It covers not only strategy and policy issues, but it also covers social, legal, and technical aspects of cyber security as well. We strongly recommend this book for policymakers and researchers so that they may stay abreast of the latest research and develop a greater understanding of cyber security issues.

Price: $21.95

Click here to buy from Amazon