CyberWar

Si Vis Pacem, Para Bellum

By

Seven Deadliest Social Network Attacks

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.



Attacks detailed in this book include:

  1. Social Networking Infrastructure Attacks
  2. Malware Attacks
  3. Phishing Attacks
  4. Evil Twin Attacks
  5. Identity Theft
  6. Cyber Bullying
  7. Physical Threats
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, learn techniques to make your computer and network impenetrable

Price: $24.95

Click here to buy from Amazon

By

Counting from Zero

Counting from ZeroCan a security expert save the Internet from a catastrophic zero day cyber attack by a network of zombie computers, known as a botnet? At what cost?

“Credible and believable, this story is told by a subject matter expert. I could not wait to find out what happened next.”
Vint Cerf, Internet pioneer
“The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters.”
Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption program
Today, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as ‘zero day’ attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner’s knowledge, have become slave computers – remotely controlled ‘zombies’. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks.
Internet security expert Mick O’Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life.
Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick’s attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness?
Unfolding across three continents, the new cybercrime mystery “Counting from Zero” gives a realistic insider’s view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.

Price: $11.99

Click here to buy from Amazon

By

Asymmetric Warfare: Threat and Response in the 21st Century

Asymmetric Warfare: Threat and Response in the 21st CenturyIn recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies.

In this clear and engaging introduction, Rod Thornton unpacks the meaning and significance of asymmetric warfare, in both civilian and military realms, and examines why it has become such an important subject for study. He seeks to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the Wests military superiority can be seriously undermined by asymmetric threats. The book concludes by looking at the ways in which the US, the state most vulnerable to asymmetric attack, is attempting to cope with some new battlefield realities.

This is an indispensable guide to one of the key topics in security studies today.

Price: $26.95

Click here to buy from Amazon

By

Corporate Cyberwar

Corporate CyberwarCorporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Price: $20.00

Click here to buy from Amazon

 Related articles

By

Cyber Adversary Characterization: Auditing the Hacker Mind

Cyber Adversary Characterization: Auditing the Hacker MindThe wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? “Inside the Mind of a Criminal Hacker” sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy’s mind – necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly “know thy enemy” in order to prepare the best defense.

* . The breadth of material in “Inside the Criminal Mind” will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don’t know about the types of adversaries they stand to face.

Price: $51.95

Click here to buy from Amazon

/* */