Honeypots: The Truth Becomes Impossible to See…

Rating: 
Amazon Price: N/A (as of November 23, 2017 23:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Honeypots have played a prominent role in business, government, and warfare. They maneuver themselves between a beautiful lie and a painful truth. Elizabeth A. Faust, is an elite spy, a Honeypot, a women who uses the power of seduction and deception to get the crucial information she seeks. Both men and women are drawn to her, they become trapped by the allure of her mind, her body, and her scent. The men and women in this story are like you and me, when we give ourselves over, we surrender. In this state we can easily be deceived because the truth becomes impossible to see.

Anatomy of a cyberattack

Rating: 
Amazon Price: N/A (as of November 24, 2017 16:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

They have the power to destroy lives, shut down businesses, and affect every one of us all around the world. They always come unannounced and you hear about them every day. Cyberattacks. The plague of today's technology-reliant world.

Many consider cyberattacks pure computer magic; something too complicated to comprehend. But let me assure you, it's definitely not magic. Cyberattacks do, however, require a certain level of intelligence and computer knowledge. That's why the only way to successfully defend yourself against a cyberattack, is to learn and understand its anatomy. In this book, I explain how a cyberattack looks like from a hacker's perspective so that in case he picks you as his next victim, you're not going to be vulnerable and defenceless.

Cyber Attack

Rating: 
Amazon Price: N/A (as of November 23, 2017 23:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is a thriller, and action packed. It leads the reader through a web of internet intrigue. Many areas of the book give trivia hints to the reader that would allow them to try to reason out the terrorist plot before each plot is finally unravelled and explained by trivia and internet specialists. The book also entails highly trained United States Agents, Secret Anti Subversive Agents known by the acronym SASA, who also enlist the aid of their foreign counterparts, and in some instances enlist the aid of agents that would normally be aggressors and anti U.S. These SASA agents follow and chase the mastermind of the terrorist organization. During their investigations they find themselves in various situations from romance to murder as they pursue the terrorists over several states and other countries.

Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment

Rating: 
Amazon Price: N/A (as of November 24, 2017 20:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Agile Information Security, James Fitzer provides sound guidance and examples on working agility into your information security process, using Scrum as a framework, and lessons learned from the Northern Border Integration Demonstration, a high-profile U.S. Border Security project. You will find advice, examples, and team-building concepts designed to make your information security program more effective by trimming the fat from your security process and learning to thrive on change. More importantly, you'll find ways to return your information security program to the basics: protecting your organization's assets and supporting the enterprise. In a world of increasing bloat and bureaucracy, the simple approach to a "working product" is a welcome breath of fresh air.

Shabahh: The Phantom Terrorist

Rating: 
Amazon Price: N/A (as of November 24, 2017 22:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a fast paced thriller that takes place in cities such as Washington D.C, Pittsburgh, Boston, Houston, San Diego, San Francisco and more. A ruthless terrorist named Shabahh (The Phantom) has plotted and planned well in advance to ensure success in the destruction of the American infrastructure. By carefully planning to attack facilities that will ensure America's financial ruin, and to have the American public living in fear, Shabahh's success is almost certain. America responds by assigning their Super SASA Agent Carl Downey to chase Shabahh with a clear directive. Kill, capture or drive Shabahh out of the country. SASA is a Secret Anti Subversive Agency based in Fort Meade Maryland that has been given a Presidential/Congressional Mandate to enlist all policing authorities to follow their directives to stop the Master Terrorist Shabahh. The matching of wits between Carl Downey and Shabahh is unparalleled. To prevent much of the mayhem, carnage and destruction that Shabahh plots across the country creates challenges for SASA that only a SASA Agent with a mind like Carl Downey's is capable of keeping pace with. The twists , turns and clever escapes by Shabahh along with the brilliant detective work by Agent Carl Downey make for a fascinating story that can only lead to multiple surprises. You will be fascinated by Shabahh's plots, the use of particular explosives, the insight into evil internet sites, and overall cunning. This is a thriller not to be missed. It is a sequel to a previous book involving SASA and Carl Downey called Cyber Attack. This novel however stands on it's own and cleverly references briefly the previous novel but will not be necessary reading to enjoying this.