In BIT WARS: Hacking Report: Top Hacks and Attacks of 2014, Thomas Hyslip presents the who, what, when, where, why, and how, of the top hacks of 2014. 2014 was a year to be remembered in hacking. Sony was attacked by North Korea, Six Chinese military officers were indicted for hacking US companies, and the Point of Sale Malware attacks continued to compromise million of credit and debit cards. With no end in sight, BIT WARS provides a concise overview of the years top hacks and attacks.
National bestseller with over 175,000 copies sold!
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.
Continue reading “Steal This Computer Book 4.0: What They Won't Tell You About the Internet”
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
—Garth Bruen, Project KnujOn Designer
Continue reading “Crimeware: Understanding New Attacks and Defenses”
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”
The Global Internet in a Nutshell begins with a review of the history, technology, and competing theories of the Internet that enables a deeper understanding of case law and statutory developments discussed in the substantive chapters. It briefly covers the history of the Internet through the rapidly evolving Web 3.0, competing theories of Internet governance, cyber jurisdiction and enforcement of judgments, choice and conflicts of law, cybertorts, online contracting and licensing, the protection of online intellectual property assets, the protection of online privacy, criminal liability for Internet activity, and European Community directives such as the E-Commerce Directive, Brussels Regulation, and Rome I Regulation. The second edition presents a comprehensive review of cybertort and cybercrime developments including foreign cases. Each chapter of this revised edition reviews statutory and caselaw developments from the European Union as well as other foreign countries.