CyberWar

Si Vis Pacem, Para Bellum

By

Exploiting Online Games: Cheating Massively Distributed Systems

Rating: 
Amazon Price: $54.99 $45.80 You save: $9.19 (17%). (as of March 22, 2017 04:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system–you should be the first.
"The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys."
–Aviel D. Rubin, Ph.D.
Professor, Computer Science
Technical Director, Information Security Institute
Johns Hopkins University
"Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be."
–Cade Metz
Senior Editor
PC Magazine
"If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge."
–Edward W. Felten, Ph.D.
Professor of Computer Science and Public Affairs
Director, Center for Information Technology Policy
Princeton University
"Historically, games have been used by warfighters to develop new capabilities and to hone existing skills–especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game,' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional.
"Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge."
–Daniel McGarvey
Chief, Information Protection Directorate
United States Air Force
"Like a lot of kids, Gary and I came to computing (and later to computer security) through games. At first, we were fascinated with playing games on our Apple ][s, but then became bored with the few games we could afford. We tried copying each other's games, but ran up against copy-protection schemes. So we set out to understand those schemes and how they could be defeated. Pretty quickly, we realized that it was a lot more fun to disassemble and work around the protections in a game than it was to play it.
"With the thriving economies of today's online games, people not only have the classic hacker's motivation to understand and bypass the security of games, but also the criminal motivation of cold, hard cash. That's a combination that's hard to stop. The first step, taken by this book, is revealing the techniques that are being used today."
–Greg Morrisett, Ph.D.
Allen B. Cutting Professor of Computer Science
School of Engineering and Applied Sciences
Harvard University
"If you're playing online games today and you don't understand security, you're at a real disadvantage. If you're designing the massive distributed systems of tomorrow and you don't learn from games, you're just plain sunk."
–Brian Chess, Ph.D.
Founder/Chief Scientist, Fortify Software
Coauthor of Secure Programming with Static Analysis
"This book offers up a fascinating tour of the battle for software security on a whole new front: attacking an online game. Newcomers will find it incredibly eye opening and even veterans of the field will enjoy some of the same old programming mistakes given brilliant new light in a way that only massively-multiplayer-supermega-blow-em-up games can deliver. w00t!"
–Pravir Chandra
Principal Consultant, Cigital
Coauthor of Network Security with OpenSSL
If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.
From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues surrounding MMORPGs, such as World of Warcraft™ and Second Life®. This no-holds-barred book comes fully loaded with code examples, debuggers, bots, and hacks.
This book covers Why online games are a harbinger of software security issues to come How millions of gamers have created billion-dollar virtual economies How game companies invade personal privacy Why some gamers cheat Techniques for breaking online game security How to build a bot to play a game for you Methods for total conversion and advanced mods
Written by the world's foremost software security experts, this book takes a close look at security problems associated with advanced, massively distributed software. With hundreds of thousands of interacting users, today's online games are a bellwether of modern software. The kinds of attack and defense techniques described in Exploiting Online Games are tomorrow's security techniques on display today.

By

Hackers: Heroes of the Computer Revolution – 25th Anniversary Edition

Rating: 
Amazon Price: N/A (as of March 22, 2017 15:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

By

Cyber-Physical Systems (SEI Series in Software Engineering)

Amazon Price: $69.99 $58.89 You save: $11.10 (16%). (as of March 22, 2017 22:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-Physical Systems (CPS) offer valuable applications in a wide variety of mission-critical and embedded systems applications, in disciplines including computer science, electrical and computer engineering, mechanical engineering, robotics, chemical engineering, civil engineering, nuclear engineering, and bio-medical engineering. This book compiles the newest CPS research and practice in one volume that will be indispensable both for software practitioners in commercial industry and defense, and for researchers and advanced students.

The only book of its kind, Cyber-Physical Systems addresses CPS from three perspectives. First, it presents the challenges and innovations associated with this class of systems as they have arisen in a wide spectrum of application domains. Second, it describes the foundations that underlie CPS solutions, both in terms of what we know and emerging research challenges. Finally, it offers offer guiding principles for all levels, from specific design and analysis advice for practitioners to high-level perspectives that can guide the direction of new innovations.
Read More

By

HTTP Programming Recipes for C# Bots

Rating: 
Amazon Price: $39.99 $39.99 (as of March 23, 2017 00:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Hypertext Transfer Protocol (HTTP) allows information to be exchanged between a web server and a web browser. C# allows you to program HTTP directly. HTTP programming allows you to create programs that access the web much like a human user would. These programs, which are called bots, can collect information or automate common web programming tasks. This book presents a collection of very reusable recipes for C# bot programming. This book covers many topics related to C# HTTP programming. Both secure and insecure HTTP communications are covered, as well as HTTP authentication. Learn to interact with HTTP forms and support both HTTP POST and HTTP GET requests. Collect data from a wide array of HTML constructs, such as tables, and lists. Learn about advanced topics that complicate the life of a bot, such as AJAX and Javascript. Also learn about the ethical use of bots, and when bots should not be used. This book also introduces the Heaton Research Spider. The Heaton Research Spider is an open source spider framework. Using the Heaton Research Spider you can create spiders that will crawl a web site, much like a real spider crawls the web. The Heaton Research Spider is available in both Java and Microsoft Dot Net form.

By

Programming Bots, Spiders, and Intelligent Agents in Microsoft Visual C++

Rating: 
Amazon Price: $49.99 (as of March 22, 2017 20:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Programming Bots, Spiders, and Intelligent Agents in Microsoft Visual C++ showcases the basics of creating autonomous Internet programs such as bots and agents. Besides offering an introduction to writing "intelligent" software, this book provides excellent background material on Internet programming in general.

The first part of the book examines the differences between simple bots (such as Web crawlers) and more advanced, intelligent agents (which communicate more directly with users). The author discusses security and access issues for creating well-behaved bots that Webmasters will find more acceptable.
Read More

/* */