CyberWar

Si Vis Pacem, Para Bellum

By

Dark Territory: The Secret History of Cyber War

Rating: 
Amazon Price: $28.00 $16.32 You save: $11.68 (42%). (as of April 27, 2017 00:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan.

Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades.
Read More

By

Research Methods for Cyber Security

Amazon Price: $89.95 $74.88 You save: $15.07 (17%). (as of April 26, 2017 09:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field.

Research Methods for Cyber Security begins by showing how cyber security fits amongst other scientific fields. The book shows how to develop a research plan, beginning with starting research with a question, then offers a detailed description of the five approaches to cyber security research; formal theoretical, study, hypothetico-deductive, predictive modeling, and applied research. Each approach concludes with recommended outlines and suggested templates for submission to peer reviewed venues. The book concludes with addressing solutions to key cross-cutting issues within cyber security research.
Read More

By

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Rating: 
Amazon Price: N/A (as of April 26, 2017 10:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Read More

By

Cybersecurity for Everyone: Securing your home or small business network

Rating: 
Amazon Price: $13.99 $13.99 (as of April 26, 2017 11:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. -Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012. – Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants detected daily and more than 30,000 websites exploited daily. These numbers are staggering. – Email Security. Learn how to reduce the amount of SPAM that makes it to your inbox. Improve your email security habits and discover better ways to communicate safely and with privacy. – Internet and Browsing Security. You cannot afford to leave the security of your sensitive information up to your ISP. It is actually easy to apply a layered approach to security and minimize your risk. Learn about your options; then pick and choose what works for you and your situation.

By

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Rating: 
Amazon Price: $16.00 $10.25 You save: $5.75 (36%). (as of April 26, 2017 07:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.

In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Read More

/* */