Seven Deadliest USB Attacks

Seven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series)Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

 

 

 

Attacks detailed in this book include:

  1. USB Hacksaw
  2. USB Switchblade
  3. USB Based Virus/Malicous Code Launch
  4. USB Device Overflow
  5. RAMdump
  6. Pod Slurping
  7. Social Engineering and USB Technology
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Price: $24.95

Click here to buy from Amazon

Computer Attack and Cyberterrorism

Computer Attack and CyberterrorismMany international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a co-ordinated attack against computers in the United States. A cyberattack intended to harm the U.S. economy would likely target computers that operate the civilian critical infrastructure and government agencies. However, there is disagreement among some observers about whether a co-ordinated cyberattack against the U.S. critical infrastructure could be extremely harmful, or even whether computers operating the civilian critical infrastructure actually offer an effective target for furthering terrorists' goals. While there is no published evidence that terrorist organizations are currently planning a co-ordinated attack against computers, computer system vulnerabilities persist world-wide, and initiators of the random cyberattacks that plague computers on the Internet remain largely unknown. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called ‘bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. The growing trend toward the use of more automated attack tools has also overwhelmed some of the current methodologies used for tracking Internet cyberattacks. This book provides background information for three types of attacks against computers (cyberattack, physical attack, and electromagnetic attack), and discusses related vulnerabilities for each type of attack.The book also describes the possible effects of a co-ordinated cyberattack, or computer network attack (CNA), against U.S. infrastructure computers, along with possible technical capabilities of international terrorists. Issues for Congress may include how could trends in cyberattacks be measured more effectively; what is appropriate guidance for DOD use of cyberweapons; should cybersecurity be combined with, or remain separate from, the physical security organization within DHS; how can commercial vendors be encouraged to improve the security of their products; and what are options to encourage U.S. citizens to follow better cybersecurity practices. Appendices to this book describe computer viruses, spyware, and ‘bot networks', and how malicious programs are used to enable cybercrime and cyberespionage. Also, similarities are drawn between planning tactics currently used by computer hackers and those used by terrorists groups for conventional attacks.

Price: $37.00

Click here to buy from Amazon

Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in Cyberspace

Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in CyberspaceAll political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections – Strategic Viewpoints and Technical Challenges & Solutions – and highlights the growing connection between computer security and national security.

IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.

Some of the areas we publish in:

-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences

Price: $69.95

Click here to buy from Amazon

Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them (The Economist)

Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them (The Economist)An in-depth look at Western military technology from the experts at The Economist

Much has been made of the limitations of Western technology when pitted against today's low-tech insurgencies. Modern Warfare, Intelligence and Deterrence: The Technology That is Transforming Themexplores emerging high tech military technologies and places them in the larger context of today's politics, diplomacy, business, and social issues, arguing that, broadly speaking, defense technologies will continue to provide enormous advantages to advanced, Western armed forces.

The book is organized into five parts: land and sea, air and space, the computer factor, intelligence and spycraft, and the road ahead (which examines the coming challenges for Western armies, such as new wars against insurgents operating out of civilian areas). Comprised of a selection of the best writing on the subject from The Economist, each section includes an introduction linking the technological developments to civilian matters.

  • Looks at new and emerging military technologies, including the Panzerfaust-3, a German shoulder-fired heat-seeking antitank missile, the MPR-500, an Israeli precision bomb, Russia's Sizzler, an anti-ship missile that can travel 300 kilometers, and many others
  • Explains how military and intelligence technologies are changing the world
  • Edited by Benjamin Sutherland, a writer for The Economist and expert on the social, political, and business implications of new and disruptive technologies

A fascinating look at Western military technologies, Modern Warfare, Intelligence and Deterrenceis essential reading for business readers and history buffs, alike.

Price: $24.95

Click here to buy from Amazon

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution (text only) by .LevyThis 25th anniversary edition of Steven Levy‘s classic book traces the exploits of the computer revolution's original hackers — those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as “the hacker ethic,” that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

Price:

Click here to buy from Amazon