Cybercrime and the Darknet: Revealing the hidden underworld of the internet

Rating: 
Amazon Price: N/A (as of September 26, 2017 06:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

With the emergence of the internet new forms of crime became possible. From harassment and grooming to fraud and identity theft the anonymity provided by the internet has created a new world of crime of which we all must be aware. The threat of hackers reaches beyond the individual, threatening businesses and even states, and holds worrying implications for the world we live in.

In this enlightening account, Cath Senker unmasks the many guises that cybercrime takes and the efforts of law enforcement to keep pace with the hackers. She reveals the mysterious world of hackers and cybersecurity professionals and reveals a story that is both shocking and surprising. With chapters on political activism and human rights, Senker shows a brighter side of the darknet. For anyone interested in learning more of the world of cyber-criminals and their opponents, this is the perfect starting point.

CyberCrime – A Clear and Present Danger: The CEO’s Guide to Cyber Security

Rating: 
Amazon Price: $49.00 $48.20 You save: $0.80 (2%). (as of September 26, 2017 14:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Is Your Information Easy to Steal? Every business has something it needs to protect. Whether it’s top-secret IP, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren’t doing a very good job of protecting what’s theirs. The digital world is changing fast—and cybercrime is changing with it. Whether it’s a 12-year-old “script kiddie” crippling your website with denial-of-service attacks, or a master hacker targeting a project leader with phishing e-mails, the bad guys have dozens of clever and creative ways to take your assets. Sooner or later, you will come under attack. The future of your organisation depends on making your information hard to steal. But most business owners don’t know where to start. This book is the answer.

Distinguishing Acts of War in Cyberspace: Assessment Criteria, Policy Considerations, and Response Implications

Rating: 
Amazon Price: N/A (as of September 26, 2017 12:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Determining an act of war in the traditional domains of land, sea, and air often involves sophisticated interactions of many factors that may be outside the control of the parties involved. This monograph seeks to provide senior policymakers, decisionmakers, military leaders, and their respective staffs with essential background on this topic as well as introduce an analytical framework for them to utilize according to their needs. It develops this theme in four major sections. First, it presents the characterization of cyberspace to establish terms for broader dialogue as well as to identify unique technical challenges that the cyberspace domain may introduce into the process of distinguishing acts of war. Second, it explores assessment criteria involved with assaying cyber incidents to determine if they represent aggression and possible use of force; and if so, to what degree? Third, it looks at the policy considerations associated with applying such criteria by examining relevant U.S. strategies as well as the strategies of other key countries and international organizations, and considers how nonstate actors may affect U.S. deliberations. Fourth, it examines the influences that course of action development and implementation may have on the assessment of cyberspace incidents, such as reliable situational awareness, global and domestic environment considerations, and options and their related risks and potential consequences. It argues that the United States must also expect and accept that other nations may reasonably apply the criteria we develop to our own actions in cyberspace.

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

Rating: 
Amazon Price: $23.00 $16.89 You save: $6.11 (27%). (as of September 25, 2017 15:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"&#151nerds and visionaries turned freedom fighters&#151teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users

Rating: 
Amazon Price: N/A (as of September 25, 2017 14:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.
Continue reading “Web Application Defender's Cookbook: Battling Hackers and Protecting Users”