Cybercrime and the Darknet: Revealing the hidden underworld of the internet

Rating: 
Amazon Price: N/A (as of November 20, 2017 22:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

With the emergence of the internet new forms of crime became possible. From harassment and grooming to fraud and identity theft the anonymity provided by the internet has created a new world of crime of which we all must be aware. The threat of hackers reaches beyond the individual, threatening businesses and even states, and holds worrying implications for the world we live in.

In this enlightening account, Cath Senker unmasks the many guises that cybercrime takes and the efforts of law enforcement to keep pace with the hackers. She reveals the mysterious world of hackers and cybersecurity professionals and reveals a story that is both shocking and surprising. With chapters on political activism and human rights, Senker shows a brighter side of the darknet. For anyone interested in learning more of the world of cyber-criminals and their opponents, this is the perfect starting point.

The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk

Amazon Price: $69.95 $69.95 (as of November 20, 2017 04:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threatsProvides the essential scientific principles and tools required for this analysisExplores the increasingly important relationship between physical and electronic risk in meaningful technical detailEvaluates technical security systems to illustrate specific risks using concrete examples

Stop Facebook from Spying on You…: And Other Ways to Protect Your Online Privacy

Rating: 
Amazon Price: N/A (as of November 20, 2017 04:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The things you do on the Internet reveal more about you than you might realize. Much of our personal lives—including embarrassing remnants of the past, our spending habits, even our location at any given time—is available for corporations, the government, former spouses, our neighbors, scammers, stalkers and anyone else to uncover. You also might be unintentionally divulging matters you (or others) consider private—to friends…coworkers, clients and employers…marketing companies…and even to competitors, identity thieves and burglars. In STOP FACEBOOK FROM SPYING ON YOU…AND OTHER WAYS TO PROTECT YOUR ONLINE PRIVACY, the editors of Bottom Line/Personal have brought together the leading security experts in American to show you the vital steps to prevent invisible stalkers and online spies from invading your identity…protect your financial accounts…and safeguard your personal privacy. You’ll learn…
* Six ways Facebook could be compromising your private information and what you can do about it.
* The biggest password mistakes…and how to create the safest passwords possible.
* Yes, you CAN block annoying Internet ads
* Shrewd privacy defense when using Wi-Fi.
* How to keep hackers out of your on-line accounts.
* Retail stores are spying on you, too. Do this to find what info they have.
* The ultimate security when someone hacks your e-mail address book.
* The vital phone setting that protects against viruses when you download apps.
* What to do about troubling information about you that you just can’t erase.
* Simple browsing tricks that won’t allow websites or their advertisers to track your digital doings. One key: Click on the secret triangle!
* How to protect yourself from “Friends’” postings that could harm your reputation.
* Cloud storage is vulnerable, too. 4 ways to safeguard your backup. Don’t let them steal your photos, either!
* Beware: Any e-mail sent through your employer’s computer network can be read by your boss—even if you send them from your personal tablet or smartphone. What you must do when sending a private e-mail or text from the workplace.
* How to keep your movements, your purchases and your past private.
* FBI officials can read messages that are more than six months old without a warrant. Two ways to prevent it.
* The free service that stops those irritating robocalls from calling you.
* The essential (and lifesaving!) steps to take now to avoid medical privacy problems later.
* How to totally disappear when you need to evade a dangerous person who is trying to find you.
And much, much more.

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

Rating: 
Amazon Price: $35.00 $35.00 (as of November 20, 2017 05:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.

The Expanding Cyber Threat

Amazon Price: $18.95 $18.95 (as of November 20, 2017 14:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Reports of cyber criminals, “hacktivists” and nation-states accessing sensitive information and disrupting services in both the public and private domains have risen steadily, heightening concerns over the adequacy of cybersecurity measures. Cybersecurity related concerns range from spearfishing attempts and spam, to malware, to illegal or illicit activity on the dark net. More and more cases of successful cyber-attacks are being reported. Financial information, medical records, any and all personal data maintained on computer systems by individuals or by organizations large and small are vulnerable. Mobile, wireless technology presents new opportunities for cyber-attacks. As more devices communicate with one another, from security systems to thermostats, the “Internet of Things” presents a growing target. Social media sites and advertisements also present opportunities for cybersecurity breaches.