Amazon Price: $129.00 $129.00 (as of April 30, 2017 15:18 –
Cyberwarfare has become an important concern for governmental agencies as well businesses of various types. This timely volume, with contributions from some of the internationally recognized, leaders in the field, gives readers a glimpse of the new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to address problems related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis methodologies with their applications to cyberwarfare, chapters presenting a number of intrusion detection approaches, and chapters dedicated to analysis of possible cyber attacks and their impact. The book provides the readers with a variety of methods and techniques, based on computational intelligence, which can be applied to the broad domain of cyberwarfare.
Amazon Price: $44.95 $38.59 You save: $6.36 (14%). (as of April 30, 2017 06:55 –
Third Edition (2014) Sheds New Light on Open Source Intelligence Collection and Analysis.
Author Michael Bazzell has been well known and respected in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout sixteen chapters of specialized websites, application programming interfaces, and software solutions. Based on his live and online video training at IntelTechniques.com, over 250 resources are identified with narrative tutorials and screen captures.
Amazon Price: $10.99 $10.99 (as of April 29, 2017 18:06 –
The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive… and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona – how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: – Browse the Internet Anonymously – Darkcoins, Darknet Marketplaces & Opsec Requirements – Tor Hidden Servers – How to Not Get Caught – Counter-Forensics the FBI Doesn't Want You to Know About – Windows vs. Linux – Which Offers Stronger Network Security? – Cryptocurrency (Real Bitcoin Anonymity) – Supercookies & Encryption – Preventing Marketers and Debt Collectors From Finding You – How to Protect Your Assets – i.e., How to Be Invisible and even Hide from the Internet itself! – How to Hide Anything Scroll back up and click "Look Inside" and Take Back Your Life Today!
Amazon Price: N/A (as of April 30, 2017 15:18 –
In the course of their 20+-year engineering careers, authors Brian Fitzpatrick and Ben Collins-Sussman have picked up a treasure trove of wisdom and anecdotes about how successful teams work together. Their conclusion? Even among people who have spent decades learning the technical side of their jobs, most haven’t really focused on the human component. Learning to collaborate is just as important to success. If you invest in the "soft skills" of your job, you can have a much greater impact for the same amount of effort.
The authors share their insights on how to lead a team effectively, navigate an organization, and build a healthy relationship with the users of your software. This is valuable information from two respected software engineers whose popular series of talks—including "Working with Poisonous People"—has attracted hundreds of thousands of followers.
Amazon Price: $29.99 (as of April 30, 2017 00:33 –
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.
In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.