Chinese Cyber Nationalism: Evolution, Characteristics, and Implications

Chinese Cyber Nationalism: Evolution, Characteristics, and ImplicationsChinese Cyber Nationalism offers the first comprehensive examination of the social and ideological movement that mixes Confucian cultural traditions and advanced media technology. Over the past decade, the Internet has increasingly become a communication center, organizational platform, and channel of execution by which Chinese nationalistic causes have been promoted throughout the world.

 

 

 

 

 

 

Price: $34.95

Click here to buy from Amazon

Cyber Commander’s Handbook

Cyber Commander's HandbookThe global reliance on computers, networks and systems continues to grow. As our dependency grows so do the threats that target our military s Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) systems as well as the operational components and electronic controls for our critical infrastructure. Over the past decade we have experienced a substantial rise in the complexity and sophistication of cyber attacks as well as a frightening increase in the impact of some of the attacks. Every computer is a potential cyber weapon waiting to be loaded and used by extremists, criminals, terrorists and rogue nation states. As the world becomes more and more dependent on computers and information technology, the greater the risk of cyber attacks. Government and military leaders now face this fact and our critical systems and infrastructure remain at great risk! This risk has made the ability to defend these critical systems and direct cyber attacks core capabilities required for the modern military. In the age of cyber conflict, leaders need to understand the weapons and strategies used to wage this rapidly evolving type of warfare. This handbook will provide the background needed to understand the new world of cyber warfare, define the tools and techniques for offensive and defensive action, and provide insight into the strategies behind building a dynamic and relevant cyber warfare capability.

Price: $29.95

The Cyber Commander’s eHandbook Version 3

CYBER WARFARE: The Cyber Commander's eHandbook Version 3 (The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3 - 296 Page eBook covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.)

The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3, covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.

Cyber warfare, cyber terrorism, cyber espionage and cyber crime are all growing threats. The 2012 Version 3 of the Cyber Commander’s eHandbook provides the insight needed to understand the new world of cyber warfare, as well as defines the tools and techniques for offensive and defensive cyber action, and provide cyber intelligence needed to understand the strategies behind building a dynamic and relevant cyber warfare capability.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Setting the Stage
Chapter 3 – Cyber Espionage
Chapter 4 – Cyber Terrorism
Chapter 5 – Cyber Intelligence
Chapter 6 – Cyber Weapons
Chapter 7 – EMP Devices
Chapter 8 – Attack Process
Chapter 9 – Critical Infrastructure
Chapter 10 – Cyber Doctrine
Chapter 11 – Cyber Infrastructure
Chapter 12 – New Cyber Warfare Models
Chapter 13 – Conclusion

Portions of this book have been republished in 36 different countries with over 100,000 readers.

Our cyber warfare distance learning program is a great companion product!

Course Information: http://www.amazon.com/gp/product/B003HD06ZG/ref=nosim/cybe0f8-20

Price:

Click here to buy from Amazon

Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical InfrastructureThe worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Price: $99.95

Click here to buy from Amazon

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the InternetOriginally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of  “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots.

With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book!

With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.

Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

Price: $69.95

Click here to buy from Amazon