Spies Against Armageddon

Spies Against ArmageddonA powerful, vivid history of Israel's intelligence services from the country's independence in 1948, right up to Stuxnet and the current Middle East crises, describing the roots of both the triumphs and the screw-ups. Chapter 1 is titled “Stopping Iran,” focused on nuclear threats, and then readers are taken through the entire history.

Price: $16.99

Click here to buy from Amazon

 

 

 

 

National Strategy of Defense – Peace and Security for Brazil

National Strategy of Defense - Peace and Security for BrazilBrazil is a peaceful country, by tradition and conviction. It lives in peace with its neighbors. It runs its international affairs, among other things, adopting the constitutional principles of non-intervention, defense of peace and peaceful resolution of conflicts. This pacifist trait is part of the national identity, and a value that should be preserved by the Brazilian people.
Brazil – a developing country – shall rise to the first stage in the world neither promoting hegemony nor domination. The Brazilian people are not willing to exert their power on other nations. They want Brazil to grow without reigning upon others.
This is perhaps the reason why Brazil has never conducted a wide discussion about its own defense affairs throughout its history. Periodically, governments used to authorize the acquisition or production of new defense products, and introduced specific reforms in the Armed Forces. However, a national strategy of defense has never been proposed to systematically guide the reorganization and reorientation of the Armed Forces; the organization of the defense industry in order to ensure the operational autonomy of the three service branches: the Navy, the Army and the Air Force; and the policies for the composition of their troops, moreover reconsidering the Mandatory Military Service.
However, if Brazil is willing to reach its deserved spot in the world, it will have to be prepared to defend itself not only from aggressions, but equally from threats.
Intimidation overrides good faith in the world where we live. Nothing substitutes the engagement of the Brazilian people in the debate and construction of their own defense.

The 6th National Strategy of Defense guideline:

“To strengthen three strategically important sectors: cybernetics, space and nuclear. This process of strengthening will ensure the fulfillment of the concept of flexibility. As a result of their own nature, these sectors transcend the border line between development and defense, between the civilian and the military. Both space and cybernetics sectors will, together, enable that the capacity to see one’s own country do not depend on foreign technology, and that the Armed Forces, together, can network supported by a monitoring system also space-based. Brazil is committed – as per the Federal Constitution and the Treaty on the Non-Proliferation of Nuclear Weapons – to the strictly peaceful use of nuclear energy. However, Brazil also asserts its strategic need to develop and master nuclear technology. The country needs to ensure the balance and the versatility of its energy matrix and advance in areas such as agriculture and health, which may benefit from nuclear energy technology. And carry out, among other initiatives that require technological independence in terms of nuclear energy, the nuclear-propelled submarine project.”

Download Estratégia Nacional de Defesa – Paz e segurança para o Brasil
Download National Strategy of Defense – Peace and security for Brazil
Download Estrategia Nacional de Defensa – Paz y seguridad para Brasil
Download Stratégie Nationale de Défense – Paix et Sécurité au Brésil

The Cyber Commander’s eHandbook Version 3

CYBER WARFARE: The Cyber Commander's eHandbook Version 3 (The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3 - 296 Page eBook covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.)

The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3, covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.

Cyber warfare, cyber terrorism, cyber espionage and cyber crime are all growing threats. The 2012 Version 3 of the Cyber Commander's eHandbook provides the insight needed to understand the new world of cyber warfare, as well as defines the tools and techniques for offensive and defensive cyber action, and provide cyber intelligence needed to understand the strategies behind building a dynamic and relevant cyber warfare capability.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Setting the Stage
Chapter 3 – Cyber Espionage
Chapter 4 – Cyber Terrorism
Chapter 5 – Cyber Intelligence
Chapter 6 – Cyber Weapons
Chapter 7 – EMP Devices
Chapter 8 – Attack Process
Chapter 9 – Critical Infrastructure
Chapter 10 – Cyber Doctrine
Chapter 11 – Cyber Infrastructure
Chapter 12 – New Cyber Warfare Models
Chapter 13 – Conclusion

Portions of this book have been republished in 36 different countries with over 100,000 readers.

Our cyber warfare distance learning program is a great companion product!

Course Information: http://www.amazon.com/gp/product/B003HD06ZG/ref=nosim/cybe0f8-20

Price:

Click here to buy from Amazon

Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Machine Learning in Cyber Trust: Security, Privacy, and ReliabilityMany networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover what types of learning methods are at their disposal, summarizing the state-of-the-practice in this significant area, and giving a classification of existing work.

Those working in the field of cyber-based systems, including industrial managers, researchers, engineers, and graduate and senior undergraduate students will find this an indispensable guide in creating systems resistant to and tolerant of cyber attacks.

Price: $129.00

Click here to buy from Amazon

The Undeclared War: Class Conflict in the Age of Cyber Capitalism

The Undeclared War: Class Conflict in the Age of Cyber CapitalismDr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard's Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to Taibah University's Strategic Science & Advanced Technology Unit. Dr. Hyacinthe held several positions at County and State levels of the U.S Government in the Information Technology arena. He has been featured in conferences held at the U.S. Naval Postgraduate School, Monterey (author); Defence Academy of the United Kingdom, Shrivenham (invited session Chair); and National Defence College, Helsinki (session Chair). In CYBER WARRIORS AT WAR, he draws on the triangular relationship between technology, law, and Information Age warfare to propose solutions against potential charges of having committed Information Operations (IO) war crimes and/or IO crimes against humanity. According to Dr. Hyacinthe, the success of pre-emptive strikes and decisive military operations depends profoundly upon both reliable human intelligence and the versatile skills of 21st century “cyber warriors” whose IO activities are conducted through modern warfare's pentagonal synchrony – land, sea, air, cyberspace, and outer space. Unfortunately, these operations are commonly effectuated under a legal reasoning that is ambiguous in important ways: a threat to the national security of the United States of America and to the entire international community. Hence, as this Essay argues, the evolution of modern computer systems as weapons of war compels wary jurists to turn to the laws that should govern development and use of lethal information technologies. Further, this Essay examines how certain military operations within Information Warfare (IW) require new legal framework, and recounts specific events involving various types of IW conduct and cyber attack: an interesting exposé to jurists, military personnel, policymakers, and the growing and diverse body of information professionals around the world.

Price: $35.17

Click here to buy from Amazon