Dr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you're just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Live Hacking is straightforward, easy to read, and a reference that you'll use again and again. It's the kind of book you'll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots.
Click here to buy from Amazon
Amazon Price: N/A (as of August 21, 2017 03:11 –
Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.
The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.
Continue reading “Cyber Blockades”
Aos poucos, para enfrentar as necessidades de um mundo globalizado e tomado por redes de informação, o Estado brasileiro viu-se diante de uma série de fatores, em sua própria estrutura, que levou o país a criar uma estratégia, abrigando um modelo de articulação envolvendo todos os órgãos públicos em uma rede complexa, extensiva e intensiva. No livro, o autor comenta os principais passos que levaram o Estado brasileiro a acompanhar o que ocorre no espaço cibernético no país. Com uma linguagem acessível e informações preciosas e didáticas, o autor explica a evolução deste acompanhamento, partindo da sua percepção de que segurança e defesa do espaço cibernético brasileiro, até pouco tempo, não tinha um conjunto de ações e estratégias que validasse o compromisso do país com essa nova etapa de segurança das nações. O livro traz ainda as motivações de cada hacker e os mais diversos tipos de denominações para pessoas que se dedicam, de uma maneira ou de outra, a invadir soberanias institucionais. Raphael Mandarino é um dos primeiros pensadores brasileiros sobre o tema. A análise que desenvolveu neste livro é resultado de anos à frente de atividades que levaram o Brasil a ter um programa estratégico de segurança cibernética. Todo o esforço é para que as iniciativas de segurança da informação sejam uma ação integrada e não isolada.
Price: R$ 45.00
Click here to buy from Livraria Cultura
Dr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard's Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to Taibah University's Strategic Science & Advanced Technology Unit. Dr. Hyacinthe held several positions at County and State levels of the U.S Government in the Information Technology arena. He has been featured in conferences held at the U.S. Naval Postgraduate School, Monterey (author); Defence Academy of the United Kingdom, Shrivenham (invited session Chair); and National Defence College, Helsinki (session Chair). In CYBER WARRIORS AT WAR, he draws on the triangular relationship between technology, law, and Information Age warfare to propose solutions against potential charges of having committed Information Operations (IO) war crimes and/or IO crimes against humanity. According to Dr. Hyacinthe, the success of pre-emptive strikes and decisive military operations depends profoundly upon both reliable human intelligence and the versatile skills of 21st century “cyber warriors” whose IO activities are conducted through modern warfare's pentagonal synchrony – land, sea, air, cyberspace, and outer space. Unfortunately, these operations are commonly effectuated under a legal reasoning that is ambiguous in important ways: a threat to the national security of the United States of America and to the entire international community. Hence, as this Essay argues, the evolution of modern computer systems as weapons of war compels wary jurists to turn to the laws that should govern development and use of lethal information technologies. Further, this Essay examines how certain military operations within Information Warfare (IW) require new legal framework, and recounts specific events involving various types of IW conduct and cyber attack: an interesting exposé to jurists, military personnel, policymakers, and the growing and diverse body of information professionals around the world.
Click here to buy from Amazon
Amazon Price: $33.00 $25.79 You save: $7.21 (22%). (as of August 20, 2017 21:52 –
Cyberspace, where information–and hence serious value–is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.