The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests

Rating: 
Amazon Price: N/A (as of June 27, 2017 17:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.

Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked WorldBestselling author Bruce Schneier offers his expert guidance on achieving security on a network.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security

Price: $17.95

Click here to buy from Amazon

COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?

COMPUTER SECURITY: ARE WE PREPARED FOR CYBERWAR?The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and prosper. Ranging from historic Congressional Bills to the most recent Budget of the United States Government, the BiblioGov Project spans a wealth of government information. These works are now made available through an environmentally friendly, print-on-demand basis, using only what is necessary to meet the required demands of an interested public. We invite you to learn of the records of the U.S. Government, heightening the knowledge and debate that can lead from such publications.

Price: $24.75

Click here to buy from Amazon

Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon

 

Embracing the Machines: Drones, Cyberwar, and Coercion without Conquest

Amazon Price: $23.99 $16.31 You save: $7.68 (32%). (as of June 27, 2017 19:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Threats to international peace and security include the proliferation of weapons of mass destructions, rogue nations, and international terrorism. The United States must respond to these challenges to its national security and to world stability by embracing new military technologies such as drones, autonomous robots, and cyber weapons. These weapons can provide more precise, less destructive means to coerce opponents to stop WMD proliferation, clamp down on terrorism, or end humanitarian disasters. Efforts to constrain new military technologies are not only doomed, but dangerous. Most weapons in themselves are not good or evil; their morality turns on the motives and purposes for the war itself. These new weapons can send a strong message without cause death or severe personal injury, and as a result can make war less, rather than more, destructive.