Battlefield of the Future: 21st Century Warfare Issues – Air Theory for the 21st Century, Cyberwar, Biological Weapons and Germ Warfare, New-Era Warfare

Rating: 
Amazon Price: $9.99 $9.99 (as of October 21, 2017 16:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a book about strategy and war fighting in the midst of a revolution in military affairs as the world moves into the twenty-first century. Its 11 essays examine topics such as military operations against a well-armed rogue state or NASTT (NBC-arming sponsor of terrorism and intervention) state; the potential of parallel warfare strategy for different kinds of states; the revolutionary potential of information warfare; the lethal possibilities of biological warfare; and the elements of an ongoing revolution in military affairs (RMA). The book's purpose is to focus attention on the operational problems, enemy strategies, and threats that will confront US national security decision makers in the twenty-first century. The participating authors are either professional military officers or civilian professionals who specialize in national security issues. Two of the architects of the US air campaign in the 1991 Gulf War have contributed essays that discuss the evolving utility of airpower to achieve decisive results and the lessons that might portend for the future of warfare. In "Principles of War on the Battlefield of the Future," which sets the tone for the book, Dr. Barry Schneider examines how traditional principles of war may have to be reassessed in light of a proliferation of weapons of mass destruction (WMD) among third world states. Regarding the principle of "mass," traditional theory dictated that forces be massed for an offensive breakthrough. But Schneider argues that, against an enemy armed with WMD, dispersed of one's forces may, in fact, be more prudent, and fighting by means of "disengaged combat" prior to a decisive strike may be necessary. This requires high coordination and "superior targeting and damage assessment intelligence, combined with superior high-tech weapons." Still, the United States and its allies would not likely be able to dominate a future battlefield even with advanced conventional arms if they did not have close-in air bases to operate from and thereby to achieve air dominance over the battle space. Therefore, while it sounds good, striking from outside the enemy's range is not a real option for long if the enemy is mounting a ground campaign that is closing in on vital areas. Local air, sea, and ground power will be needed to contain the adversary forces and roll them back. This means local air bases and seaports must be available and protected. Contents * Introduction * 1 Principles of War for the Battlefield of the Future * Barry R. Schneider * Overview: New Era Warfare? A Revolution In Military Affairs? * 2 New-Era Warfare * Gen Charles A. Horner, USAF, (Ret.) * 3 The Revolution in Military Affairs * Jeffrey McKitrick, James Blackwell, Fred Littlepage, George Kraus, Richard Blanchfield and Dale Hill * Overview: Future Airpower and Strategy Issues * 4 Air Theory for the Twenty-First Century * Col John A. Warden III, USAF * 5 Parallel War and Hyperwar: Is Every Want a Weakness? * Col Richard Szafranski, USAF * Overview: Information Warfare Issues * 6 Information War – Cyberwar – Netwar * George Stein * 7 Information Warfare: Impacts and Concerns * Col James W. McLendon, USAF * Overview: Biological Warfare Issues * 8 The Biological Weapon: A Poor Nation's Weapon of Mass Destruction * Lt Col Terry N. Mayer, USAF * 9 Twenty-First Century Germ Warfare * Lt Col Robert P. Kadlec, MD, USAF * 10 Biological Weapons for Waging Economic Warfare * Lt Col Robert P. Kadlec, MD, USAF * 11 On Twenty-First Century Warfare * Lawrence E. Grinter and Dr. Barry R. Schneider

CyberWar, CyberTerror, CyberCrime

Amazon Price: $45.95 $33.67 You save: $12.28 (27%). (as of October 22, 2017 09:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The world is becoming ever more interconnected and vulnerable, as has been demonstrated by the recent cyber attacks on Estonia. Thus the need for stringent and comprehensive methods for combating cyber crime and terror have never before been needed more than now. CyberWar, CyberTerror, CyberCrime is a straightforward and pragmatic guide. It details how best practices and standards can be used to combat cyber criminals and terrorists. This book is written by Dr. Julie Mehan who is a Principal Analyst for a strategic consulting firm in the State of Virginia. She has been a Government Service employee, a strategic consultant, and an entrepreneur. Until November 2007, she was the co-founder of a small woman-owned company focusing on secure, assured software modernization and security services. She led business operations, as well as the information technology governance and information assurance-related services, including certification and accreditation, systems security engineering process improvement, and information assurance strategic planning and programme management. During previous years, Dr Mehan delivered information assurance and security-related privacy services to senior department of defense, federal government, and commercial clients working in Italy, Australia, Canada, Belgium, and the United States. Information security should not be an after thought. It should be ingrained into the organization's culture. This book will help you create this forward thinking culture using best practices and standards.

The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests

Rating: 
Amazon Price: N/A (as of October 22, 2017 07:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!”

—Stephen Northcutt, CEO, SANS Institute

“Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery

“Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It’s technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field.”
—From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World

“What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks.”
—Lenny Zeltser, coauthor of Malware: Fighting Malicious Code

“Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery

“In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis’s real strength is in his ability to show complex topics in an understandable form. By the time he’s done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both.”
—William Stearns, network security expert, www.stearns.org

“This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written.”
—Warwick Ford, coauthor of Secure Electronic Commerce

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks.

For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.

Important features of this new edition include

  • All-new “anatomy-of-an-attack” scenarios and tools
  • An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more
  • Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking”
  • New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit
  • New information on dangerous, hard-to-detect, kernel-mode rootkits

Price: $69.99

Click here to buy from Amazon

The Chinese Information War: Espionage, Cyberwar, Communications Control and Related Threats to United States Interests

Rating: 
Amazon Price: $29.95 $29.95 (as of October 22, 2017 06:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is about a cyberwar with China. This new type of war, says the author, is China's effort at bending another country's will to its own. It is clever, broadly applied, successful, and aimed directly at the United States. This war is neither conventional nor accidental. The U.S. military is at a disadvantage because it is part of a system of government that is democratic, decentralized and mostly separated from American businesses. This system has served the country well but is not a path that China sees as worth following. This book is not a "how to" book of strategies that might be developed to fight a cyberwar. It is a way to grasp and categorize what the Chinese are already doing, to make sense of it. Until the U.S. sees itself as in a war, it cannot begin to effectively prosecute it.