Terror on the Internet: The New Arena, the New Challenges

Terror on the Internet: The New Arena, the New ChallengesTerrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists’ actual use of the Internet.

In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of websites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on a seven-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures and warns that this cyberwar may cost us dearly in terms of civil rights.

Illustrated with numerous examples taken from terrorist websites, Terror on the Internetoffers the definitive introduction to this emerging and dynamic arena. Weimann lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. A publication of the United States Institute of Peace, distributed by Potomac Books, Inc.

Price: $24.95

Click here to buy from Amazon

Cyberwar, Netwar and the Revolution in Military Affairs (part 1)

Cyberwar, Netwar and the Revolution in Military Affairs (part 1) The end of the Cold War, the Revolution in Military Affairs, 9/11 and the War on Terror have radically altered the nature of conflict and security in the twenty-first century. This book considers how developments in technology could and are effecting the prosecution of war and what the changing nature of warfare means for human rights and civil society.







Price: $100.00

Click here to buy from Amazon

Neuromancer

NeuromancerSPECIAL 20TH ANNIVERSARY EDITION —
THE MOST IMPORTANT AND INFLUENTIAL SCIENCE FICTION NOVEL OF THE PAST TWO DECADES

Twenty years ago, it was as if someone turned on a light. The future blazed into existence with each deliberate word that William Gibson laid down. The winner of Hugo, Nebula, and Philip K. Dick Awards, Neuromancer didn't just explode onto the science fiction scene–it permeated into the collective consciousness, culture, science, and technology.

Today, there is only one science fiction masterpiece to thank for the term “cyberpunk,” for easing the way into the information age and Internet society. Neuromancer‘s virtual reality has become real. And yet, William Gibson's gritty, sophisticated vision still manages to inspire the minds that lead mankind ever further into the future.

Price: $25.00

Click here to buy from Amazon

CyberWar, CyberTerror, CyberCrime

Amazon Price: $45.95 $45.95 (as of February 23, 2018 21:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The world is becoming ever more interconnected and vulnerable, as has been demonstrated by the recent cyber attacks on Estonia. Thus the need for stringent and comprehensive methods for combating cyber crime and terror have never before been needed more than now. CyberWar, CyberTerror, CyberCrime is a straightforward and pragmatic guide. It details how best practices and standards can be used to combat cyber criminals and terrorists. This book is written by Dr. Julie Mehan who is a Principal Analyst for a strategic consulting firm in the State of Virginia. She has been a Government Service employee, a strategic consultant, and an entrepreneur. Until November 2007, she was the co-founder of a small woman-owned company focusing on secure, assured software modernization and security services. She led business operations, as well as the information technology governance and information assurance-related services, including certification and accreditation, systems security engineering process improvement, and information assurance strategic planning and programme management. During previous years, Dr Mehan delivered information assurance and security-related privacy services to senior department of defense, federal government, and commercial clients working in Italy, Australia, Canada, Belgium, and the United States. Information security should not be an after thought. It should be ingrained into the organization's culture. This book will help you create this forward thinking culture using best practices and standards.

Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon