CyberWar

Si Vis Pacem, Para Bellum

By

Principles of Cybercrime

Amazon Price: N/A (as of March 29, 2017 03:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

By

Open Source (Enhancement Series Book 1)

Rating: 
Amazon Price: N/A (as of March 28, 2017 17:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“I was literally torn between racing to the next page and simultaneously wanting to linger on the words I was reading, wanting desperately to make them last longer…a truly magnificent novel that you don’t want to miss.” – Les Edgerton, Author of The Genuine, Imitation, Plastic Kidnapping

A source found dead—his skull sawed open by NeuroChip vandals in a Dallas back alley. The sole witness? Reporter Ryker Morris, whose stubborn resistance to a different kind of chip—the globally mandated IDChip—cost him his job, apartment, and credibility. Ryker flees the gruesome scene, a young, homeless technophobe disappearing into a fast-paced city of augmented working stiffs and sexy chipped socialites.
Read More

By

Caliph 2.0

Rating: 
Amazon Price: N/A (as of March 28, 2017 11:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Who is anonymously building a 'Cyber Caliphate'? What will happen if Pakistan’s nuclear weapons get into the hands of radical Islamists?

The hunt is on to catch the mysterious ‘Caliph’ as he ruthlessly manipulates the online social networks in his devious mission to create a nuclear Caliphate – a radical Islamic superpower armed with one of the biggest nuclear arsenals in the world … and an enigmatic Israeli Mossad agent, a Saudi billionaire and a young Russian widow unexpectedly find themselves caught up in a lethal web of cyber conspiracy, money laundering and terrorism which stretches all the way from the sophisticated world of London high society to the hotbeds of radical Islam in the madrassas of the Punjab and connects an ancient castle in southern Spain directly to Pakistan’s nuclear program and right to the heart of Washington D.C.
Read More

By

Information Assurance for Network-Centric Naval Forces

Amazon Price: N/A (as of March 29, 2017 05:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Owing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval 'mission assurance'.

By

Handbook of SCADA/Control Systems Security

Rating: 
Amazon Price: N/A (as of March 28, 2017 13:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.

Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:
Read More

/* */