Amazon Price: N/A (as of February 18, 2018 11:59 –
In his sensational new book, Economist senior editor Edward Lucas lays bare the naïveté, hypocrisy and sinister background surrounding Edward Snowden, the fugitive American intelligence contractor now living in Moscow. "The Snowden Operation", demolishes Snowden's claim to be a whistleblower. Drawing on 30 years' experience observing the world of intelligence, Lucas depicts Snowden as at best reckless and naïve, and at worst a saboteur. He stole far more secrets than were necessary to make his case and did so in a deliberately damaging matter. Any benefits to the public debate about issues such as meta-data and encryption are far outweighed by the damage done to the West’s security, diplomacy and economic interests.
“The Snowden Operation” highlights the inconsistencies and puzzles in the account of events given by the “Snowdenistas”. It explains how Russia could have sponsored Snowden’s data heist — the greatest disaster ever to hit Western intelligence, and one whose effects have neatly suited Vladimir Putin’s Russia.
Amazon Price: N/A (as of February 18, 2018 19:55 –
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper is about the Russian military's use of operational art to achieve its strategic objectives during the Russo-Georgian War of August 2008. In this brief war, the Russian military in a quick and decisive campaign overwhelmed Georgian forces to gain control of two breakaway republics, destroyed much of Georgia's armed forces on land and sea, and caused NATO to reconsider its offer of membership to Georgia. This study focuses on the Russian military's present conception of operational art, the relationship between operational art and strategy, and the ability of the Russian armed forces to apply it in a war, a matter of strategic importance to Russia. To accomplish this, this study examines the roots of Soviet thought and practice on operational art and points out the significant changes over time which have affected current thought and practice. The paper analyzes significant aspects of the campaign in Georgia that reflect not only Russia's rich tradition of operational art, but also reflect Western thinking and new Russian thinking. The study examines the future of Russian operational art based on recently announced military reforms and the implications of those reforms on Russian strategy.
For over a century, Russian and Soviet military thinkers have developed the operational art and have produced quality works on the subject. They have prepared for and practiced operational art in a series of wars under widely varying conditions over the last 80 years. These wars are rich in lessons of success and failure in operational art.1 The campaigns and major operations within these wars reveal both the Russian military's conception of operational art as well as their capacity to craft it to achieve strategic objectives at that time. The Russo-Georgian War of August 2008 is no exception. It reflects the current state of operational art within the armed forces of the Russian Federation. Furthermore, the reforms announced immediately following the war by the president and other senior leaders reflect the nation's and military's intentions to improve their capacity to effectively wage campaigns in the near future and present additional insights into some of Russia's strategic objectives.
Amazon Price: N/A (as of February 17, 2018 23:32 –
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.
*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios
Continue reading “Handbook on Securing Cyber-Physical Critical Infrastructure”
Amazon Price: N/A (as of February 18, 2018 06:54 –
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.
Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data
Continue reading “Next Generation Red Teaming”
Amazon Price: N/A (as of February 18, 2018 04:53 –
This book is focused on cyber security danger for the Gulf Cooperation Council's six countries including Saudi Arabia, Qatar, Bahrain, United Arab Emirates, Kuwait, and Oman.
A case on Qatar and cyber security is elaborated.
The book also discusses nations cyber wars, and gives examples of many of the cyber attacks not only on nations, but also on corporations in many countries around the globe.
It also discusses corporate vulnerabilities to cyber attacks not only in advanced countries but also developing countries such as the Gulf Cooperation Council's countries.
The book reveals the different hacking threats and role of CIO/IT managers with regards to cyber security
It also discusses GCC (Gulf Nations) approach to cyber security, and what types of policies they have.
It also proposes a new cyber security approach for the GCC countries using existing models in other advanced countries.
Finally, it presents a roadmap for cyber security for protecting national vital infrastructures for Qatar and GCC countries, and proposes how to set up the military-style command and control cyber security center for such nations.