Amazon Price: N/A (as of June 24, 2017 22:00 –
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world
Amazon Price: N/A (as of June 24, 2017 02:24 –
There has been a great deal of speculation recently concerning the likely impact of the 'Information Age' on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.
Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of 'Information Power' and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.
Amazon Price: N/A (as of June 25, 2017 00:22 –
The purpose of NATO: From Regional to Global Security Provider is to provide a comprehensive analysis of the Alliance’s new vision (the new Strategic Concept) and common security impact – associated tasks to be undertaken within a short and longer term time horizon. The book serves as a relevant and timely study of the most pressing issues facing NATO today – including recent lessons gained. It provides recommendations for consideration and further discussion (i.e., the “what” and the “how” regarding future policy options for the North Atlantic Alliance). The intended audience includes international security policy-makers, government officials, elected leaders, academics, interested professionals, civil society and members of the public.
Specifically, the book focuses on six topic areas. Part I, the Introduction, relates to conceptual and organizational changes, membership expansion and enlargement. Part II consists of emerging security challenges, including terrorism, piracy, homeland threats, cyber defense and information warfare, energy security, non-proliferation and countering WMD. Part III incorporates national and regional challenges such as the Balkans, Iraq, Afghanistan/Pakistan, the Horn of Africa, North Africa and the Middle East.
Continue reading “NATO: From Regional to Global Security Provider”
Amazon Price: N/A (as of June 24, 2017 07:13 –
No Place to Hide is a groundbreaking look at the NSA surveillance scandal, from the reporter who broke the story
Investigative reporter for The Guardian and bestselling author Glenn Greenwald, provides an in-depth look into the NSA scandal that has triggered a national debate over national security and information privacy. With further revelations from documents entrusted to Glenn Greenwald by Edward Snowden himself, this book explores the extraordinary cooperation between private industry and the NSA, and the far-reaching consequences of the government’s surveillance program, both domestically and abroad.
Amazon Price: N/A (as of June 24, 2017 16:12 –
Amazon #1 Hot New Release, Computer Viruses
In this study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service attack, and a Black Energy DDoS attack was captured. The characteristics of the distributed denial of service attacks were used as the independent variables in a quasi-experiment where network traffic was monitored with Snort to detect DDoS packets. The dependent variable for the experiment was false positive alerts for the DDoS packets. The findings showed that the characteristics of a distributed denial of service attack can be used to pro-actively detect botnets through egress monitoring.