Internet Censorship: Content-Control Software, Criticism of Facebook, Wikileaks

Internet Censorship: Content-Control Software, Criticism of Facebook, WikileaksChapters: Content-Control Software, History of Wikipedia, Project Chanology, Criticism of Facebook, Wikileaks, Adnan Oktar, Satellite Map Images With Missing or Unclear Data, Youtube Censorship, American Booksellers Foundation for Free Expression V. Strickland, Bomb-Making Instructions on the Internet, Psiphon, Lapsiporno.info, Web Brigades, Bank Julius Baer Vs. Wikileaks Lawsuit, Lester Asheim, Scunthorpe Problem, Political Repression of Cyber-Dissidents, Missbrauchsopfer Gegen Internetsperren, Rebekka Guðleifsdóttir, Jingjing and Chacha, Guillermo Fariñas, Swear Filter, Sabit Ince, Irrepressible.info, Search Engine Image Protection, Medireview, Chester's Guide To: the Controversy, Blogger's Code of Conduct, the Digital Imprimatur, Housewitz, World Day Against Cyber Censorship. Source: Wikipedia. Pages: 269. Not illustrated. Free updates online. Purchase includes a free trial membership in the publisher's book club where you can select from more than a million books without charge. Excerpt: Project Chanology (also called Operation Chanology) is a protest movement against the practices of the Church of Scientology by members of Anonymous, a leaderless Internet-based group that defines itself as ubiquitous. The project was started in response to the Church of Scientology's attempts to remove material from a highly publicized interview with Scientologist Tom Cruise from the Internet in January 2008. The project was publicly launched in the form of a video posted to YouTube, “Message to Scientology”, on January 21, 2008. The video states that Anonymous views Scientology's actions as internet censorship, and asserts the group's intent to “expel the church from the internet”. This was followed by distributed denial-of-service attacks (DDoS), and soon after, black faxes, prank calls, and other measures intended to disrupt the Church of Scientology's operations. In February 2008, the focus of the protest shifted to legal methods.

Price: $34.98

Click here to buy from Amazon

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

What people are saying about Inside Cyber Warfare

“The necessary handbook for the 21st century.”

–Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

“A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war.”

–Jim Stogdill, CTO, Mission Services Accenture

You may have heard about “cyber warfare” in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are “weaponizing” malware to attack vulnerabilities at the application level

Price: $39.99

Click here to buy from Amazon

Seven Deadliest Social Network Attacks

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.



Attacks detailed in this book include:

  1. Social Networking Infrastructure Attacks
  2. Malware Attacks
  3. Phishing Attacks
  4. Evil Twin Attacks
  5. Identity Theft
  6. Cyber Bullying
  7. Physical Threats
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Price: $24.95

Click here to buy from Amazon

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media SitesFacebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to combine social web data, analysis techniques, and visualization to help you find what you've been looking for in the social haystack, as well as useful information you didn't know existed.

Each standalone chapter introduces techniques for mining data in different areas of the social Web, including blogs and email. All you need to get started is a programming background and a willingness to learn basic Python tools.

  • Get a straightforward synopsis of the social web landscape
  • Use adaptable scripts on GitHub to harvest data from social network APIs such as Twitter, Facebook, and LinkedIn
  • Learn how to employ easy-to-use Python tools to slice and dice the data you collect
  • Explore social connections in microformats with the XHTML Friends Network
  • Apply advanced mining techniques such as TF-IDF, cosine similarity, collocation analysis, document summarization, and clique detection
  • Build interactive visualizations with web technologies based upon HTML5 and JavaScript toolkits

“Let Matthew Russell serve as your guide to working with social data sets old (email, blogs) and new (Twitter, LinkedIn, Facebook). Mining the Social Web is a natural successor to Programming Collective Intelligence: a practical, hands-on approach to hacking on data from the social Web with Python.”

–Jeff Hammerbacher, Chief Scientist, Cloudera

“A rich, compact, useful, practical introduction to a galaxy of tools, techniques, and theories for exploring structured and unstructured data.”

–Alex Martelli, Senior Staff Engineer, Google

Price: $39.99

Click here to buy from Amazon