The Art of War in the Network Age: Back to the Future

Amazon Price: N/A (as of February 19, 2018 05:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory

The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories of classic strategic theory. In the first two chapters, the author establishes the context of the book, coming back to the epistemology of revolution in military affairs and its terminology. The third chapter examines the political bases of strategic action and operational strategy, before the next two chapters focus on historical construction of the process of getting to know your opponents and the way in which we consider information collection. Chapter 6 returns to the process of “informationalization” in the doctrine of armed forces, especially in Western countries, and methods of conducting network-centric warfare. The final chapter looks at the attempts of Western countries to adapt to the emergence of techno-guerrillas and new forms of hybrid warfare, and the resulting socio-strategic outcomes.
Continue reading “The Art of War in the Network Age: Back to the Future”

Practical Hacking Techniques and Countermeasures

Rating: 
Amazon Price: $109.95 $99.36 You save: $10.59 (10%). (as of February 19, 2018 19:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.

Written in a lab manual style, the book begins with the installation of the VMware® Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks.
Continue reading “Practical Hacking Techniques and Countermeasures”

Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!

Rating: 
Amazon Price: $43.95 $9.99 You save: $33.96 (77%). (as of February 19, 2018 11:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes–which include client and network hub devices–up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g ("Wi-Fi”) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.

Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy "homebrew” Wi-Fi networks, both large and small.
Continue reading “Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!”

What Would Google Do?: Reverse-Engineering the Fastest Growing Company in the History of the World

Rating: 
Amazon Price: $15.99 $11.48 You save: $4.51 (28%). (as of February 19, 2018 16:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“Eye-opening, thought-provoking, and enlightening.”
—USA Today

“An indispensable guide to the business logic of the networked era.”
—Clay Shirky, author of Here Comes Everybody
Continue reading “What Would Google Do?: Reverse-Engineering the Fastest Growing Company in the History of the World”

Cyberlaw: The Law of the Internet and Information Technology

Rating: 
Amazon Price: $174.60 $152.77 You save: $21.83 (13%). (as of February 20, 2018 01:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Featuring the most current exploration of cyberlaw, CYBERLAW helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw–from cases to legislation to regulations.