Amazon Price: $12.00 $10.80 You save: $1.20 (10%). (as of September 25, 2017 15:35 –
While many books explain the how of bitcoin, The Internet of Money delves into the why of bitcoin. Acclaimed information-security expert and author of Mastering Bitcoin, Andreas M. Antonopoulos examines and contextualizes the significance of bitcoin through a series of essays spanning the exhilarating maturation of this technology.
Bitcoin, a technological breakthrough quietly introduced to the world in 2008, is transforming much more than finance. Bitcoin is disrupting antiquated industries to bring financial independence to billions worldwide. In this book, Andreas explains why bitcoin is a financial and technological evolution with potential far exceeding the label “digital currency.”
Continue reading “The Internet of Money”
Amazon Price: $6.99 $6.99 (as of September 25, 2017 20:42 –
Usenet. The term conjures up images of archaic bulletin boards from the 1980s & 1990s in which jacking in meant astronomical charges every month. No longer. Ignore those who say "Don't talk about Usenet". No longer can you afford to leave your IP address out there for the world to see. You want privacy & anonymity? Come to Usenet. This book will teach you how. – Superior to P2P & Forums in every conceivable way where intelligent discussion is concerned – Immune from lawsuits – Ignored by Law Enforcement–because their p2p tracking systems don't work with Usenet! – The BEST newsgroups for discussion, mp3s/games/HD material – Learn why anonymity will decrease with peer-to-peer systems (as it always has) but increase with Usenet – Why Usenet is a free-for-all and ratio-free (unlike peer-to-peer systems) – Everything you need to know to set up a Usenet account and leech to your heart's content – Tor, PGP, Remailers/Mixmaster, SSL, Truecrypt and the like all have their place in Usenet. Learn about them here! – Which Vpn and Usenet companies might rat you out, and which won't Questions: Why should one use Usenet and not BitTorrent? – Enhanced discussions, both moderated and unmoderated, are prevalent in hundreds of thousands of different newsgroups. Usenet is where the -intelligent- users go to engage in logical discussions, and it is still the bastion of free speech and the most bang-for-your-buck where text and binary groups are concerned. What about lawsuits? – There has never been a lawsuit regarding Usenet use. The record and movie industries target torrenters for a reason: ignorance of the way those systems work. Usenet is an entirely different beast. Coupled with Tor, remailers and/or a vpn, Usenet is a fortress against Big Brother and shady law enforcement types, as well as all of the greedy lawyers who work for the millionaires in the entertainment industry. Anonymity on Usenet? – Yes it is possible to be anonymous on Usenet. Tools like Tor, Vpns, Remailers & Mixmaster provide this, however they are not necessary in every instance. It primarily depends on what you wish to accomplish, and which groups you're participating in. I go into detail about this in the book. Excerpt: Chapter 3: Usenet Anonymity "In this chapter, we’ll discuss ways you can add security (not to be confused with privacy) to your Usenet connection, so that you can participate in discussion groups without fear of persecution. These methods often lend themselves to situations where you may lose your Usenet account if you say the wrong things to the wrong people. Usenet companies are big business now, and unlike twelve years ago, will now think nothing of terminating your account of they get enough complaints. Simply being unpopular and taking a stand against the status quo in certain newsgroups can get your Usenet account banned (i.e. alt.privacy). However, with true anonymity, you can rest assured you will not be persecuted for speaking out against a tyrannical government, or a company that you work for (which has happened many times by disgruntled employees on Facebook). It should be stated at the outset that using Tor for Usenet binary downloads will actually strain the Tor network, just as it does with torrents. And to boot, whenever you use torrents, the torrent software actually sends your IP address to the recipient. It does so anonymously, in the same way a post office worker will deliver you your mail. Needless to say this defeats the purpose of using torrents. This problem is not with the Tor code, but rather the way that applications like BitLord and BitTorrent are designed. The torrent applications themselves need to be coded to allow anonymity. It is better to use Freenet with the Frost addon for p2p-like trading if you wish to remain anonymous. Tor is much more efficient at textual discussions, but the easiest method to do this anonymously is by use of remailers…"
Amazon Price: $60.00 $43.47 You save: $16.53 (28%). (as of September 25, 2017 22:21 –
Best practices for protecting critical data and systems
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.
Continue reading “Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)”
Amazon Price: N/A (as of September 25, 2017 02:12 –
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry.
CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical—their availability and correct operation is essential. This book focuses on the security of such mission-critical systems.
Continue reading “Securing Cyber-Physical Systems”
Amazon Price: $90.95 $88.08 You save: $2.87 (3%). (as of September 25, 2017 21:33 –
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Continue reading “Cyberspace and Cybersecurity”