Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environme (Critical Studies on Islam)

Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environme (Critical Studies on Islam)The Internet is very big in the Arab world. After Al-Jazeera, it is the second most important source of dissenting opinion. Literally, millions of people in the Muslim world rely on web-sites to get their information and fatwas. A whole new life of cyber Imams and a new culture is emerging through Internet programmes and will have a profound effect on Arab consciousness. This book documents all this and examines various sites and offers the first comprehensive analysis of the impact of the Internet on Islamic culture. Zia Sardar, author of Postmodernism and the Other and Why Do People Hate America The Internet is an increasingly important source of information for many people in the Muslim world. Many Muslims in majority and minority contexts rely on the Internet — including websites and e-mail — as a primary source of news, information and communication about Islam. As a result, a new media culture is emerging which is having a significant impact on areas of global Muslim consciousness. Post-September 11th, this phenomenon has grown more rapidly than ever.Gary R. Bunt provides a fascinating account of the issues at stake, identifying two radical new concepts: Firstly, the emergence of e-jihad (‘Electronic Jihad‘) originating from diverse Muslim perspectives — this is described in its many forms relating to the different definitions of ‘jihad', including on-line activism (ranging from promoting militaristic activities to hacking, to co-ordinating peaceful protests) and Muslim expression post 9/11. Secondly, he discusses religious authority on the Internet — including the concept of on-line fatwas and their influence in diverse settings, and the complexities of conflicting notions of religious authority.

Price: $41.00

Click here to buy from Amazon

The Nature of War in the Information Age: Clausewitzian Future Strategy History

The Nature of War in the Information Age: Clausewitzian Future (Strategy and History)There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.

Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power' and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.

Price: $45.95

Click here to buy from Amazon

Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Studies in Security and International Affairs)

Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Studies in Security and International Affairs)Increasingly, the power of a large, complex, wired nation like the United States rests on its ability to disrupt would-be cyber attacks and to be resil­ient against a successful attack or recurring campaign. Addressing the con­cerns of both theorists and those on the national security front lines, Chris C. Demchak presents a unified strategy for survival in an interconnected, ever-messier, more surprising cybered world and examines the institutional adaptations required of our defense, intelligence, energy, and other critical sectors for national security.

Demchak introduces a strategy of “security resilience” against surprise attacks for a cybered world that is divided between modern, digitally vulner­able city-states and more dysfunctional global regions. Its key concepts build on theories of international relations, complexity in social-technical systems, and organizational-institutional adaptation. Demchak tests the strategy for reasonableness in history’s few examples of states disrupting rather than conquering and being resilient to attacks, including ancient Athens and Sparta, several British colonial wars, and two American limited wars. She applies the strategy to modern political, social, and technical challenges and presents three kinds of institutional adaptation that predicate the success of the security resilience strategy in response. Finally, Demchak discusses implications for the future including new forms of cyber aggression like the Stuxnet worm, the rise of the cyber-command concept, and the competition between the U.S. and China as global cyber leaders.

Wars of Disruption and Resilience offers a blueprint for a national cyber-power strategy that is long in time horizon, flexible in target and scale, and practical enough to maintain the security of a digitized nation facing violent cybered conflict.

Price: $24.95

Click here to buy from Amazon

Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today's most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today's well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors' FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon

 

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in CybersecurityWith the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need.

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges—detailing cutting-edge machine learning and data mining techniques.

It also:

  • Unveils cutting-edge techniques for detecting new attacks
  • Contains in-depth discussions of machine learning solutions to detection problems
  • Categorizes methods for detecting, scanning, and profiling intrusions and anomalies
  • Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions
  • Details privacy-preserving data mining methods

 

This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Price: $89.95

Click here to buy from Amazon