Chinese Cyber Crime is the first comprehensive book describing the hacking underworld within the People's Republic of China. Based upon direct field research and experience with Chinese hackers this book goes where no other has gone before. China's latest national security law and draft cyber security sovereignty law are introduced and reviewed in applicability to China's efforts to control nefarious Chinese cybercrime. This is a second edition for 2016.
The Spy Within is the riveting true story of one of the most significant cases is the history of espionage—the penetration of the CIA by a Chinese spy for 30 years. Larry Chin was as a double-agent whose spying encompassed such pivotal events as the Korean War, the Cultural Revolution in China, the Vietnam War, and Nixon’s groundbreaking visit tor Beijing. Chin’s reports were circulated to China’s top leaders and read by Mao, Zhou Enlai and Deng Xiaoping.
“Suspenseful cloak-and-dagger reenactment of the FBI sting that exposed a Chinese-American double agent in 1985…Hoffman possesses a solid command of his material and conveys the secretive nature of espionage agencies with a novelist’s panache,” said Kirkus.
Continue reading “The Spy Within”
The FBI Story presents the prior year’s one hundred most fascinating cases and how they were solved. Featured inside are incredible true stories, such as:
The catching of a white supremacist serial killer.
The destruction of a global criminal identity theft organization.
The busting of an insider trading scheme by a top stock manager.
The taking down of the gangs of Los Angeles.
The rooting out of corrupt public officials.
The shuttering of one of the worst dog fighting rings.
Continue reading “The FBI Story: Startling Confrontations with Transnational Terrorist Groups, Sophisticated Cyber Attacks, Serial Killers, Corrupt Public Officials, and More”
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet. You might be wondering: there are so many computer viruses, why Stuxnet? What is so special about the Stuxnet computer worm? Stuxnet never managed to become the biggest, the scariest, or the most sophisticated malware. At the same time, because of some unexpected twists of fate, Stuxnet had become much more than just a computer worm. Stuxnet brought from shadows into spotlight some very serious issues with the Internet security ranging from stolen digital certificates and defenselessness of industrial computers to an existence of “gray” market of pre-written software vulnerabilities for sale. Overall, the story of Stuxnet is a story of its evolution from an ordinary malware to a cyber-weapon that was followed by its major transformation into a successful long-term propaganda-weapon.
The appearance of Stuxnet that was loaded with two digital certificates and four previously unknown breaches in Window’s defense raised some painful questions. Who was behind Stuxnet? For how long was this cyber-war going on? Are secure Internet transactions really secure? Can we trust digital certificates? Who is in the business of creating and selling malware to penetrate Internet browsers’ security? The story of the computer worm Stuxnet is full of surprises and unexpected twists that might change your opinion about the present and future of the Internet and the World Wide Web.
What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2015)
Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives.
Continue reading “The Cyber Threat”