The Cyber-Posture of the National Information Infrastructure (1998)

The Cyber-Posture of the National Information Infrastructure (1998)This report discusses the vulnerability of the nation’s information infrastructure to external attacks and other kinds of disruptions. It assesses the extent of the data available for measuring this threat and concludes that energy supplies, telecommunications, and computer-based systems should be of first priority for attention and remedial action. Finally, it suggests steps to reduce national vulnerability. The information security posture in both government and the private sector needs immediate examination and attention. Analytic studies should be performed to establish such infrastructure features as sources of resilience and the characterization of normalcy, and to specify R&D requirements. In addition, the nation should establish a warning mechanism and a supporting coordination center.

 

 

Price: $8.00

Click here to buy from Amazon

The Nature of War in the Information Age: Clausewitzian Future Strategy History

The Nature of War in the Information Age: Clausewitzian Future (Strategy and History)There has been a great deal of speculation recently concerning the likely impact of the ‘Information Age‘ on warfare. In this vein, much of the Revolution in Military Affairs (RMA) literature subscribes to the idea that the Information Age will witness a transformation in the very nature of war. In this book, David Lonsdale puts that notion to the test.

Using a range of contexts, the book sets out to look at whether the classical Clausewitzian theory of the nature of war will retain its validity in this new age. The analysis covers the character of the future battlespace, the function of command, and the much-hyped concept of Strategic Information Warfare. Finally, the book broadens its perspective to examine the nature of ‘Information Power’ and its implications for geopolitics. Through an assessment of both historical and contemporary case studies (including the events following September 11 and the recent war in Iraq), the author concludes that although the future will see many changes to the conduct of warfare, the nature of war, as given theoretical form by Clausewitz, will remain essentially unchanged.

Price: $45.95

Click here to buy from Amazon

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)“I finally get it! I used to hear words like rootkit, buffer overflow, and idle scanning, and they just didn’t make any sense. I asked other people and they didn’t seem to know how these things work, or at least they couldn’t explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!”

—Stephen Northcutt, CEO, SANS Institute

“Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery

“Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It’s technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field.”
—From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World

“What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks.”
—Lenny Zeltser, coauthor of Malware: Fighting Malicious Code

“Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a ‘must-have’ and a ‘must-read’ for anyone remotely associated with computers and computer security.”
—Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery

“In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis’s real strength is in his ability to show complex topics in an understandable form. By the time he’s done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both.”
—William Stearns, network security expert, www.stearns.org

“This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written.”
—Warwick Ford, coauthor of Secure Electronic Commerce

For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks.

For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.

Important features of this new edition include

  • All-new “anatomy-of-an-attack” scenarios and tools
  • An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more
  • Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking”
  • New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit
  • New information on dangerous, hard-to-detect, kernel-mode rootkits

Price: $69.99

Click here to buy from Amazon

The Use of Force: Military Power and International Politics

Rating: 
Amazon Price: $69.00 $58.78 You save: $10.22 (15%). (as of June 21, 2018 11:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Use of Force, long considered a classic in its own right, brings together enduring, influential works on the role of military power in foreign policy and international politics. Now in its eighth edition, the reader has been significantly revised; with twenty innovative and up-to-date selections, this edition is 60 percent new. Meticulously chosen and edited by leading scholars Robert J. Art and Kelly M. Greenhill, the selections are grouped under three headings: theories, case studies, and contemporary issues. The first section includes essays that cover the security dilemma, terrorism, the sources of military doctrine, the nuclear revolution, and the fungibility of force. A new subsection of Part I also deals with ethical issues in the use of force. The second section includes case studies in the use of force that span the period from World War I through the war in Afghanistan. The final section considers issues concerning the projection of US military power; the rising power of China; the spread of biological and nuclear weapons and cyberwarfare; intervention in internal conflicts and insurgencies; and possible future developments in terrorism, nuclear abolition, and robotic warfare. Continuing the tradition of previous editions, this fully updated reader collects the best analysis by influential thinkers on the use of force in international affairs.

Contributions by: Bruce J. Allyn, Kenneth Anderson, Robert J. Art, Mark S. Bell, Richard K. Betts, Laurie R. Blank, James G. Blight, Stephen G. Brooks, Seyom Brown, Daniel Byman, Audrey Kurth Cronin, Patrick M. Cronin, Alexander B. Downes, Karl W. Eikenberry, John Lewis Gaddis, Erik Gartke, Alexander L. George, Avery Goldstein, Kelly M. Greenhill, G. John Ikenberry, Robert Jervis, Gregory Koblentz, Peter R. Mansoor, John J. Mearsheimer, Nicholas L. Miller, Louis C. Morton, Barry R. Posen, Louise Richardson, George B. Samson, Thomas C. Schelling, Jack L. Snyder, Paul Staniland, Barbara F. Walter, Kenneth N. Waltz, Matthew Waxman, David A. Welch, Jon Western, and William C. Wohlforth.

Reimagining War in the 21st Century: From Clausewitz to Network-Centric Warfare

Reimagining War in the 21st Century: From Clausewitz to Network-Centric Warfare (Routledge Critical Security Studies)This book interrogates the philosophical backdrop of Clausewitzian notions of war, and asks whether modern, network-centric militaries can still be said to serve the ‘political’.

In light of the emerging theories and doctrines of Network-Centric War (NCW), this book traces the philosophical backdrop against which the more common theorizations of war and its conduct take place. Tracing the historical and philosophical roots of modern war from the 17th Century through to the present day, this book reveals that far from paralyzing the project of re-problematisating war, the emergence of NCW affords us an opportunity to rethink war in new and philosophically challenging ways.

This book will be of much interest to students of critical security studies, social theory, war studies and political theory/IR.

Manabrata Guha is Assistant Professor (ISSSP) at the National Institute of Advanced Studies, Bangalore, India.

Price: $125.00

Click here to buy from Amazon