Cyber Blockades

Rating: 
Amazon Price: $16.17 (as of January 20, 2020 18:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.

The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.
Continue reading “Cyber Blockades”

Cyberwarfare as an Element of PRC National Power and its Implications for U.S. National Security

Amazon Price: $109.99 (as of January 21, 2020 12:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book is a plausibility probe that examines cyberwarfare (CyW) issues as they relate to the Sino-U.S. relationship, particularly the People’s Republic of China’s (PRC) CyW capabilities and strategy and associated implications for U.S. national security. It argues that the PRC is investing in CyW capabilities capable of not only robust intelligence collection but also to achieve major military effects in deterrence, limited, and total war scenarios. In light of PRC capabilities and the U.S. reliance on the cyber domain, U.S. vulnerabilities remain significant and must be vigorously addressed.

Invasion of Privacy: A Deep Web Thriller #1

Rating: 
Amazon Price: $14.99 (as of January 20, 2020 23:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A serial killer observes his victims from afar . . .
. . . studying their behaviour so that they can be unwittingly lured to their death.

Elite computer hacker, Brody Taylor, attacks an illegal voyeuristic website . . .
. . . stumbling across a killer’s online hunting ground.
Continue reading “Invasion of Privacy: A Deep Web Thriller #1”

Designing BSD Rootkits: An Introduction to Kernel Hacking

Rating: 
Amazon Price: $29.95 $23.99 You save: $5.96 (20%) (as of January 20, 2020 22:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process.

Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD.
Continue reading “Designing BSD Rootkits: An Introduction to Kernel Hacking”

Cyber Security Principles: Computer Security – Hazards and Threats – 2nd Edition

Rating: 
Amazon Price: $2.99 (as of January 21, 2020 01:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Welcome to the ULTIMATE guide on Cyber Security!
All the important information and Principles in ONE Guide!

******2nd Edition******
Continue reading “Cyber Security Principles: Computer Security – Hazards and Threats – 2nd Edition”