Amazon Price: $18.00 $10.99 You save: $7.01 (39%) (as of January 27, 2020 11:54 –
“A prescient and important book. . . . Fascinating.”—The New York Review of Books
No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn’t so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests.
Continue reading “The Darkening Web: The War for Cyberspace”
Amazon Price: $17.99 (as of January 26, 2020 14:30 –
What are the facts behind the cyberattacks that regularly hit the news headlines? Cybertwists explains:How attackers abuse the fabric of the internet to forge messages and bring down websitesHow viruses, worms, ransomware and individual hackers exploit loopholes in existing softwareHow blockchain enables Bitcoin, and how Bitcoin and Tor keep criminals anonymous on the dark webHow encryption works and how encryption methods have been crackedHow the Internet of Things is a hacker's dream and cyberwar is a nation's nightmare
The explanations are backed up with engaging accounts of past attacks carried out by criminals and secret services on companies, governments and individuals.
Amazon Price: $65.00 $5.48 You save: $59.52 (92%) (as of January 27, 2020 15:04 –
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspects traffic Configure firewall interfaces, routing, IP addressing services, and IP multicast support Maintain security contexts and Flash and configuration files, manage users, and monitor firewalls with SNMP Authenticate, authorize, and maintain accounting records for firewall users Control access through the firewall by implementing transparent and routed firewall modes, address translation, traffic filtering, user authentication, content filtering, application inspection, and traffic shunning Increase firewall availability with firewall failover operation Understand how firewall load balancing works Generate firewall activity logs and learn how to analyze the contents of the log Verify firewall operation and connectivity and observe data passing through a firewall Control access and manage activity on the Cisco IOS firewall Configure a Cisco firewall to act as an IDS sensor
Every organization has data, facilities, and workflow processes that are critical to their success. As more organizations make greater use of the Internet, defending against network attacks becomes crucial for businesses. Productivity gains and returns on company investments are at risk if the network is not properly defended. Firewalls have emerged as the essential foundation component in any network security architecture.
Continue reading “Cisco ASA and PIX Firewall Handbook”
Amazon Price: $29.95 $19.42 You save: $10.53 (35%) (as of January 26, 2020 22:25 –
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data.
Cybersecurity incidents make the news with startling regularity. Each breach―the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump―makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
Continue reading “You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy)”
Amazon Price: $24.99 $14.57 You save: $10.42 (42%) (as of January 27, 2020 00:04 –
In Cybersecurity and Cyberwar: What Everyone Needs to Know�, New York Times bestselling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of twenty-first-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what we can do. Along the way, they take listeners on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and Cyberwar: What Everyone Needs to Know� is the definitive account on the subject for us all, which comes not a moment too soon.