Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: $183.99 (as of July 5, 2020 00:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New 2016 Third Edition

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Threat Modeling: Designing for Security

Rating: 
Amazon Price: $39.19 (as of July 4, 2020 03:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Continue reading “Threat Modeling: Designing for Security”

Commercial Cyber Espionage and Barriers to Digital Trade in China

Amazon Price: $17.95 (as of July 4, 2020 17:02 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This hearing will examine China's use of standards, regulation, and censorship as a market-entry barrier. It will also examine China's use of cyber espionage to gather information for commercial purposes, including turning over U.S. intellectual property to competing Chinese state-owned enterprises. Expert witnesses will address the breach of the OPM and related hacking of federal agencies. At the hearing, the Commissioners received testimony from the following witnesses: Samm Sacks, China Analyst, Eurasia Group; Matthew Schruers, Vice President for Law & Policy, Computer & Communications Industry Association; Paul M. Tiao, Partner, Hunton & Williams; Dennis F. Poindexter, author of The Chinese Information War, Espionage, Cyberwar, Communications Control and Related Threats to United States Interests; and Jen Weedon, Manager, Threat Intelligence and Strategic Analysis, FireEye and Mandiant, Inc.

Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide

Rating: 
Amazon Price: $103.00 (as of July 4, 2020 16:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

NOTE: Second Edition available in paperback and Kindle format (ISBN: 9781893939943).

Wireshark is rated #1 in the Top 100 Network Security Tools by sectools.org. Wireshark is the world's most popular network analyzer tool. This book is the ultimate resource on Wireshark which is a MUST HAVE tool used by network IT professionals to troubleshoot, secure and optimize networks. Readers learn to capture wired and wireless traffic, focus on the cause of slow web browsing, identify why applications don't run properly across the network, locate the cause of poor VoIP call quality, determine why WLANs are plagued with problems and more. The author, Laura Chappell is the founder of Wireshark University and Chappell University and has been analyzing networks for over 20 years – the book is written in a clear manner with hundreds of screenshots for the visual learner. The foreword was written by Gerald Combs, creator of Wireshark. Wireshark Network Analysis covers the test objectives for the Wireshark Certified Network Analyst Exam and includes test questions and answers for all topics covered. Filled with 45 real-life case studies, Wireshark Network Analysis takes you inside small, medium and large corporations to see how they solved network problems in a more efficient, accurate way using Wireshark. Book supplements are available online at wiresharkbook.com.

Usenet & The Future of Anonymity

Rating: 
Amazon Price: $6.99 (as of July 4, 2020 10:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Usenet. The term conjures up images of archaic bulletin boards from the 1980s & 1990s in which jacking in meant astronomical charges every month. No longer. Ignore those who say "Don't talk about Usenet". No longer can you afford to leave your IP address out there for the world to see. You want privacy & anonymity? Come to Usenet. This book will teach you how. – Superior to P2P & Forums in every conceivable way where intelligent discussion is concerned – Immune from lawsuits – Ignored by Law Enforcement–because their p2p tracking systems don't work with Usenet! – The BEST newsgroups for discussion, mp3s/games/HD material – Learn why anonymity will decrease with peer-to-peer systems (as it always has) but increase with Usenet – Why Usenet is a free-for-all and ratio-free (unlike peer-to-peer systems) – Everything you need to know to set up a Usenet account and leech to your heart's content – Tor, PGP, Remailers/Mixmaster, SSL, Truecrypt and the like all have their place in Usenet. Learn about them here! – Which Vpn and Usenet companies might rat you out, and which won't Questions: Why should one use Usenet and not BitTorrent? – Enhanced discussions, both moderated and unmoderated, are prevalent in hundreds of thousands of different newsgroups. Usenet is where the -intelligent- users go to engage in logical discussions, and it is still the bastion of free speech and the most bang-for-your-buck where text and binary groups are concerned. What about lawsuits? – There has never been a lawsuit regarding Usenet use. The record and movie industries target torrenters for a reason: ignorance of the way those systems work. Usenet is an entirely different beast. Coupled with Tor, remailers and/or a vpn, Usenet is a fortress against Big Brother and shady law enforcement types, as well as all of the greedy lawyers who work for the millionaires in the entertainment industry. Anonymity on Usenet? – Yes it is possible to be anonymous on Usenet. Tools like Tor, Vpns, Remailers & Mixmaster provide this, however they are not necessary in every instance. It primarily depends on what you wish to accomplish, and which groups you're participating in. I go into detail about this in the book. Excerpt: Chapter 3: Usenet Anonymity "In this chapter, we’ll discuss ways you can add security (not to be confused with privacy) to your Usenet connection, so that you can participate in discussion groups without fear of persecution. These methods often lend themselves to situations where you may lose your Usenet account if you say the wrong things to the wrong people. Usenet companies are big business now, and unlike twelve years ago, will now think nothing of terminating your account of they get enough complaints. Simply being unpopular and taking a stand against the status quo in certain newsgroups can get your Usenet account banned (i.e. alt.privacy). However, with true anonymity, you can rest assured you will not be persecuted for speaking out against a tyrannical government, or a company that you work for (which has happened many times by disgruntled employees on Facebook). It should be stated at the outset that using Tor for Usenet binary downloads will actually strain the Tor network, just as it does with torrents. And to boot, whenever you use torrents, the torrent software actually sends your IP address to the recipient. It does so anonymously, in the same way a post office worker will deliver you your mail. Needless to say this defeats the purpose of using torrents. This problem is not with the Tor code, but rather the way that applications like BitLord and BitTorrent are designed. The torrent applications themselves need to be coded to allow anonymity. It is better to use Freenet with the Frost addon for p2p-like trading if you wish to remain anonymous. Tor is much more efficient at textual discussions, but the easiest method to do this anonymously is by use of remailers…"