Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the InternetOriginally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of  “botmasters”. This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots.

With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The book presents exclusive details of the operation of the notorious Thr34t Krew, one of the most malicious bot herder groups in recent history. Largely unidentified by anti-virus companies, their bots spread globally for months, launching massive distributed denial of service (DDoS) attacks and warez (stolen software distributions). For the first time, this story is publicly revealed, showing how the botherders got arrested, along with details on other bots in the world today. Unique descriptions of the criminal marketplace – how criminals make money off of your computer – are also a focus of this exclusive book!

With unprecedented detail, the book goes on to explain step-by-step how a hacker launches a botnet attack, providing specifics that only those entrenched in the cyber-crime investigation world could possibly offer.

Authors Ken Dunham and Jim Melnick serve on the front line of critical cyber-attacks and countermeasures as experts in the deployment of geopolitical and technical bots. Their work involves advising upper-level government officials and executives who control some of the largest networks in the world. By examining the methods of Internet predators, information security managers will be better able to proactively protect their own networks from such attacks.

Price: $69.95

Click here to buy from Amazon

Information Warfare and Cyber Security

Information Warfare and Cyber SecurityThis digital document is an article from Air Force Law Review, published by U.S. Air Force Academy, Department of Law on December 22, 2009. The length of the article is 22724 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.

Citation Details
Title: Cyber warfare operations: development and use under international law.
Author: Arie J. Schaap
Publication: Air Force Law Review (Magazine/Journal)
Date: December 22, 2009
Publisher: U.S. Air Force Academy, Department of Law
Issue: 64 Page: 121(53)

Distributed by Gale, a part of Cengage Learning

Price:

Click here to buy from Amazon

Attacks on Wireless LANs About the security of IEEE 802.11 based wireless networks

Attacks on Wireless LANs  About the security of IEEE 802.11 based wireless networksWireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.

 

Price: $76.00

Click here to buy from Amazon

New Security Challenges in Asia

Amazon Price: $55.00 $21.94 You save: $33.06 (60%). (as of October 15, 2019 14:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New security challenges are increasingly important in U.S. security planning. Transnational threats that do not arise from national rivalries or involve geopolitical competition—climate change, food insecurity, pandemic disease, terrorism, and cybercrime—can destabilize a country just as severely as an invading army. All of these pose threats to Asia and are particularly problematic for China due to its size, development, and governance. New Security Challenges in Asia focuses on the sources of these challenges, analyzes their international impact, and suggests actions to wrestle them into manageable condition.

Asian nations have found it difficult to respond effectively to these new security challenges. Resources and technical capacity are scarce, as are cooperation and coordination within governments, between governments, and between governments, the private sector, and civil society. New Security Challenges in Asia shows how these threats are less susceptible to traditional diplomacy or military resolution and recommends ways the U.S. can help Asian nations address them constructively.

Reimagining War in the 21st Century: From Clausewitz to Network-Centric Warfare

Reimagining War in the 21st Century: From Clausewitz to Network-Centric Warfare (Routledge Critical Security Studies)This book interrogates the philosophical backdrop of Clausewitzian notions of war, and asks whether modern, network-centric militaries can still be said to serve the ‘political’.

In light of the emerging theories and doctrines of Network-Centric War (NCW), this book traces the philosophical backdrop against which the more common theorizations of war and its conduct take place. Tracing the historical and philosophical roots of modern war from the 17th Century through to the present day, this book reveals that far from paralyzing the project of re-problematisating war, the emergence of NCW affords us an opportunity to rethink war in new and philosophically challenging ways.

This book will be of much interest to students of critical security studies, social theory, war studies and political theory/IR.

Manabrata Guha is Assistant Professor (ISSSP) at the National Institute of Advanced Studies, Bangalore, India.

Price: $125.00

Click here to buy from Amazon