Sunday, August 12, 2012

Inside Cyber Warfare: Mapping the Cyber Underworld

Inside Cyber Warfare: Mapping the Cyber Underworld

Buy Inside Cyber Warfare: Mapping the Cyber Underworld here

Click here to Read Customer Reviews



Product Information

What people are saying about Inside Cyber Warfare

"The necessary handbook for the 21st century."

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes be yond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Read Full Product Specification here

Friday, August 10, 2012

DEPARTMENT X

DEPARTMENT X

Click here to Read Customer Reviews



Product Information

An international criminal, known only as DARIUS, has offered to sell to the U.S. stolen intelligence of vital interest to homeland security. He has stipulated that payment be in diamonds carried by DALTON ROSS, a one time pilot for Air Algerie, to Stone Town in East Africa where a courier will contact him. At a deserted spice plantation outside Stone Town, Ross finds the courier murdered. The intelligence is missing, but the dead man carries a notebook listing people targeted for assassination. Beside one of the names is a reference to Department X
Who is Darius? What is Department X? The search for answers will take Ross on a dangerous hunt through Cairo's City of the Dead, the old quarters of Tangier and Algiers, and into a conflicted love affair with a young Israeli Mossad operative. The mystery of Darius, as well as Department X, will only be revealed after a climactic assault on a medieval complex of tunnels and cisterns on a private Greek island.
DEPARTMENT X is a contemporary thriller about the very real and nightmarish threat of cyber war looming in the near future.

Read Full Product Specification here

Wednesday, August 8, 2012

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

List Price: $ 39.95

Click here to Read Customer Reviews



Product Information

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.


  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks

  • Dives deeply into relevant technical and factual information from an insider's point of view

  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
  • Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats, and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors--our defenses must be ready all the time and our alert systems must detect the threats every time.

    • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
    • Dives deeply into relevant technical and factual information from an insider's point of view
    • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

    Amazon Exclusive: Notes from Steve Winterfeld and Jason Andress, Authors of Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

    Although we have not had a cyber event that has motivated a country western song, there has been a major uptick in activity recently.

    • According to The Wall Street Journal, the Pentagon has announced that cyber attacks can be considered an act of war.
    • The Washington Post has published a DoD list of cyber weapons.
    • Major Defense contractors (Lockeed Martin, Northrop Grumman) as well as RSA were hacked by the Advanced Persistent Threat (state-sponsored threat most often associated with China).
    • Sony, the Public Broadcast System (PBS) and others have been hacked by Anonymous (a caused-based hackavist group). NATO talks about this group as a concern in a report to the General Asse mbly of the United Nations.
    • The U.S. President issued his International Strategy for Cyberspace and his Cybersecurity Legislative Proposal.
    • China has openly admitted to standing up a “cyber blue team.”
    • CNBC has aired a special titled “Code Wars,” covering the expanding threats we face.

    It seems like a week doesn’t go by without a cyber story on the front page. We wrote Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners to help put these individual events in context as part of a larger environment with individual, organizational and national actors.


    Featured Excerpts from Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

    Case Study
    This diagram helps to facilitate a discussion on how an organization will use resources to solve their cyber challenges.
     The Cyber Threat Landscape
    This graphic allows someone to look at the methodology used to conduct a cyber attack, as well as the tools and techniques employed. Then it shows who is conducting the attacks, what is used to defend against them, and what the attackers are after.

    Top Documents to Read Related to Cyber Warfare
    1. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure; Melissa Hathaway (May 2009)
    2. Joint Terminology for Cyberspace Operations from Joint Staff (November, 2010)
    3. Memorandum of Agreement Between the Department of Homeland Security and Department of Defense Regarding Cybersecurity by Janet Napolitano and Robert Gates (October 2010)
    4. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation for US-China Economic and Security Review Commission (October 2009)
    5. Global Energy Cyber attacks: “Night Dragon” By McAfee® Foundstone® outlining efforts to infiltrate Energy Sector (February 2011)
    6. Project Grey Goose report reviewing cyber warfare as part of Russia’s attack on Georgia (January 2010)
    7. Tracking GhostNet : Investigating a Cyber Espionage Network (March 2009)

    Key Related Documents Published After Cyber Warfare Went to Press:
    1. Cybersecurity Two Years Later By CSIS Commission on Cybersecurity for the 44th Presidency (January 31, 2011)
    2. Cybersecurity Proposed Legislation; The White House (May 12, 2011)
    3. International Strategy for Cyberspace; The White House (May, 2011)
    4. Department of Defense Strategy for Operating in Cyberspace; Department of Defense (July 2011)

    Great Annual Reports to Keep Up With:
    1. The Top Cyber Security Risks by SANS
    2. 2010/2011 Computer Crime and Security Survey (15th Annual) by Computer Security Institute
    3. Ponemon Institute Annual Study: Cost of a Data Breach
    4. Symantec Global Internet Security Threat Reports
    5. Verizon Annual Data Breach Investigations Report

    Read Full Product Specification here