Book picks similar to
Cyber War Will Not Take Place by Thomas Rid
cyber
non-fiction
saass
military
Virtual War: Kosovo and Beyond
Michael Ignatieff - 2000
In Virtual War, he offers an analysis of the conflict in Kosovo and what it means for the future of warfare. He describes the latest phase in modern combat: war fought by remote control. In real war, nations are mobilized, soldiers fight and die, victories are won. In virtual war, however, there is often no formal declaration of hostilities, the combatants are strike pilots and computer programmers, the nation enlists as a TV audience, and instead of defeat and victory there is only an uncertain endgame.Kosovo was such a virtual war, a war in which U.S. and NATO forces did the fighting but only Kosovars and Serbs did the dying. Ignatieff examines the conflict through the eyes of key players--politicians, diplomats, and generals--and through the experience of the victims, the refugees and civilians who suffered. As unrest continues in the Balkans, East Timor, and other places around the world, Ignatieff raises the troubling possibility that virtual wars, so much easier to fight, could become the way superpowers impose their will in the century ahead.
War from the Ground Up: Twenty-First Century Combat as Politics
Emile Simpson - 2012
'War From The Ground Up' offers a distinctive perspective in its consideration of the concept of contemporary warfare.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
The Nuclear Express: A Political History of the Bomb and Its Proliferation
Thomas C. Reed - 2009
It is an account of where those weapons came from, how the technology surprisingly and covertly spread, who is likely to acquire those weapons next and most importantly why.The authors’ examination of post-Cold War national and geopolitical issues regarding nuclear proliferation and the effects of Chinese sponsorship of the Pakistani program is eye opening. The reckless “nuclear weapons programs for sale” exporting of technology by Pakistan is truly chilling as is the on again off again North Korean nuclear weapons program.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
Oil: Money, Politics, and Power in the 21st Century
Tom Bower - 2009
Oil Money, Politics, and Power in the 21st Century Twenty years ago oil cost about $7 a barrel. In 2008 the price soared to $148 and then fell to below $40. In the midst of this extraordinary volatility, the major oil conglomerates still spent over a trillion dollars in an increasingly frantic search for more. The story of oil is a story of high stakes and extreme risk. It is the story of the crushing rivalries between men and women exploring for oil five miles beneath the sea, battling for control of the world's biggest corporations, and gambling billions of dollars twenty-four hours every day on oil's prices. It is the story of corporate chieftains in Dallas and London, traders in New York, oil-oligarchs in Moscow, and globe-trotting politicians-all maneuvering for power. With the world as his canvas, acclaimed investigative reporter Tom Bower gathers unprecedented firsthand information from hundreds of sources to give readers the definitive, untold modern history of oil . . . the ultimate story of arrogance, intrigue, and greed.
The Influence of Sea Power Upon History, 1660-1783
Alfred Thayer Mahan - 1890
Kaiser Wilhelm is said to have “devoured” this book, and it was avidly read by presidents (including both Roosevelts), kings, prime ministers, admirals, and chancellors.Demonstrating through historical examples that the rise and fall of seapower (and of nations) has always been linked with commercial and military command of the seas, Mahan describes successful naval strategies employed in the past—from Greek and Roman times through the Napoleonic wars. Focusing primarily on England’s rise as a sea power in the eighteenth century, the book provides not only an overview of naval tactics, but a lucid exposition of geographical, economic, and social factors governing the maintenance of sea power.Although ships, weapons, and the global balance of power have altered greatly since 1890, the lessons taught here so vividly and compellingly are still applicable today.
CISSP All-in-One Exam Guide
Shon Harris - 2001
Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.
Legacy of Ashes: The History of the CIA
Tim Weiner - 2007
Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.
Eyes in the Sky: The Secret Rise of Gorgon Stare and How It Will Watch Us All
Arthur Holland Michel - 2019
Whereas a regular aerial camera can only capture a small patch of ground at any given time, this system—and its most powerful iteration, Gorgon Stare—allow operators to track thousands of moving targets at once, both forwards and backwards in time, across whole city-sized areas. When fused with big-data analysis techniques, this network can be used to watch everything simultaneously, and perhaps even predict attacks before they happen. In battle, Gorgon Stare and other systems like it have saved countless lives, but when this technology is deployed over American cities—as it already has been, extensively and largely in secret—it has the potential to become the most nightmarishly powerful visual surveillance system ever built. While it may well solve serious crimes and even help ease the traffic along your morning commute, it could also enable far more sinister and dangerous intrusions into our lives. This is closed-circuit television on steroids. Facebook in the heavens. Drawing on extensive access within the Pentagon and in the companies and government labs that developed these devices, Eyes in the Sky reveals how a top-secret team of mad scientists brought Gorgon Stare into existence, how it has come to pose an unprecedented threat to our privacy and freedom, and how we might still capitalize on its great promise while avoiding its many perils.
Strategy in the Contemporary World: An Introduction to Strategic Studies
John Baylis - 2007
Taking a functional approach and looking at issues from both times of war and of peace, editors John Baylis, James J. Wirtz, and Colin S. Gray analyze the conflicts themselves--as well as what can be learned from them. This new edition covers topics such as intelligence and strategy, strategic studies and its critics, as well as strategy in practice, providing a comprehensive and insightful collection of contributions from a team of leading experts in the field. FEATURES * Provides a more comprehensive analysis of strategic studies than any other text in its market * Brings together contributions from international experts * Incorporates excellent learning features throughout, including readers' guides, key points, questions, suggestions for further reading, and boxes * Accompanied by a comprehensive Companion Website (www.oup.com/uk/orc/bin/9780199548873) with case studies, weblinks, PowerPoint lecture slides, and a (password-protected) Test Bank of multiple choice questions NEW TO THIS EDITION * Expanded coverage of key issues such as intelligence, critics of strategic studies, and strategy in practice * New chapters on intelligence and strategy, strategic studies and its critics, and the practice of strategy * New case studies for the online resource centre, including a case on the 2006 war in Lebanon and a case on the Gaza conflict
The World Is Flat: A Brief History of the Twenty-first Century
Thomas L. Friedman - 2005
With his inimitable ability to translate complex foreign policy and economic issues, Friedman explains how the flattening of the world happened at the dawn of the 21st century; what it means to countries, companies, communities and individuals; and how governments and societies can, and must, adapt.