Book picks similar to
Cyber Mercenaries by Tim Maurer
non-fiction
cyber
espionage
cybersecurity
China's Civilian Army: The Making of Wolf Warrior Diplomacy
Peter Martin - 2021
They give a rare perspective on the greatest geopolitical drama of the last half century.In the early days of the People's Republic, diplomats were highly-disciplined, committed communists who feared revealing any weakness to the threatening capitalist world. Remarkably, the model that revolutionary leader Zhou Enlai established continues to this day despite the massive changes the country has undergone in recent decades.Little is known or understood about the inner workings of the Chinese government as the country bursts onto the world stage, as the world's second largest economy and an emerging military superpower. China's Diplomats embody its battle between insecurity and self-confidence, internally and externally. To this day, Chinese diplomats work in pairs so that one can always watch the other for signs of ideological impurity. They're often dubbed China's "wolf warriors" for their combative approach to asserting Chinese interests.Drawing for the first time on the memoirs of more than a hundred retired diplomats as well as author Peter Martin's first-hand reporting as a journalist in Beijing, this groundbreaking book blends history with current events to tease out enduring lessons about the kind of power China is set to become. It is required reading for anyone who wants to understand China's quest for global power, as seen from the inside.
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
William R. Johnson - 1987
CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
Mike Meyers - 1999
The book offers clear instruction and real-world examples from training expert and bestselling author Mike Meyers along with hundreds of accurate practice questions.Fulfilling the promise of the All-in-One series, this complete reference serves both as a study tool and a valuable on-the-job reference that will serve readers beyond the exam. CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) also includes access to free video training and interactive hands-on labs and simulations that prepare you for difficult performance-based questions. A valuable pre-assessment test enables readers to gauge their familiarity with the test’s objectives and tailor an effective course for study.-Contains complete coverage of every objective for the CompTIA Network+ Certification exam-Written by CompTIA training and certification guru Mike Meyers- Electronic content includes the Total Tester exam simulator with over 100 practice questions, over an hour of training videos, and a collection of Mike Meyers’ favorite shareware and freeware networking utilities
Hacking For Dummies
Kevin Beaver - 2004
In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications
Ivan Ristic - 2014
Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.
Backtrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran - 2011
Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election
Malcolm W. Nance - 2016
Clinton 2016 presidential election, this book exposed the Russian hacking while the CIA was drafting their own report. In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.Western intelligence agencies tracked the hack to Russian spy agencies and dubbed them the “Cyber Bears.” The media was soon flooded with the stolen information channeled through Julian Assange, the founder of WikiLeaks. It was a massive attack on America but the Russian hacks appeared to have a singular goal—elect Donald J. Trump as president of the United States.Malcolm Nance’s fast paced real-life spy thriller takes you from Vladimir Putin’s rise through the KGB from junior officer to spymaster-in-chief and spells out the story of how he performed the ultimate political manipulation—convincing Donald Trump to abandon seventy years of American foreign policy including the destruction of NATO, cheering the end of the European Union, allowing Russian domination of Eastern Europe, and destroying the existing global order with America at its lead.The Plot to Hack America is the thrilling true story of how Putin’s spy agency, run by the Russian billionaire class, used the promise of power and influence to cultivate Trump as well as his closest aides, the Kremlin Crew, to become unwitting assets of the Russian government. The goal? To put an end to 240 years of free and fair American democratic elections.
12 Seconds Of Silence: How a Team of Inventors, Tinkerers, and Spies Took Down a Nazi Superweapon
Jamie Holmes - 2020
Working in a secretive organization known as Section T, a team of physicists, engineers, and everyday Joes and Janes took on a devilish challenge. To help the Allies knock airplanes out of the air, they created one of the world’s first “smart weapons.” Against overwhelming odds and in a race against time, mustering every scrap of resource, ingenuity, and insight, the scientists of Section T would eventually save countless lives, rescue the city of London from the onslaught of a Nazi superweapon, and help bring about the Axis defeat. A holy grail sought after by Allied and Axis powers alike, their unlikely innovation ranks with the atomic bomb as one of the most revolutionary technologies of the Second World War. Until now, their tale was largely untold. For fans of Erik Larson and Ben Macintyre, set amidst the fog of espionage, dueling spies, and the dawn of an age when science would determine the fate of the world, 12 Seconds of Silence is a tribute to the extraordinary wartime mobilization of American science and the ultimate can-do story.
Racing the Enemy: Stalin, Truman, and the Surrender of Japan
Tsuyoshi Hasegawa - 2005
By fully integrating the three key actors in the story - the United States, the Soviet Union, and Japan - Hasegawa for the first time puts the last months of the war into international perspective. From April 1945, when Stalin broke the Soviet-Japanese Neutrality Pact and Harry Truman assumed the presidency, to the final Soviet military actions against Japan, Hasegawa brings to light the real reasons Japan surrendered. From Washington to Moscow to Tokyo and back again, he shows us a high-stakes diplomatic game as Truman and Stalin sought to outmaneuver each other in forcing Japan's surrender, as Stalin dangled mediation offers to Japan while secretly preparing to fight in the Pacific, as Tokyo peace advocates desperately tried to stave off a war party determined to mount a last-ditch defense, and as the Americans struggled to balance their competing interests of ending the war with Japan and preventing the Soviets from expanding into the Pacific. Authoritative and engrossing, Racing the Enemy puts the final days of World War II into a whole new light.
Open Secrets: WikiLeaks, War and American Diplomacy
The New York Times - 2011
government diplomatic cables and battlefield reports. The New York Times played a crucial role in breaking the WikiLeaks story, and “Open Secrets” is the definitive chronicle of the documents’ release and the controversy that ensued. It includes detailed analyses of the documents by Times correspondents; opinion essays by Frank Rich, Maureen Dowd and others; and the full text of all the cables and war logs posted on The Times's Web site, along with 27 new cables selected for this volume. It also includes an essay in which the executive editor of The Times, Bill Keller, explains how the newspaper came to publish documents obtained by WikiLeaks, and why it did; expanded profiles of Julian Assange, WikiLeaks's founder, and Bradley Manning, the Army private suspected of being his source; and original essays on what the fracas has revealed about American diplomacy and government secrecy. A legal and technological thriller and a primer on world politics, "Open Secrets" is also a field guide to how information and power are wielded today, and why it matters.
Sheriff of Ramadi
Dick Couch - 2008
Navy SEAL Dick Couch follows the SEAL Task Unit in Iraq's Anbar Province between 2005 and 2007, chronicling the unit's deployment and detailing the importance of the SEALs in winning the fight to control Ramadi.
Security in Computing
Charles P. Pfleeger - 1988
In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker - 2011
Pub the Date: September. 2011 of Pages: 416 in Publisher: McGraw-Hill the Get complete coverages of all the objectives included on the EC-Council's Certified the Ethical Hacker exam inside the this comprehensive resource. Written by an the IT security expert. The this the authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter. exam tips. practice exam questions. and in-depth explanations. Designed to help you pass the exam with ease. this definitive volume also serves as an essential on-the-job reference.COVERS ALL EXAM TOPICS. INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses. trojans. and other ...
Kill Chain: Drones and The Rise of the High-Tech Assassins
Andrew Cockburn - 2015
Yet few understand how and why this has become our principal way of waging war. Kill Chain uncovers the real and extraordinary story; its origins in long-buried secret programs, the breakthroughs that made drone operations possible, the ways in which the technology works and, despite official claims, does not work. Taking the reader inside the well-guarded world of national security, the book reveals the powerful interests - military, CIA and corporate - that have led the drive to kill individuals by remote control. Most importantly of all, the book describes what has really happened when the theories underpinning the strategy -- and the multi-billion dollar contracts they spawn -- have been put to the test. Drawing on sources deep in the military and intelligence establishments, Andrew Cockburn's Kill Chain unveils the true effects, as demonstrated by bloody experience, of assassination warfare, a revelation that readers will find surprising as well as shocking.
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein - 2011
In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.