Book picks similar to
Introduction to Computer Networks and Cybersecurity by Chwan-Hwa Wu
computer-networking
computers
digital-security
non-fiction-information-systems
The Dark Net: Inside the Digital Underworld
Jamie Bartlett - 2014
A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.
Principles of Electronic Communication Systems
Louis E. Frenzel - 1997
Requiring only basic algebra and trigonometry, the new edition is notable for its readability, learning features and numerous full-color photos and illustrations. A systems approach is used to cover state-of-the-art communications technologies, to best reflect current industry practice. This edition contains greatly expanded and updated material on the Internet, cell phones, and wireless technologies. Practical skills like testing and troubleshooting are integrated throughout. A brand-new Laboratory & Activities Manual provides both hands-on experiments and a variety of other activities, reflecting the variety of skills now needed by technicians. A new Online Learning Center web site is available, with a wealth of learning resources for students. An Instructor Productivity Center CD-ROM features solutions to all problems, PowerPoint lessons, and ExamView test banks for each chapter.
Counting from Zero
Alan B. Johnston - 2011
I could not wait to find out what happened next." - Vint Cerf, Internet pioneer "The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters." - Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption program Today, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as 'zero day' attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner's knowledge, have become slave computers - remotely controlled 'zombies'. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks. Internet security expert Mick O'Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life. Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick's attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness? Unfolding across three continents, the new techno thriller "Counting from Zero" gives a realistic insider's view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.
How to Master CCNA
Rene Molenaar - 2013
You will learn about the basics of networking like the OSI Model, the difference between IPv4, IPv6, TCP, UDP and more. You will also learn how to configure protocols like spanning-tree, VLANs and trunking on your switches and how routers use routing protocols to build their routing table. This book covers everything for the ICND1 (100-101), ICND2 (200-101) and CCNA combined exam (200-120).
Kidnapped
Velvet Vaughn - 2017
A Kai Costa Caper What started as a fun outing at a water park turns into a horrific nightmare when ten-year-old Kai Costa witnesses a man snatch a young girl. Unable to stop the abduction, he jumps in the getaway truck to rescue her. After all, he’s done it before. Zoe Duquesne has spent her young life surrounded by bodyguards. The one time she breaks the rules and sneaks away, she's kidnapped. Zoe's partner in crime, her older sister Harlow, is frantic when she sees the man grab her sister. She enlists the help of the first person she finds—COBRA Securities agent Sawyer Oldham. As they work together to locate and bring the children home, a sizzling chemistry erupts that threatens to ignite into a volcanic passion. Coming soon from Romantic Suspense Author Velvet Vaughn: Total Surrender – the eleventh installment in the COBRA Securities Series. Romantic Suspense Book Categories: >Romantic Suspense New Releases >Romantic Suspense Ebook >Romantic Suspense Series >Romantic Suspense Short Story
Enigmas: Alan Turing and the Codebreakers of the World Wars
David Boyle - 2017
Many of those most closely involved in cracking the Enigma code – Alistair Denniston, Frank Birch, Dilly Knox – had wrestled with German naval codes for most of the First World War. By the end of the war they had been successfully cracking a new code every day, from their secret Room 40 at the Old Admiralty Building, in a London blacked out for Zeppelin Raids. The techniques they developed then, the ideas that they came to rely on, the people they came to trust, had been developed the hard way, under intense pressure and absolute secrecy during the First World War. Operation Primrose Operation Primrose tells the story of the capture of U-110 – and with it a working Enigma machine. One of the biggest secrets of the war, the capture of that one machine turned the tide of the war. Turing and his colleagues at Bletchley Park worked tirelessly to crack the code, and with the working Enigma machine they finally had their break-through moment. This book sets the story, and the Enigma cryptographers, in context – at the heart of the Battle of the Atlantic, when it reached its crescendo in the pursuit of the battleship Bismarck the week after U110 was taken. It sets Bletchley Park in its wider context too, at the heart of an intricate and maverick network of naval intelligence, tracking signals and plotting them to divert convoys around waiting U-boats, involving officers like James Bond’s future creator, Ian Fleming. It also sets out the most important context of all, forgotten in so much of the Enigma history: that Britain’s own naval code had already been cracked, and its signals were being read, thanks to the efforts of Turing’s opposite number, the German naval cryptographer, Wilhelm Tranow. An exciting and enthralling true story ‘Operation Primrose’ is an excellently researched piece on the race for naval supremacy in the Second World War. Alan Turing Mathematician, philosopher, codebreaker. Turing was one of the most original thinkers of the last century - and the man whose work helped create the computer-driven world we now inhabit. But he was also an enigmatic figure, deeply reticent yet also strikingly naïve. Turing’s openness about his homosexuality at a time when it was an imprisonable offence ultimately led to his untimely death at the age of only forty-one. Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements. Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War. But his achievements were to be tragically overshadowed by his supposedly subversive views and for his sexuality. Praise for David Boyle: ‘The tone of the book may be gloomy but there is plenty of entertainment value …’ - Anne Ashworth, The Times ‘Exhilarating’ - Daily Mail ‘He tells these stories, on the whole persuasively and with some startling asides.
Computer Networks and Internets [With CDROM and Companion Website Access Code Card]
Douglas E. Comer - 1996
Leading networking authority Douglas Comer presents a wide-ranging, self-contained tour of the concepts, principles, and technologies that enable today's Internet to support applications ranging from web browsing to telephony and multimedia. This Fifth Edition has been thoroughly reorganized, revised, and updated: it includes extensive new coverage of topics ranging from wireless protocols to network performance, while reducing or eliminating coverage of older protocols and technologies. Comer begins by illuminating the applications and facilities offered by today's Internet. Next, he systematically introduces the underlying network technologies and protocols that make them possible: low-level data communications; packet switching, LAN, and WAN technologies; and Internet protocols such as TCP, IP, UDP, and IPv6. With these concepts and technologies established, he introduces several of the most important contemporary issues faced by network implementers and managers, including quality of service, Internet telephony, multimedia, network security, and network management. Comer has carefully designed this book to support both top-down and bottom-up teaching approaches. Students need no background in operating systems, and no sophisticated math: Comer relies throughout on figures, drawings, examples, and analogies, "not" mathematical proofs.
Conspiracy (Maple Valley Book 3)
Rebecca Deel - 2021
To unmask the culprit before he succeeds, Blair accepts the help of a Navy SEAL turned cop with a dark past and deadly skills.Deputy Sheriff Elliot Montgomery has avoided a distracting Blair Hoffman for two years. But when someone places a target on her back, Elliot’s protective instincts override his common sense. After he becomes Blair’s personal bodyguard, the threats escalate. But Elliot never backs down from a fight. With danger looming, he’ll need every ounce of cunning and courage to save himself and the woman who refused to leave him alone in the darkness.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies
Robert Vamosi - 2011
As our mobile phones, mp3 players, cars, and digital cameras become more and more complex, we understand less and less about how they actually work and what personal details these gadgets might reveal about us.Robert Vamosi, an award-winning journalist and analyst who has been covering digital security issues for more than a decade, shows us the dark side of all that digital capability and convenience. Hotel-room TV remotes can be used to steal our account information and spy on what we've been watching, toll-booth transponders receive unencrypted EZ Pass or FasTrak info that can be stolen and cloned, and our cars monitor and store data about our driving habits that can be used in court against us.When Gadgets Betray Us gives us a glimpse into the secret lives of our gadgets and helps us to better understand - and manage - these very real risks.
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World
Joel Brenner - 2011
He saw at close range the battleground on which adversaries are attacking us: cyberspace.Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
Social Media Marketing for Dummies
Shiv Singh - 2009
Social media marketing is a cheaper and highly effective way to spread up-to-the-minute news; an easy, inexpensive way to enlarge your audience, customers, and business.Social Media Marketing For Dummies provides an indispensable resource for small businesses and start-ups looking for low-cost online marketing strategies, as well as for marketers in larger companies who want to be more involved with social media. Learn which social media site best fits you and your business and how to:Use Twitter, blogs, Facebook, and other social media outlets to full advantage Create your own online spokesperson for your brand Identify social media sites that appeal to your target audience Tell which social platform works for which objectives Develop a unique, Google-able voice in social media Optimize your page to attract clicks and customers Set up a program to assess your success and measure your results Social Media Marketing helps you learn the art of social media marketing to build your business to its full potential. Includes contributions by Michael Becker, Jeannette Kocsis and Ryan Williams