Computer fraud and hacking Books
Kogan Page Fintech Wars
Book SynopsisJames da Costa is the co-founder and COO of digital bank, Fingo. He is a researcher at Stanford University's Digital Economy Lab and a guest lecturer at the University of Warwick. He is an expert and leading voice in the Fintech space and has been recognized as a Forbes 30 Under 30 and an MIT Innovator Under 35. He is a Diana Award recipient and is a Bill & Melinda Gates Foundation Goalkeeper. He is based in San Francisco, USA.
£13.49
Oxford University Press Inc Cybersecurity and Cyberwar
Book SynopsisDependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution''s impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet''s potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran''s nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.Trade ReviewIn our digital age, the issues of cybersecurity are no longer just for the technology crowd; they matter to us all. Whether you work in business or politics, the military or the media -- or are simply an ordinary citizen -- this is an essential read. * Eric Schmidt, Executive Chairman, Google *This is the most approachable and readable book ever written on the cyber world. The authors have distilled the key facts and policy, provided sensible recommendations, and opened the debate generally to any informed citizen: a singular achievement. A must read for practitioners and scholars alike. * Admiral James Stavridis, U.S. Navy (Ret), former Supreme Allied Commander at NATO *In confronting the cybersecurity problem, it's important for all of us to become knowledgeable and involved. This book makes that possible -- and also fascinating. It's everything you need to know about cybersecurity, wonderfully presented in a clear and smart way. * Walter Isaacson, author of Steve Jobs *If you read only one book about 'all this cyberstuff,' make it this one. Singer and Friedman know how to make even the most complicated material accessible and even entertaining, while at the same time making a powerful case for why all of us need to know more and think harder about the (cyber)world we know live in. * Anne-Marie Slaughter, President, the New America Foundation *Singer and Friedman do a highly credible job of documenting the present and likely future risky state of cyber-affairs. This is a clarion call. * Vint Cerf, "Father of the Internet," Presidential Medal of Freedom winner *I loved this book. Wow. Until I read this astonishing and important book, I didn't know how much I didn't know about the hidden world of cybersecurity and cyberwar. Singer and Friedman make comprehensible an impossibly complex subject, and expose the frightening truth of just how vulnerable we are. Understanding these often-invisible threats to our personal and national security is a necessary first step toward defending ourselves against them. This is an essential read. * Howard Gordon, Executive Producer of 24 and co-creator of Homeland *Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging prose, weaving explanations of the elements of cybersecurity with revealing anecdotes. From the fundamentals of Internet architecture to the topical intrigue of recent security leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity landscape and what it could look like in the future. * Jonathan Zittrain, Professor of Law and Computer Science at Harvard University, author of The Future of the Internet - And How to Stop It *Cybersecurity and Cyberwar: What Everyone Needs To Know aims to demystify "cyber stuff" and arm readers - from the everyday Internet user to the policymaker - with the necessary tools to better understand cybersecurity and the threats that face it ... Essential reading for anyone interested in national security. * Politico *More than anything else, the book is a reality check If you're completely ignorant about malware and cyberattacks, this is the book for you. And if you think you know a lot about these topics, this is still the book for you. It's thorough, exhaustive, and easy to read. And it eloquently simplifies every complicated issue, challenging widespread notions about cybersecurity and cyberwar. In this extremely approachable book, Singer and Friedman may have very well told us all we need to know about cybersecurity and cyberwar. Now it's up to us all to work together to make the Internet a better place. * Mashable *The easy-to-read style, sprinkled with colloquial language, humor, and anecdotes, will make the book particularly engagingPerhaps most importantly, this book will be a significant contribution to building a deeper understanding and a common base of knowledge around cybersecurity issues. This, in turn, may serve as a foundation for enabling policymakers, scholars, and citizens to begin building a crucial dialogue and much-needed conversation around how to approach, understand, and deal with the important policy implications of cybersecurity and cyberwar. * E-International Relations *A sobering indictment of the current US cybersecurity policy, which has so far been characterized by a dangerous mix of ignorance and shrill hysteria over oft-warned-about but not-yet-realized "cyber Pearl Harbor" catastrophes ... Singer and Friedman cut through this alarmist rhetoric, demystifying technical jargon with simple questions like "How Does The Internet Actually Work?"; "What Is Hacktivism?"; and "Do We Need A Cyberspace Treaty?" The result is an honest, well-researched appraisal of the impact of cyber threats, and the potential solutions for cybersecurity. * Vice Magazine "Motherboard" *Lawyers, consider this your official warning about cybersecurity ... A thorough, comprehensible, and sometimes entertaining explanation of the digital revolution, how we got here, and what lies ahead. * NC Lawyers Weekly *An impressively comprehensive guide to one of the least understood arenas of modern life. * Popular Science *In writing Cybersecurity and Cyberwar: What Everyone Needs To Know, authors Peter W. Singer and Allan Friedman do what few cybersecurity and war scholars do: They tie together the history of the generative Internet, and its foundations in curiosity and experimentation, with the politico-military cyber security community housed in government. They connect the dots between technological traits and their insecurities. And they tell the stories of the people, not just the machines. In the book, Singer and Friedman break down to building blocks what Internet and the World Wide Web are made of, then use those to build back up to sophisticated concepts and information ... At its core, Cybersecurity and Cyberwar makes the point that cybersecurity risk is human risk. * ThinkProgress *exposes serious ignorance and incompetence in surprisingly high places. * Australia Broadcasting Corporation *Though it's concise, at 300 pages, the guide covers cyber issues, both personal and global, with easy-to-understand explanations and engaging stories. * The Charlotte Observer *The pace of global digitization, and the widespread lack of understanding of related security risks, is a ticking time bomb ... If you don't know your asymmetric cryptography from your spear phishing, this is a thoughtful introduction. * Nature *In short, this book is a genuine must-read for anyone interested in cyber security issues, regardless of their background or level of expertise. Singer and Friedman present a lucid, concise and highly informative breakdown of current cyber security matters and their implications at the global, state, corporate and individual levels. Aside from the highly informative arguments and evidence featured in this book, the style in which it is written allows it to appeal to both experts and newcomers to the subject of cyber security. We can say no more than this book is essential reading in the modern world. * Monitor *Table of Contents1. Why cyberspace is wonderfulEL and complicated ; What is cyberspace? ; Why do people talk about the difference of a networked world? ; How does the Internet actually work? ; Who owns this thing? ; WaitEL You mean no one runs the internet? ; What can governments do online? What are the limits of state power? ; Just how dependent are we on cyberspace? ; 2. Security and Insecurity Online ; What do we mean by a <"secure>" system? ; What is the difference between an attack on a network and an attack on a system? ; How does anti-virus software work? ; How do you defend a network? ; Why is anonymity a problem online? Why is it relatively easy to act without accountability? ; How can you authenticate some one to be sure they are who they say they are? ; How do we keep data secure in cyberspace? ; 3. Threats and Bad Actors ; o Differentiating threats ; o Value at risk ; What are the bad guys after? What can you really do with a computer? ; What's the worst you can do? Can a hacker really turn off the power grid? ; o Different motivations of attackers ; o Different types of attacks ; o What is Cyber Terrorism, actually? ; What does "cyberwarfare" mean? ; How are countries militarizing cyberspace? Why? ; So if we just built better systems, could we have a secure internet? ; 4. Case Studies / Examples of attacks ; o Aurora / Google {phishing, attribution} ; o Stuxnet {Critical infrastructure, intelligence} ; o Wikileaks data breach & fallout {data protection, DoS} ; o Israel-Syria Air Defense {Cyber-Kinetic Crossover, cyberwar} ; - ; 5. Why securing cyberspace is hard ; What are some mechanisms that enable us to trust systems or data? ; What is the difference between espionage and exploitation? ; Why not just write better software? ; Why can't network operators detect bad behavior? ; Why security through obscurity doesn't work ; How do we know what has happened after a cyber incident? ; How does the rise in <"cloud computing>" change the dynamics of cyber security? ; What makes mobile computing different? ; If everyone's systems are vulnerable, can't defenders just interrupt the attacker's systems? ; Why is it so hard to know who the attackers are? ; Why does attribution matter? ; How do we measure a cyber risk? ; Why aren't users able to protect themselves? ; Don't vendors and service providers have enough incentives to provide good security? ; Why aren't companies investing enough to protect themselves? ; 6. International Dimensions ; What changes when cyber problems cross international borders? ; How do countries differ in their approach to cyberspace? ; Who has the biggest cyber armies? ; What constitutes an act of war? ; How does law enforcement deal with international boundaries? ; What are existing international organizations currently doing? ; What international treaties are in place? ; Why don't the classic models of military deterrence work for cyberspace? ; What are the obstacles to international cooperation to resolve cybersecurity issues? ; 7.The path forward to a more secure cyberspace ; It sounds like every aspect of modern life is vulnerable. Are things really that bad? ; Why can't we just re-built the technology to prevent bad behavior? ; Can we impose accountability through national control of cyberspace? ; How can private firms be incentivized to internalize their risk? ; If a company or government agency was willing to invest in cyber security defenses, what would stand in their way? ; Can internet service providers do more to identity and stop bad behavior? ; How can we make it harder for bad actors to profit from successful attacks ; What can I do to protect myself?
£10.44
No Starch Press,US The Hardware Hacking Handbook: Breaking Embedded
Book SynopsisThe Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.Trade Review"I really wished such a book existed when I started with researching hardware hacking a few years ago. It introduces all the relevant background that’s needed for hardware hacking along with references to further reading (the references are really nice to have for more intermediate readers). It also provides many practical examples that helps you see why the concepts are important and how they are applied."—Yifan Lu, Security Researcher"One of the most complete introductions to hardware hacking I’ve seen . . . provide[s] you something you wouldn't learn elsewhere."—Arya Voronova, HackadayTable of ContentsIntroductionChapter 1: Dental Hygiene: Introduction to Embedded SecurityChapter 2: Reaching Out, Touching Me, Touching You: Hardware Peripheral InterfacesChapter 3: Casing the Joint: Identifying Components and Gathering InformationChapter 4: Bull in a China Shop: Introducing Fault InjectionChapter 5: Don’t Lick the Probe: How to Inject FaultsChapter 6: Bench Time: Fault Injection LabChapter 7: X Marks the Spot: EMFI Memory Dumping of TrezorChapter 8: I’ve Got the Power: Introduction to Power AnalysisChapter 9: Bench Time: Simple Power AnalysisChapter 10: Splitting the Difference: Differential Power AnalysisChapter 11: Advanced Power AnalysisChapter 12: A DPA/SCA Lab: Breaking an AES-256 BootloaderChapter 13: No Kiddin’: Real-Life ExamplesChapter 14: Think of the Children: Countermeasures, Certifications, and GoodbytesAppendix A: Maxing Out Your Credit Card: Setting Up a Test LabAppendix B: All Your Base Are Belong to Us: Popular Pinouts
£35.99
Bloomsbury Publishing PLC This Is How They Tell Me the World Ends: A True
Book SynopsisWINNER OF THE FT & McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021 The instant New York Times bestseller A Financial Times and The Times Book of the Year 'A terrifying exposé' The Times 'Part John le Carré . . . Spellbinding' New Yorker We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world’s largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable. Filled with spies, hackers, arms dealers and a few unsung heroes, This Is How They Tell Me the World Ends is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.Trade ReviewAn intricately detailed, deeply sourced and reported history of the origins and growth of the [cyberweapons] market and the global cyberweapons arms race it has sparked . . . This is no bloodless, just-the-facts chronicle. Written in the hot, propulsive prose of a spy thriller, Perlroth’s book sets out from the start to scare us out of our complacency . . . Perlroth comes at the reader hard, like an angry Cassandra who has spent the last seven years of her life unmasking the signs of our impending doom – only to be ignored again and again . . . A strong, data-driven case for action -- Jonathan Tepperman * New York Times *Perlroth is a longtime cybersecurity reporter for the New York Times, and her book makes a kind of Hollywood entrance . . . Perlroth’s storytelling is part John le Carré and more parts Michael Crichton – ‘Tinker, Tailor, Soldier, Spy’ meets ‘The Andromeda Strain’. Because she’s writing about a boys’ club, there’s also a lot of ‘Fight Club’ in this book . . . And, because she tells the story of the zero-day market through the story of her investigation, it’s got a Frances McDormand ‘Fargo’ quality, too . . . Spellbinding -- Jill Lepore * New Yorker *When the weaknesses of a system can be bought and sold, the results can be calamitous, as This Is How They Tell Me the World Ends shows . . . Engaging and troubling . . . This secretive market is difficult to penetrate, but Perlroth has dug deeper than most and chronicles her efforts wittily * Economist *A terrifying exposé of the black market in software bugs . . . Perlroth’s insider accounts provide texture and context that was often missing from news coverage at the time. Storytelling skills honed in her work as a New York Times reporter specialising in cybersecurity make them scarier, particularly because of the collateral damage . . . Yet the thrust of her commendably thorough and determined research is not the damage done, but the market in mayhem that underpins it . . . Perlroth does an admirable job in stripping away the jargon * The Times *A stemwinder of a tale of how frightening cyber weapons have been turned on their maker, and the implications for the world when everyone and anyone can now decimate everyone else with a click of a mouse . . . Perlroth takes a complex subject that has been cloaked in opaque techspeak and makes it dead real for the rest of us. You will not look at your mobile phone, your search engine, even your networked thermostat the same way again -- Kara Swisher, co-founder of Recode and New York Times opinion writerNicole Perlroth has written a dazzling and revelatory history of the darkest corner of the internet, where hackers and governments secretly trade the tools of the next war . . . This Is How They Tell Me the World Ends is a rollicking fun trip, front to back, and an urgent call for action before our wired world spins out of our control. I've covered cybersecurity for a decade and yet paragraph after paragraph I kept wondering: 'How did she manage to figure *that* out? How is she so good?'" -- Garrett M. Graff, author of 'The Only Plane in the Sky'The definitive history of cyberwarfare. Nicole Perlroth connects the dots and the behind the scenes action of every serious intrusion, cyberattack and cyberespionage revelation in the last decade -- Clint Watts, author of 'Messing With The Enemy'A must-read tale of cloak-and-dagger mercenary hackers, digital weapons of mass destruction and clandestine, ne'er-do-well government agencies -- Lawrence Ingrassia, author of 'Billion Dollar Brand Club'Usually, books like this are praised by saying that they read like a screenplay or a novel. Nicole Perlroth’s is better: her sensitivity to both technical issues and human behavior give this book an authenticity that makes its message - that cybersecurity issues threaten our privacy, our economy, and maybe our lives - even scarier -- Steven Levy, author of 'Hackers and Facebook'An essential cautionary tale [that] exposes the motivations and misgivings of the people helping governments hack into our devices. After Perlroth's incisive investigation, there's no excuse for ignoring the costs of the cyber arms race -- Sarah Frier, Bloomberg, author of 'No Filter'Wonderfully readable . . . A rip-roaring story of hackers and bug-sellers and spies -- Steven M. Bellovin, Professor of Computer Science, Columbia UniversityNicole Perlroth does what few other authors on the cyber beat can: she tells a highly technical, gripping story . . . A page-turner -- Nina Jankowicz, author of 'How to Lose the Information War'A whirlwind global tour that introduces us to the crazy characters and bizarre stories behind the struggle to control the internet. It would be unbelievable if it wasn't all so very true -- Alex Stamos, Director of the Stanford Internet Observatory and former head of security for Facebook and Yahoo
£10.44
John Wiley & Sons Inc The Art of Deception
Book SynopsisThe world''s most infamous hacker offers an insider''s view of the low-tech threats to high-tech security Kevin Mitnick''s exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world''s most notorious hacker gives new meaning to the old adage, It takes a thief to catch a thief. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustTrade Review“…authoritative…” (Retail Systems, December 2005) Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie WarGames. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security. It's not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it's a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it's a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick's description of how he actually hacked into systems. As a manual for a would-be hacker, it's dated and nonspecific -- better stuff is available on the Internet—but it teaches the timeless spirit of th e hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxication sense of power that comes from stalking and spying. (Oct.) Forecast: Mitnick's notoriety and his well written, entertaining stories should generate positive word-of-mouth. With the double appeal of a true-crime memoir and a manual for computer security, this book will enjoy good sales. (Publishers Weekly, June 24, 2002) "...an interesting read..." (www.infosecnews.com, 17 July 2002) "...highly entertaining...will appeal to a broad audience..." (Publishing News, 26 July 2002) The world's most famous computer hacker and cybercult hero, once the subject of a massive FBI manhunt for computer fraud, has written a blueprint for system security based on his own experiences. Mitnick, who was released from federal prison in 1998 after serving a 22-month term, explains that unauthorized intrusion into computer networks is not limited to exploiting security holes in hardware and software. He focuses instead on a common hacker technique known as social engineering in which a cybercriminal deceives an individual into providing key information rather than trying to use technology to reveal it. Mitnick illustrates the tactics comprising this "art of deception" through actual case studies, showing that even state-of-the-art security software can't protect businesses from the dangers of human error. With Mitnick's recommended security policies, readers gain the information their organizations need to detect and ward off the threat of social engineering. Required reading for IT professionals, this book is highly recommended for public, academic, and corporate libraries. [This should not be confused with Ridley Pearson's new thriller, The Art of Deception. —Ed]—Joe Accardi, William Rainey Harper Coll. Lib., Palatine, IL (Library Journal, August 2002) He was the FBI's most-wanted hacker. But in his own eyes, Mitnick was simply a small-time con artist with an incredible memory, a knack for social engineering, and an enemy at The New York Times. That foe, John Markoff, made big bucks selling two books about Mitnick - without ever interviewing him. This is Mitnick's account, complete with advice for how to protect yourself from similar attacks. I believe his story. (WIRED Magazine, October 2002) Kevin Mitnick spent five years in jail at the federal authorities' behest, but The Art of Deception: Controlling the Human Element of Security (Kevin Mitnick and William Simon), reveals that he was no lowly grifter. Rather, by impersonating others in order to talk guileless employees out of access protocols, Mr. Mitnick was practicing "the performance art called social engineering." While every society has had its demimonde-like the Elizabethan coney catchers who duped visitors to 16th-century London--it's in the United States that con artists assumedlegendary status. The definitive book is still The Big Con from 1940 (Anchor Books), which commemorates a golden age already receding when it was published: the grifters it describes--like the High Ass Kid and Slobbering Bob--thrived between 1914 and 1929, when technological advances and unparalleled prosperity generated a roller-coaster stock market. That sounds a lot like the past decade. So how did the culture of the con do during the Internet era? On Mr. Mitnick's evidence, it flourished and evolved. The Art of Deception is itself a bit of a fraud as far as advice on upgrading security. But the book does deliver on "social engineering" exercises. Some aren't even illegal and Mr. Mitnick -- weasel that he is -- lovingly records their most elaborate convolutions. One way or another, you'll find the information useful. (Red Herring, October 2002) "Mitnick outlines dozens of social engineering scenarios in his book, dissecting the ways attackers can easily exploit what he describes as 'that natural human desire to help others and be a good team player.'" (Wired.com, October 3, 2002) Finally someone is on to the real cause of data security breaches--stupid humans. Notorious hacker Kevin Mitnick--released from federal prison in January 2000 and still on probation--reveals clever tricks of the "social engineering" trade and shows how to fend them off in The Art of Deception: Controlling the Human Element of Security (Wiley, $27.50). Most of the book, coauthored by William Simon (not the one running for governor of California), is a series of fictional episodes depicting the many breathtakingly clever ways that hackers can dupe trusting souls into breaching corporate and personal security--information as simple as an unlisted phone number or as complicated as plans for a top-secret product under development. The rest lays out a fairly draconian plan of action for companies that want to strengthen their defenses. Takeaway: You can put all the technology you want around critical information, but all it takes to break through is one dolt who gives up his password to a "colleague" who claims to be working from the Peoria office. What's useful about this book is its explanation of risks in seemingly innocuous systems few people think about. The caller ID notification that proves you're talking to a top executive of your firm? Easily forged. The password your assistant logs in with? Easily guessed. The memos you toss into the cheap office shredder? Easily reconstructed. The extension that you call in the IT department? Easily forwarded. Physical security can be compromised, too. It's not hard to gain access to a building by "piggybacking" your way in the door amid the happy throng returning from lunch. You'd better have confidence in your IT professionals, because they're likely to have access to everything on the corporate system, including your salary and personal information. Mitnick offers some ideas for plugging these holes, like color-coded ID cards with really big photos. Implementing the book's security action plan in full seems impossible, but it's a good idea to warn employees from the boss down to the receptionist and janitors not to give out even innocuous information to people claiming to be helpful IT folks without confirming their identity--and to use things like encryption technology as fallbacks. Plenty of would-be Mitnicks--and worse--still ply their trade in spaces cyber and psychological. --S.M. (Forbes Magazine - October 14, 2002) "...the book describes how people can get sensitive information without even stepping near a computer through 'social engineering' -- the use of manipulation or persuasion to deceive people by convincing them that you are someone else." (CNN.com's Technology section, October 9, 2002) "...engaging style...fascinating true stories..." (The CBL Source, October/December 2002) "…the book describes how people can get information without even stepping near a computer…" (CNN, 16 October 2002) "…each vignette reads like a mini-cybermystery thriller…I willingly recommend The Art of Deception. It could save you from embarrassment or an even worse fate…" (zdnet.co.uk, 15 October 2002) "…details the ways that employees can inadvertently leak information that can be exploited by hackers to compromise computer systems…the book is scary in ways that computer security texts usually do not manage to be…" (BBC online, 14 October 2002) "…more educational than tell-all…" (Forbes, 2 October 2002) "…would put a shiver into anyone responsible for looking after valuable computer data…the exploits are fictional but realistic…the book is about hacking peoples heads…" (The Independent, 21 October 2002) "…the key strength of The Art of Deception is the stream of anecdotes - with explanations about how and why hacks succeed…provides a solid basis for staff training on security…" (Information Age, October 2002) "…should be on the list of required reading. Mitnick has done an effective job of showing exactly what the greatest threat of attack is - people and their human nature…" (Unix Review, 18 October 2002 "…disturbingly convincing…" (Fraud Watch, Vol.10, No.5, 2002 "…the worlds most authoritative handbook…an unputdownable succession of case studies…chilling…trust me, Kevin Mitnick is right…" (Business a.m, 29 October 2002) "…a damn good read…I would expect to see it as required reading on courses that cover business security…Should you read this book? On several levels the answer has to be yes. If you run your own business, work in one, or just want a good read, this is worth it…" (Acorn User, 29 October 2002) "...the analysis of individual cases is carried out thoroughly...ultimately, the value of the book is that it may encourage security managers to be more assiduous in teaching their staff to check the identities of the people they deal with, and better corporate security will be the result..." (ITWeek, 1 November 2002) "...a penetrating insight into the forgotten side of computer security..." (IT Week, 4 November 2002) "...a highly entertaining read...Mitnick has a laid-back style which makes the book easy to read and of great interest, even to those of us who have no interest in computers..." (Business Age, September 2002) "...one of the hacker gurus of our time...makes it abundantly clear that everyone can be fooled and cheated by the professionals...." (The Times Higher Education Supplement, 15 November 2002) "...focuses on teaching companies how to defeat someone like him…full of specific examples of the ways apparently innocent bits of information can be stitched together to mount a comprehensive attack on an organisation's most prized information..." (New Scientist, 23 November 2002) "...all simple things, little titbits of seemingly innocuous information, which when gathered together give the hacker the power to cripple the biggest corporation or the smallest home business..." (New Media Age, 14 November 2002) "…highly acclaimed…a fascinating account…" (Information Security Management, November 2002) "...His new book, The Art of Deception, presents itself as a manual to help companies defeat hackers..." Also listed in recommended reading list (The Guardian, 13 December 2002) “…gets it’s point across and contains some valuable pointers…”(MacFormat, January 2003) “…supremely educational…a sexy way to hammer home a relevant point…what makes it sing is the clear information that Mitnick brings to the table…”(Business Week, 8 January 2003) “…Indispensable…”(Focus, February 2003) "...incredibly intriguing...a superb book which would be beneficial for anyone to read..." (Telecomworldwire, 4 February 2003) "...a good overview of one of the most neglected aspects of computer security..." (Technology and Society, 7 February 2003) "...fascinating to read...should strike fear into the hearts of commercial computer security departments..." (Business Week, 3 September 2003) "...a penetrating insight into the forgotten side of computer security..." (Accountancy Age, 19 February 2003) Top 10 Popular Science Books (New Scientist, 21 February f2003) "...should be assigned as required reading in every IT department...excellent advice..." (Electronic Commerce Guide, 12 February 2003) “…an interesting and educational read for anyone with a role to play in corporate security…”(Computer Business Review, 6 March 2003) “…if you were not having security nightmares before, read this book and you certainly will…” (IT Showcase News, 6 March 2003) “….easy to understand and actually fun to read…”(Slashdot, 6 March 2003) “…a good read, well written…” (Managing Information, March 2003) “…structured like a mini detective story series…the unfolding attacks are compulsive reading…” (Aberdeen Evening Express, 7 June 21003) “…a real eye-opener…well written and produced…an easy and valuable read…” (Accounting Web, 19 June 2003) “…a superb book which would be beneficial for anyone to read…” (M2 Best Books, 4 February 2003) “…the insights for earlier chapters are fascinationg, and that alone makes it worth blagging a copy for review…”(Mute, Summer/Autumn 2003) “…a good read, well-written…this accessibility makes it doubly important…” (Managing Information – 5 star rating, October 2003)Table of ContentsForeword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information Security Policies. Security at a Glance. Sources. Acknowledgements. Index.
£27.00
Pearson Education (US) Hackers Delight
Book SynopsisHenry S. Warren, Jr., has had a fifty-year career with IBM, spanning from the IBM 704 to the PowerPC and beyond. He has worked on various military command and control systems and on the SETL (SET Language) project under Jack Schwartz. Since 1973, Hank has been with IBM's Research Division, focusing on compilers and computer architectures. He currently works on a supercomputer project aimed at an exaflop. Hank received his Ph.D. in computer science from the Courant Institute at New York University.Trade Review“This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves a spot on your shelf right next to Knuth. In the ten years since the first edition came out, it’s been absolutely invaluable to my work at Sun and Google. I’m thrilled with all of the new material in the second edition.” — Joshua Bloch “When I first saw the title, I figured that the book must be either a cookbook for breaking into computers (unlikely) or some sort of compendium of little programming tricks. It’s the latter, but it’s thorough, almost encyclopedic, in its coverage. The second edition covers two new major topics and expands the overall collection with dozens of additional little tricks, including one that I put to use right away in a binary search algorithm: computing the average of two integers without risking overflow. This hacker is indeed delighted!” — Guy SteeleTable of ContentsForeword xiii Preface xv Chapter 1: Introduction 1 1.1 Notation 1 1.2 Instruction Set and Execution Time Model 5 Chapter 2: Basics 11 2.1 Manipulating Rightmost Bits 11 2.2 Addition Combined with Logical Operations 16 2.3 Inequalities among Logical and Arithmetic Expressions 17 2.4 Absolute Value Function 18 2.5 Average of Two Integers 19 2.6 Sign Extension 19 2.7 Shift Right Signed from Unsigned 20 2.8 Sign Function 20 2.9 Three-Valued Compare Function 21 2.10 Transfer of Sign Function 22 2.11 Decoding a “Zero Means 2**n” Field 22 2.12 Comparison Predicates 23 2.13 Overflow Detection 28 2.14 Condition Code Result of Add, Subtract, and Multiply 36 2.15 Rotate Shifts 37 2.16 Double-Length Add/Subtract 38 2.17 Double-Length Shifts 39 2.18 Multibyte Add, Subtract, Absolute Value 40 2.19 Doz, Max, Min 41 2.20 Exchanging Registers 45 2.21 Alternating among Two or More Values 48 2.22 A Boolean Decomposition Formula 51 2.23 Implementing Instructions for all 16 Binary Boolean Operations 53 Chapter 3: Power-of-2 Boundaries 59 3.1 Rounding Up/Down to a Multiple of a Known Power of 2 59 3.2 Rounding Up/Down to the Next Power of 2 60 3.3 Detecting a Power-of-2 Boundary Crossing 63 Chapter 4: Arithmetic Bounds 67 4.1 Checking Bounds of Integers 67 4.2 Propagating Bounds through Add’s and Subtract’s 70 4.3 Propagating Bounds through Logical Operations 73 Chapter 5: Counting Bits 81 5.1 Counting 1-Bits 81 5.2 Parity 96 5.3 Counting Leading 0’s 99 5.4 Counting Trailing 0’s 107 Chapter 6: Searching Words 117 6.1 Find First 0-Byte 117 6.2 Find First String of 1-Bits of a Given Length 123 6.3 Find Longest String of 1-Bits 125 6.4 Find Shortest String of 1-Bits 126 Chapter 7: Rearranging Bits And Bytes 129 7.1 Reversing Bits and Bytes 129 7.2 Shuffling Bits 139 7.3 Transposing a Bit Matrix 141 7.4 Compress, or Generalized Extract 150 7.5 Expand, or Generalized Insert 156 7.6 Hardware Algorithms for Compress and Expand 157 7.7 General Permutations, Sheep and Goats Operation 161 7.8 Rearrangements and Index Transformations 165 7.9 An LRU Algorithm 166 Chapter 8: Multiplication 171 8.1 Multiword Multiplication 171 8.2 High-Order Half of 64-Bit Product 173 8.3 High-Order Product Signed from/to Unsigned 174 8.4 Multiplication by Constants 175 Chapter 9: Integer Division 181 9.1 Preliminaries 181 9.2 Multiword Division 184 9.3 Unsigned Short Division from Signed Division 189 9.4 Unsigned Long Division 192 9.5 Doubleword Division from Long Division 197 Chapter 10: Integer Division By Constants 205 10.1 Signed Division by a Known Power of 2 205 10.2 Signed Remainder from Division by a Known Power of 2 206 10.3 Signed Division and Remainder by Non-Powers of 2 207 10.4 Signed Division by Divisors ≥ 2 210 10.5 Signed Division by Divisors ≤ —2 218 10.6 Incorporation into a Compiler 220 10.7 Miscellaneous Topics 223 10.8 Unsigned Division 227 10.9 Unsigned Division by Divisors ≥ 1 230 10.10 Incorporation into a Compiler (Unsigned) 232 10.11 Miscellaneous Topics (Unsigned) 234 10.12 Applicability to Modulus and Floor Division 237 10.13 Similar Methods 237 10.14 Sample Magic Numbers 238 10.15 Simple Code in Python 240 10.16 Exact Division by Constants 240 10.17 Test for Zero Remainder after Division by a Constant 248 10.18 Methods Not Using Multiply High 251 10.19 Remainder by Summing Digits 262 10.20 Remainder by Multiplication and Shifting Right 268 10.21 Converting to Exact Division 274 10.22 A Timing Test 276 10.23 A Circuit for Dividing by 3 276 Chapter 11: Some Elementary Functions 279 11.1 Integer Square Root 279 11.2 Integer Cube Root 287 11.3 Integer Exponentiation 288 11.4 Integer Logarithm 291 Chapter 12: Unusual Bases For Number Systems 299 12.1 Base —2 299 12.2 Base —1 + i 306 12.3 Other Bases 308 12.4 What Is the Most Efficient Base? 309 Chapter 13: Gray Code 311 13.1 Gray Code 311 13.2 Incrementing a Gray-Coded Integer 313 13.3 Negabinary Gray Code 315 13.4 Brief History and Applications 315 Chapter 14: Cyclic Redundancy Check 319 14.1 Introduction 319 14.2 Theory 320 14.3 Practice 323 Chapter 15: Error-Correcting Codes 331 15.1 Introduction 331 15.2 The Hamming Code 332 15.3 Software for SEC-DED on 32 Information Bits 337 15.4 Error Correction Considered More Generally 342 Chapter 16: Hilbert's Curve 355 16.1 A Recursive Algorithm for Generating the Hilbert Curve 356 16.2 Coordinates from Distance along the Hilbert Curve 358 16.3 Distance from Coordinates on the Hilbert Curve 366 16.4 Incrementing the Coordinates on the Hilbert Curve 368 16.5 Non-Recursive Generating Algorithms 371 16.6 Other Space-Filling Curves 371 16.7 Applications 372 Chapter 17: Floating-Point 375 17.1 IEEE Format 375 17.2 Floating-Point To/From Integer Conversions 377 17.3 Comparing Floating-Point Numbers Using Integer Operations 381 17.4 An Approximate Reciprocal Square Root Routine 383 17.5 The Distribution of Leading Digits 385 17.6 Table of Miscellaneous Values 387 Chapter 18: Formulas For Primes 391 18.1 Introduction 391 18.2 Willans’s Formulas 393 18.3 Wormell’s Formula 397 18.4 Formulas for Other Difficult Functions 398 Answers To Exercises: 405 Appendix A: Arithmetic Tables For A 4-Bit Machine 453 Appendix B: Newton's Method 457 Appendix C: A Gallery Of Graphs Of Discrete Functions 459 C.1 Plots of Logical Operations on Integers 459 C.2 Plots of Addition, Subtraction, and Multiplication 461 C.3 Plots of Functions Involving Division 463 C.4 Plots of the Compress, SAG, and Rotate Left Functions 464 C.5 2D Plots of Some Unary Functions 466 Bibliography 471 Index 481
£40.04
No Starch Press,US Linux Basics For Hackers: Getting Started with
Book SynopsisMany aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.Trade Review"The information provided can help even a general user to get more comfortable with the Linux operating system without feeling overwhelmed by more complex, security-related topics and usage. While we could all benefit from more attention to security, Linux Basics for Hackers just might inspire the next crop of budding techies into the security rock stars of tomorrow."—Tim Everson, The Ethical Hacker Network"If you're just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your cybersecurity skills."—Sandra Henry-Stocker, Network World"Linux Basics for Hackers is immediately practical. Its quick and dirty approach to exploring and using a Linux system was welcome."—Jesse Smith, DistroWatch Weekly"If you are starting out in Computer Science and want to get up to speed quickly on Linux and Unix like operating systems, working through this book will put you well ahead of your fellow students, and quickly."—Greg Laden, Greg Laden's Blog"A great guide for those who are not familiar with Linux as well as those who are proficient."—Davin Jackson, Alpha Cyber Security, Books to Start Your Penetration Testing Journey"Linux Basics for Hackers is the best book for Jr. penetration testers and newbies who want to learn InfoSec. Though aimed at hacking, it's the best general intro to Linux I've read. Gives a great overview of Linux basics and useful terminal commands."—@hackerb0t "For an absolute beginner . . . this is a must read book. It breaks concepts down so simply . . . this book flies by and builds a foundation of knowledge for you to continue building on."—Matthew Hacks "A great intro to so many different parts of the Linux OS." —Michael Kaplan, Amazon Reviewer"Extremely well written, covers a broad variety of information and does a great job covering the basics." —The Security Noob"I highly recommend this book for anyone starting their cybersec journey."—Steve[INIT]
£28.49
Taylor & Francis Cybercrime and Digital Forensics
This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: â key theoretical and methodological perspectives; â computer hacking and malicious software; â digital piracy and intellectual theft; â economic crime and online fraud; â pornography and online sex crime; â cyber-bullying and cyber-stalking; â cyber-terrorism and extremism; â the rise of the Dark Web;â digital forensic investigation and its legal context around the world; â the law enforcement response to cybercrime transnationally; â cybercrime policy and legislation across the globe. The new edition has
£34.19
Penguin Books Ltd Rinsed
Book Synopsis'Rinsed is a triumph. If you want to understand how the chaotic world around us really works, read this book!' MILES JOHNSON, AUTHOR OF CHASING SHADOWS'A riveting look at not only the nuts and bolts of cons and crimes but the techniques detectives use to stalk cyber criminals' FINANCIAL TIMES'Gripping' THE ECONOMIST There's an old saying: 'a rising tide lifts all boats'. It's normally couched in positive terms; that overall economic improvement will benefit everyone. In the case of hi-tech money laundering, however, it offers a dark vision of the future. The better these launderers become at their work, the more crime of all types will be enabled. It's time to understand where the water is rising, before it washes over us all. Money laundering has been around for centuries. For as long as people have been willing to steal money, there's been an industry ready to wash it. But recent tech innovations have created vastly complex new systems for laundering that threaten to overwhelm auth
£12.32
Taylor & Francis Ltd Cybersecurity Awareness Among Students and
Book SynopsisRecipient of the SJSU San Jose State University Annual Author & Artist Awards 2019In modern times, all individuals need to be knowledgeable about cybersecurity. They must have practical skills and abilities to protect themselves in cyberspace. What is the level of awareness among college students and faculty, who represent the most technologically active portion of the population in any society? According to the Federal Trade Commission's 2016 Consumer Sentinel Network report, 19 percent of identity theft complaints came from people under the age of 29. About 74,400 young adults fell victim to identity theft in 2016. This book reports the results of several studies that investigate student and faculty awareness and attitudes toward cybersecurity and the resulting risks. It proposes a plan of action that can help 26,000 higher education institutions worldwide with over 207 million college students, create security policies and educational programs that Table of Contents1. Introduction. 2. Research Methodology. 3. General Cybersecurity Awareness Among College Student Surveys. 4. Field Studies.
£52.24
Taylor & Francis Cybercrime and Digital Forensics
Book SynopsisThis book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a facilitator for social relationships between deviants and criminals. It includes coverage of: key theoretical and methodological perspectives; computer hacking and malicious software; digital piracy and intellectual theft; economic crime and online fraud; pornography and online sex crime; cyber-bullying and cyber-stalking; cyber-terrorism and extremism; the rise of the Dark Web; digital forensic investigation and its legal context around the world; the law enforcement response to cybercrime transnationally; cybercrime policy and legislation across the globe. The new edition has been revisTrade Review"The third edition of Cybercrime and Digital Forensics presents an updated and vital introduction to key topics in the study of cybercrime. The authors deliver an accessible textbook for students and a foundational resource for those new to the field, with expanded content on cyberwarfare and illicit markets, among other case studies. Cybercrime and Digital Forensics remains a comprehensive and must-read sourcebook in the field of cybercrime." Anastasia Powell, Associate Professor of Criminology and Justice Studies, RMIT University, Australia"The new edition of Cybercrime and Digital Forensics continues to provide a foundation for the study of cybercrime and the government’s response to it. Moreover, the new material demonstrates that the authors have kept up with research and trends on cybercrime as they discuss the emergence of cyberwarfare and the role of the Dark Web in supporting illicit markets. As the demand for cybersecurity specialists grows, this book is a needed primer that covers theoretical, empirical, and practical knowledge for the next generation of professionals."George W. Burruss, PhD, Department of Criminology and Cyber Florida, University of South Florida, USA"With its broad scope and the captivating style, this new edition of Cybercrime and Digital Forensics is a timely update of this seminal book, which remains a key reference point for anyone – scholars and professionals alike – looking for an introduction to cybercrimes." Anita Lavorgna, PhD, SFHEA, Associate Professor in Criminology, University of Southampton, UK"Cybercrime is a complex phenomenon that blends technical, social and policy dimensions interacting in novel ways. This book presents this complexity in an approachable format and highlights its most salient features to learners from different backgrounds. The authors distill decades of cybercrime expertise in a volume that enables the reader to link practical material with theoretical insights. The abundance of international examples also ensures this book provides students with a truly global perspective on cybercrime." Benoît Dupont, Professor of Criminology and Canada Research Chair in Cybersecurity, Université de Montréal, CanadaTable of Contents1. Technology and Cybercrime2: Law Enforcement, Privacy, and Security in Dealing with Cybercrime 3. Computer Hackers and Hacking4. Malware and Automated Computer Attacks 5. Digital Piracy and Intellectual Property Theft6. Online Fraud 7. Pornography, Image-Based Sexual Abuse, and Prostitution8. Child Sexual Exploitation Material Offenses9. Cyberbullying, Online Harassment, and Cyberstalking 10. Online Extremism and Cyberterror 11. Cyberwarfare and Information Operations Online12. Illicit Market Operations Online13. Cybercrime and Criminological Theories 14. Evolution of Digital Forensics15. Acquisition and Examination of Forensic Evidence16. Legal Challenges in Digital Forensic Investigations 17. The Future of Cybercrime, Terror, and Policy
£128.25
Taylor & Francis Ltd Cybersecurity in the COVID19 Pandemic
Book SynopsisThis book demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data.Table of Contents1. COVID-19 Pandemic, the Game Changer2. Nature3. Cybersecurity Roles in a Pandemic4. Cyberspace at Risk5. Challenges of Managing Cybersecurity at Covid-196. Cyberattack Mitigations During the Pandemic7. Cybersecurity in Post Covid-19 Digital Era8. Conclusion and Recommendations
£18.99
John Wiley & Sons Inc Computer Forensics JumpStart
Book SynopsisEssential reading for launching a career in computer forensics Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field. Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crime Details the ways to conduct a computer forensics investigation Highlights tips and techniques for finding hidden data, capturinTable of ContentsIntroduction. Chapter 1 The Need for Computer Forensics. Chapter 2 Preparation—What to Do Before You Start. Chapter 3 Computer Evidence. Chapter 4 Common Tasks. Chapter 5 Capturing the Data Image. Chapter 6 Extracting Information from Data. Chapter 7 Passwords and Encryption. Chapter 8 Common Forensic Tools. Chapter 9 Pulling It All Together. Chapter 10 How to Testify in Court. Appendix A Answers to Review Questions. Appendix B Forensic Resources. Appendix C Forensic Certifications and More. Appendix D Forensic Tools 289 Glossary. Index.
£18.39
John Wiley & Sons Inc Masters of Deception
Book SynopsisWhite-collar criminals continue to pick our pockets to the tune of$300 billion every year. These ''socially acceptable'' criminals robmore from companies and individuals with a pen or key stroke than astreet thug can plunder with a high-powered pistol. --from theIntroduction In Masters of Deception, former special agent and intelligenceofficer Louis Mizell addresses the growing problem of white-collarcrime in America. Using actual cases, Mizell exposes scores ofperpetrators and their modus operandi, and offers invaluable adviceon what to look for, how to avoid being a victim, and how to fightback. Praise for Louis Mizell and Masters of Deception Mizell stands out as a true expert in crime and terrorism whoearned his title fighting the bad guys in back alleys, courts,corporate suites, and the new global economy. No one else out therecan match his knowledge of what the bad guys are doing and how.--James Grady, author of Six Days of the Condor and WhiteFlameTable of ContentsStealing Education. The Medical Maelstrom. Dishonest Lawyers. Cheating Charities. Insurance Fraud. The Religious Ruse. The Banking Mess. Appendix. Index.
£19.20
Kogan Page Ltd Cyber Wars
Book SynopsisCharles Arthur is a freelance journalist, and author of Digital Wars: Apple, Google, Microsoft and the Battle for the Internet, published by Kogan Page. From 2005-2014 he was technology editor at The Guardian newspaper, where he worked on coverage of scores of stories including Wikileaks, Anonymous, and LulzSec. Previously he was science and technology editor at The Independent, and before that worked at New Scientist, Business Magazine and Computer Weekly.Trade Review"A terrifying analysis of the dark cyber underworld." * Aleks Krotoski, BAFTA and Emmy winner and presenter and writer of the BBC series Digital Human *"Timely, well-written, informed, and entertaining. Reading this book will place you amongst those who really know where history suggests we are heading with cyber security. It won't surprise you to know the prospect isn't pretty. Essential reading for everyone who uses technology - and these days that's everyone." * Tim Vincent, CEO, Observer Solutions, and co-founder of the International Operational Technology Security Association *"Drawing lessons from the avoidable mistakes of others, Arthur presents insights into the greatest information security failures of our time that no business of any size can afford to ignore." * Simon Moores, Chair, Annual International eCrime Congress, and visiting lecturer, Computing, Digital Forensics and Cybersecurity, Canterbury Christ Church University *"This is not a difficult review for me to write as I absolutely loved this book which covered a number of the widest reported online frauds of the last twenty or so years and what was learned from them. It has certainly made think about my own online security and I suggest it will do likewise to others that read this. A solid five star effort." * Alan Gordon, NetGalley Reviewer *"I found it a fascinating book. I wish that all history books were so inviting and intelligent." * Books In Brogan, NetGalley Reviewer *"Charles Arthur's Cyber Wars takes the reader through some well-known and not so well-known hacks: Sony Pictures, HBGary, John Podesta's inbox, TJX, ransomware, TalkTalk, and Mirai. Each chapter concludes with some lessons and suggestions, but the reality is that we will never make every system secure. We can simply make it a tad harder for the hackers to penetrate "our space" and either gain access to our data or lock us out from it. The tales of woe told here explore the range of tools hackers have used. For those of us with zero hacking skills it's an enlightening, if depressing, read." * Brenda Jubin, Reading the Markets, NetGalley Reviewer *Table of Contents Chapter - 00: Introduction; Chapter - 01: Sony – Systems Wiped, Internal Documents Leaked and Network Completely Shut Down by "The Guardians of Peace"; Chapter - 02: TalkTalk – 157,000 Customer Details Stolen by a Hacker; Chapter - 03: John Podesta – Gmail Account Hacked and Emails Sent to Wikileaks; Chapter - 04: Mirai – The DDOS Hack that Revealed the Vulnerability of Internet of Things Devices; Chapter - 05: HBGary – The Security Company Brought Down by Anonymous; Chapter - 06: TK Maxx – 94m Credit Card Details Stolen; Chapter - 07: Ransomware – Using Cryptography as a Weapon to Hold Your Data Hostage; Chapter - 08: Conclusion
£16.99
Taylor & Francis Ltd The Human Factor of Cybercrime
Book SynopsisCybercrimes are often viewed as technical offenses that require technical solutions, such as antivirus programs or automated intrusion detection tools. However, these crimes are committed by individuals or networks of people which prey upon human victims and are detected and prosecuted by criminal justice personnel. As a result, human decision-making plays a substantial role in the course of an offence, the justice response, and policymakers'' attempts to legislate against these crimes. This book focuses on the human factor in cybercrime: its offenders, victims, and parties involved in tackling cybercrime. The distinct nature of cybercrime has consequences for the entire spectrum of crime and raises myriad questions about the nature of offending and victimization. For example, are cybercriminals the same as traditional offenders, or are there new offender types with distinct characteristics and motives? What foreground and situational characteristics influence the dTable of ContentsPart I: Background; 1. It ain’t what it is, its the way that they do it? Why we still don’t understand cybercrime Mike McGuire; 2. Contributions of Criminological Theory to the Understanding of Cybercrime Offending and Victimization Adam Bossler; 3. The Open And Dark Web: Facilitating Cybercrime And Technology-Enabled Offenses Claudia Flamand and David Décary-Hétu; Part II: Victims; 4. Predictors of Cybercrime Victimization: Causal Effects or Biased Associations? Steve van de Weijer; 5. Virtual Danger: An Overview of Interpersonal Cybercrimes Jordana Navarro; 6. Sexual Violence in Digital Society: Understanding the Human and Technosocial Factors Anastasia Powell, Asher Flynn and Nicola Henry; Part III: Offenders; 7. Cybercrime subcultures: Contextualizing offenders and the nature of the offence Thomas J. Holt; 8. On Social Engineering Kevin Steinmetz, Richard Goe, and Alexandra Pimentel; 9. Contrasting cyber-dependent and traditional offenders: a comparison on criminological explanations and potential prevention methods Marleen Weulen Kranenbarg; 10. Financial cybercrimes and situational crime prevention Rutger Leukfeldt and Jurjen Jansen; 11. Modelling Cybercrime Development: The case of Vietnam Jonathan Lusthaus; 12. Humanizing the Cybercriminal: Markets, Forums, and the Carding Subculture Craig Webber and Michael Yip; 13. The Roles of ‘Old’ and ‘New’ Media Tools and Technologies in the Facilitation of Violent Extremism and Terrorism Ryan Scrivens and Maura Conway; 14. Child Sex Abuse Images and Exploitation Materials Roderic Broadhurst; Part IV : Policing; 15. Policing Cybercrime: Responding to the Growing Problem and Considering Future Solutions Cassandra Dodge and George Burruss; 16. Responding to individual fraud: Perspectives of the Fraud Justice Network Cassandra Cross; 17. The Ecology of Cybercrime Benoît Dupont; 18. Displacing big data: How criminals cheat the system Alice Hutchings, Sergio Pastrana and Richard Clayton
£37.99
Taylor & Francis Ltd Against Cybercrime
Book SynopsisThis book advances a theoretically informed realist criminology of computer crime. Looking beyond current strategies of online crime control, this book argues for a new sort of policy that addresses the root causes of computer crime and criminality, reduces the harms experienced by the victims of such crimes, and does not unduly contribute to state and corporate power and surveillance.Drawing both on the proponents of realist criminology and on those who have leveled critiques of the approach, Steinmetz illustrates the contours of a realist criminology of computer crime by considering definitions of harm with online crime, the idiosyncrasies of online locality and community, the social relations of computer crime, the tension between piecemeal reform and structural changes, and other matters. Furthermore, Steinmetz surveys the methodological dimensions of computer crime research, offers a critique of positivist computational criminology, and posits an agenda for computer crimTrade Review'Steinmetz performs two impressive feats here – revitalizing realist criminology through an incisive engagement with pragmatism, and then mobilizing it to develop a digital criminology that is both realistic about online harms and critical about the workings of power. The result? A major advance in our understanding of crime and technology.'Majid Yar, Professor Emeritus of Criminology, Lancaster University 'Intellectually generous and seductively synthetic, Steinmetz’s Against Cybercrime dares to imagine a new criminology of online worlds. Rejecting rigidity and abstraction, he offers instead a powerful mix of realist criminology, cultural criminology, and pragmatism designed to situate the particulars of digital crime within larger contemporary forces.'Jeff Ferrell, Author of Drift: Illicit Mobility and Uncertain Knowledge.'Against Cybercrime is well-thought-out, provocatively written, and provides a timely and exciting contribution to an under-theorized area in criminology. Steinmetz’s "realist criminology of computer crimes" implores us to address the root causes of crime through harm-reduction strategies that avoid increasing state power and surveillance. This is an important book - a must-read for academics and policymakers, alike.' Jayne Mooney, Professor of Sociology, John Jay College of Criminal Justice and the Graduate Center, CUNY'Against Cybercrime engages readers in a frank, compelling, and accessible conversation about the need to take computer crimes seriously while taking privacy, freedom, and related matters seriously. Readers will walk away with a greater understanding of the challenges associated with computer crime and demand more concrete solutions, as Steinmetz proposes, than what other cybercriminology perspectives currently provide.'Jordana Navarro, Assistant Professor of Criminal Justice, The CitadelTable of ContentsAcknowledgmentsIntroductionPART I: FoundationsRealist Criminology: An OverviewEschewing Critical RealismEmbracing PragmatismPART II: A Realist Criminology of Computer CrimeToward a Realist Criminology of Computer CrimeThe Mundanity of Computational CriminologyRealist Criminological Methods What Is to be Done about Computer Crime?Where Do We Go from Here?Index
£128.25
Taylor & Francis Ltd The Dark Mafia
Book SynopsisThis book explores how organized crime has adapted and evolved in sync with ever-expanding technologies to update its popular image and to conduct its covert operations. It shows how organized crime operates in dark virtual spaces and how it can now form a dynamic interactive system with legitimate online spaces, solidifying its criminal exploits and resources, and making them attractive to a new generation of computer users. Focusing on Italian Mafias, Russian and Georgian criminal groups and drug cartels, and Asian crime syndicates such as Yakuza and Triads, this book aims to describe and explain the reasons behind the continuity of online and offline crime, taking into consideration whether or not internet culture has radically changed the way we perceive organized crime and if so how, and thus how the shift in popular imagery that the internet has brought about affects its actual illegal activities. We also consider how organized crime has shifted its locale from the physical to the virtual, how cybercrime has allowed criminal organizations to adapt and reinvent themselves, and how the police now use technology against organized crime.To better understand the new generation of criminals, it is becoming increasingly urgent to understand the latest technologies and how criminals utilize them. The Dark Mafia is an engaging and accessible introduction to understanding virtual organized crime. It will appeal to students and scholars of criminology, sociology, policing, and all those interested in the digital age of organized crime.Trade Review"Nicaso and Danesi provide an excellent, empirically rich insight into the complexities of organized crime groups in the digital field. Their book is a refreshing and engaging addition to both cybercrime and organized crime literature."Anita Lavorgna, Associate Professor, University of BolognaTable of ContentsIntroduction 1.The Mafia in Cyberspace 2.Hybrid Criminality 3. Dark Mafia 4. Cool Mafia 5.From Mythologies to Memetics and Beyond
£34.19
Taylor & Francis Global Financial Investigations
Book SynopsisAdopting a case-based approach, Global Financial Investigations introduces readers to the fascinating world of forensic accounting and investigating transnational financial crimes, providing an overview of core concepts and current industry trends, together with practical guidance to equip students with the knowledge required to combat complex financial crimes.By exploring the different types of financial investigations led by various law enforcement agencies, this accessible text covers a breadth of forensic accounting and broader financial crime issues, from investigating illicit trade and reconstructing financial records, to conducting regulatory investigations. Supported by real-world cases from different geographic regions, students will learn the practical hands-on forensic accounting and financial investigation skills required in todayâs work environment.Learning features include: a wealth of practical examples highlighting explanations of the
£44.64
Taylor & Francis Ltd Dark World
Book SynopsisDiscover the hidden depths of the digital underworld in this comprehensive, interdisciplinary exploration of the dark web.Ideal for security agencies, professionals, counter-terrorism experts, and policymakers alike, this work offers invaluable insights that will enhance understanding and fortify strategies. By shedding particular light on the nuances of the dark market,' this book provides readers with a detailed understanding of the dark web, encompassing both its sinister underbelly and unexpected potential.This book also uncovers the latest trends and cutting-edge mitigation techniques. From illicit transactions to thriving business ventures, it examines the key domains and sectors that thrive within this clandestine environment. This book consolidates myriad perspectives on security and threats on the dark web.Table of Contents1. Cybersecurity and The Dark Web. 2. A Guide to The Dark and Deep Web. 3. Dark Web Access with TOR Browser. 4. The Dark Web's Perils. 5. Cybercrime on The Dark Web. 6. Red Room Deep Web. 7. Terrorist Acts on The Surface and Dark Web. 8. Dark Web Markets. 9. We Are Anonymous. 10. Hitman for Hire. 11. The Positive and Evil Side of The Dark Web. 12. Techniques for Analyzing Dark Web Content. 13. Information Extraction from Dark Web Contents and Logs. 14. Dark Web Forensics. 15. OSINT Opensource Intelligence. 16. Emerging Dark Web Trends and Mitigation Techniques. 17. The Dark Web's Future. 18. Your Business on The Dark Web. Glossary. Bibliography.
£42.74
Taylor & Francis Ltd The Link between Specific Forms of Online and
Book SynopsisThis book features the empirical work of internationally known scholars, providing an in-depth examination of the overlap between online and offline victimization and offending.The vast expanse of the Internet has provided a limitless playground for offenders to prey on those unaware of their predators, or well as those who are intimately familiar with their offenders. However, the Internet does not isolate offenders into mutually exclusive categories. Instead, it has allowed many offenders to use both offline and online platforms to commit crime. It also opened up more opportunity for violation of victims. This volume features two divisions of the American Society of Criminology, the Division of Victimology and Division of Cybercrime, who have joined forces to sponsor a special issue on the overlap between forms of online and offline victimization and offending. International scholars in this book provide a notable spectrum of different forms of this phenomenon, as well as pTable of ContentsIntroduction 1. Intimate Risks: Examining Online and Offline Abuse, Homicide Flags, and Femicide 2. Deepfakes and Domestic Violence: Perpetrating Intimate Partner Abuse Using Video 3. Assessing the Overlap between Cyberstalking Victimization and Face-to-face Sexual Victimization among South Korean Middle and High School Students 4. Mapping as Harm Reduction: Using GIS to Map Chatter Associated with Sex Work 5. Self-Control, Risky Behavior, and Dating Application-Facilitated Victimization by 6. Understanding the Overlap of Online Offending and Victimization: Using Cluster Analysis to Examine Group Differences 7. Exploring Fear of Crime for Those Targeted by Romance Fraud 8. Online Consumer Fraud Victimization and Reporting: A Quantitative Study of the Predictors and Motives 9. The Financial Leash: Cyberfinancial Abuse within Intimate Relationships 10. Adapting and Applying Offline Theory to Online Victimization: A Test of the Shadow of Sexual Assault Hypothesis with Fear of Online Victimization 11. Convergence of Traditional and Online Property Crime Victimization in a City with Little Offline Crime
£128.25
CRC Press The CISO Playbook
Book SynopsisA CISO is the ultimate guardian of an organization''s digital assets. As a cybersecurity leader ,a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, and effective communication skills. The ever-evolving cyberthreat landscape demands a resilient, proactive approach coupled with a keen ability to anticipate attack angles and implement protective security mechanisms. Simultaneously, a cybersecurity leader must navigate the complexities of balancing security requirements with business objectives, fostering a culture of cybersecurity awareness, and ensuring compliance with regulatory frameworks.The CISO Playbook aims to provide nothing but real-world advice and perspectives to both up-and-coming cybersecurity leaders as well as existing ones looking to grow. The book does not approach cybersecurity leadership from the perspective of the academic, or what it should be, but more from that which it really is. Moreover, it
£42.74
CRC Press Systematic Security
Book SynopsisIn todayâs rapidly evolving digital landscape, safeguarding critical data and systems has never been more vitalâor more challenging. Systematic Security: A CISOâs Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation.Timur begins with describing the current state of security and the landscape security professionals find themselves in that offer both opportunity and risk. He goes on to systematically address strategic design, operational efficiency, risk-based modeling, and a rapidly growing regulatory landscape. This essential resource provides step-by-step strategies for implementing a comprehensive security framework. Whether you're launching a new security program or transforming an existing one, this book delivers actionable insights on governance, compliance, and advanced security operations.Drawing on years of hands-on experience, Timur shares practical advice on: Establishing a structured roadmap with clear milestones and deliverables. Building effective governance and compliance teams to address evolving regulations. Developing security operations through advanced techniques like Zero Trust and Data Protection Capabilities. Navigating complex relationships with stakeholders, executives, and regulators. Creating metrics and scorecards to measure and continuously improve security posture. More than just a technical manual, Systematic Security is a leadership toolkit for todayâs security executives. It highlights the mindset, collaboration, and communication skills needed to succeed in high-pressure environments. With tips on presenting to boards, handling audits, and managing compliance, this book prepares readers for the challenges of modern cybersecurity leadership.Whether youâre an aspiring CISO, a security professional, or a business leader looking to fortify your organizationâs defenses, Systematic Security delivers the strategies and tools to create lasting security excellence.Timur Qaderâs candid, experience-driven approach ensures this book is not just informative but indispensable for anyone serious about protecting data, systems, and reputations in a world of escalating security threats.Prepare to lead with confidence, foster innovation, and build a future-proof security strategy that aligns with organizational goals and industry best practices. With Systematic Security, success isnât just a possibilityâitâs a repeatable process.
£42.74
Indy Pub Bit By Bit
Book Synopsis
£29.24
Cambridge University Press Principles of Cybercrime
Book SynopsisThe internet and digital technology provide many opportunities to commit and facilitate crime. All developed and developing countries face similar challenges in this rapidly changing area. This book provides an analysis of cybercrime laws in Australia, Canada, the UK and the USA.Trade Review'As a doctrinal analysis, this title is likely to become a classic among cyber crime titles and will be useful to attorneys, researchers, students and general readers seeking to understand the interconnected relationship these four countries have developed in their separate and joint battles against cyber crime.' Laurie Selwyn, Freelance Law Librarian'Even for a non-lawyer, such as this reviewer, the concepts are well clarified and the language is accessible. It should probably sit on the shelves of anyone involved in the prevention, investigation or prosecution of CyberCrime and, more importantly, be taken down, read and referred to regularly. It will certainly form part of my library and is likely to find its way onto my students' reading lists.' Angus M. Marshal, Lecturer in CyberSecurity and Independent 'Expert' on Digital EvidenceTable of ContentsPart I. Introduction: 1. Cybercrime; Part II. Computer as Target: 2. Computer as target; 3. Access offences; 4. Modification or impairment of data; 5. Misuse of devices; 6. Interception of data; Part III. Fraud and Related Offences: 7. Fraud; 8. Criminal copyright infringement; 9. 'Spam'; Part IV. Content-Related Offences; 10. Child pornography; Part V. Offences against the Person: 11. 'Grooming'; 12. Harassment; 13. Voyeurism; Part VI. Jurisdiction: 14. Jurisdiction.
£89.00
John Wiley & Sons Inc Hacking the Hacker
Book SynopsisMeet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.Table of ContentsForeword xxxi Introduction xxxiii 1 What Type of Hacker Are You? 1 Most Hackers Aren’t Geniuses 2 Defenders Are Hackers Plus 3 Hackers Are Special 3 Hackers Are Persistent 4 Hacker Hats 4 2 How Hackers Hack 9 The Secret to Hacking 10 The Hacking Methodology 11 Hacking Is Boringly Successful 20 Automated Malware as a Hacking Tool 20 Hacking Ethically 21 3 Profile: Bruce Schneier 23 For More Information on Bruce Schneier 26 4 Social Engineering 27 Social Engineering Methods 27 Phishing 27 Trojan Horse Execution 28 Over the Phone 28 Purchase Scams 28 In-Person 29 Carrot or Stick 29 Social Engineering Defenses 30 Education 30 Be Careful of Installing Software from Third-Party Websites 30 EV Digital Certificates 31 Get Rid of Passwords 31 Anti–Social Engineering Technologies 31 5 Profile: Kevin Mitnick 33 For More Information on Kevin Mitnick 37 6 Software Vulnerabilities 39 Number of Software Vulnerabilities 39 Why Are Software Vulnerabilities Still a Big Problem? 40 Defenses Against Software Vulnerabilities 41 Security Development Lifecycle 41 More Secure Programming Languages 42 Code and Program Analysis 42 More Secure Operating Systems 42 Third-Party Protections and Vendor Add-Ons 42 Perfect Software Won’t Cure All Ills 43 7 Profile: Michael Howard 45 For More Information on Michael Howard 49 8 Profile: Gary McGraw 51 For More Information on Gary McGraw 54 9 Malware 55 Malware Types 55 Number of Malware Programs 56 Mostly Criminal in Origin 57 Defenses Against Malware 58 Fully Patched Software 58 Training 58 Anti-Malware Software 58 Application Control Programs 59 Security Boundaries 59 Intrusion Detection 59 10 Profile: Susan Bradley 61 For More Information on Susan Bradley 63 11 Profile: Mark Russinovich 65 For More on Mark Russinovich 68 12 Cryptography 69 What Is Cryptography? 69 Why Can’t Attackers Just Guess All the Possible Keys? 70 Symmetric Versus Asymmetric Keys 70 Popular Cryptography 70 Hashes 71 Cryptographic Uses 72 Cryptographic Attacks 72 Math Attacks 72 Known Ciphertext/Plaintext 73 Side Channel Attacks 73 Insecure Implementations 73 13 Profile: Martin Hellman 75 For More Information on Martin Hellman 79 14 Intrusion Detection/APTs 81 Traits of a Good Security Event Message 82 Advanced Persistent Threats (APTs) 82 Types of Intrusion Detection 83 Behavior-Based 83 Signature-Based 84 Intrusion Detection Tools and Services 84 Intrusion Detection/Prevention Systems 84 Event Log Management Systems 85 Detecting Advanced Persistent Threats (APTs) 85 15 Profile: Dr. Dorothy E. Denning 87 For More Information on Dr Dorothy E Denning 90 16 Profile: Michael Dubinsky 91 For More Information on Michael Dubinsky 93 17 Firewalls 95 What Is a Firewall? 95 The Early History of Firewalls 95 Firewall Rules 97 Where Are Firewalls? 97 Advanced Firewalls 98 What Firewalls Protect Against 98 18 Profile: William Cheswick 101 For More Information on William Cheswick 105 19 Honeypots 107 What Is a Honeypot? 107 Interaction 108 Why Use a Honeypot? 108 Catching My Own Russian Spy 109 Honeypot Resources to Explore 110 20 Profile: Lance Spitzner 111 For More Information on Lance Spitzner 114 21 Password Hacking 115 Authentication Components 115 Passwords 116 Authentication Databases 116 Password Hashes 116 Authentication Challenges 116 Authentication Factors 117 Hacking Passwords 117 Password Guessing 117 Phishing 118 Keylogging 118 Hash Cracking 118 Credential Reuse 119 Hacking Password Reset Portals 119 Password Defenses 119 Complexity and Length 120 Frequent Changes with No Repeating 120 Not Sharing Passwords Between Systems 120 Account Lockout 121 Strong Password Hashes 121 Don’t Use Passwords 121 Credential Theft Defenses 121 Reset Portal Defenses 122 22 Profile: Dr. Cormac Herley 123 For More Information on Dr. Cormac Herley 126 23 Wireless Hacking 127 The Wireless World 127 Types of Wireless Hacking 127 Attacking the Access Point 128 Denial of Service 128 Guessing a Wireless Channel Password 128 Session Hijacking 128 Stealing Information 129 Physically Locating a User 129 Some Wireless Hacking Tools 129 Aircrack-Ng 130 Kismet 130 Fern Wi-Fi Hacker 130 Firesheep 130 Wireless Hacking Defenses 130 Frequency Hopping 130 Predefined Client Identification 131 Strong Protocols 131 Long Passwords 131 Patching Access Points 131 Electromagnetic Shielding 131 24 Profile: Thomas d’Otreppe de Bouvette 133 For More Information on Thomas d’Otreppe de Bouvette 135 25 Penetration Testing 137 My Penetration Testing Highlights 137 Hacked Every Cable Box in the Country 137 Simultaneously Hacked a Major Television Network and Pornography 138 Hacked a Major Credit Card Company 138 Created a Camera Virus 139 How to Be a Pen Tester 139 Hacker Methodology 139 Get Documented Permission First 140 Get a Signed Contract 140 Reporting 140 Certifications 141 Be Ethical 145 Minimize Potential Operational Interruption 145 26 Profile: Aaron Higbee 147 For More Information on Aaron Higbee 149 27 Profile: Benild Joseph 151 For More Information on Benild Joseph 153 28 DDoS Attacks 155 Types of DDoS Attacks 155 Denial of Service 155 Direct Attacks 156 Reflection Attacks 156 Amplification 156 Every Layer in the OSI Model 157 Escalating Attacks 157 Upstream and Downsteam Attacks 157 DDoS Tools and Providers 158 Tools 158 DDoS as a Service 158 DDoS Defenses 159 Training 159 Stress Testing 159 Appropriate Network Configuration 159 Engineer Out Potential Weak Points 159 Anti-DDoS Services 160 29 Profile: Brian Krebs 161 For More Information on Brian Krebs 164 30 Secure OS 165 How to Secure an Operating System 166 Secure-Built OS 166 Secure Guidelines 168 Secure Configuration Tools 169 Security Consortiums 169 Trusted Computing Group 169 FIDO Alliance 169 31 Profile: Joanna Rutkowska 171 For More Information on Joanna Rutkowska 173 32 Profile: Aaron Margosis 175 For More Information on Aaron Margosis 179 33 Network Attacks 181 Types of Network Attacks 181 Eavesdropping 182 Man-in-the-Middle Attacks 182 Distributed Denial-of-Service Attacks 183 Network Attack Defenses 183 Domain Isolation 183 Virtual Private Networks 183 Use Secure Protocols and Applications 183 Network Intrusion Detection 184 Anti-DDoS Defenses 184 Visit Secure Web Sites and Use Secure Services 184 34 Profile: Laura Chappell 185 For More Information on Laura Chappell 188 35 IoT Hacking 189 How Do Hackers Hack IoT? 189 IoT Defenses 190 36 Profile: Dr. Charlie Miller 193 For More Information on Dr. Charlie Miller 198 37 Policy and Strategy 201 Standards 201 Policies 202 Procedures 203 Frameworks 203 Regulatory Laws 203 Global Concerns 203 Systems Support 204 38 Profile: Jing de Jong-Chen 205 For More Information on Jing de Jong-Chen 209 39 Threat Modeling 211 Why Threat Model? 211 Threat Modeling Models 212 Threat Actors 213 Nation-States 213 Industrial Hackers 213 Financial Crime 213 Hacktivists 214 Gamers 214 Insider Threats 214 Ordinary, Solitary Hackers or Hacker Groups 214 40 Profile: Adam Shostack 217 For More Information on Adam Shostack 220 41 Computer Security Education 221 Computer Security Training Topics 222 End-User/Security Awareness Training 222 General IT Security Training 222 Incident Response 222 OS and Application-Specific Training 223 Technical Skills 223 Certifications 223 Training Methods 224 Online Training 224 Break into My Website 224 Schools and Training Centers 224 Boot Camps 225 Corporate Training 225 Books 225 42 Profile: Stephen Northcutt 227 For More Information on Stephen Northcutt 230 43 Privacy 231 Privacy Organizations 232 Privacy-Protecting Applications 233 44 Profile: Eva Galperin 235 For More Information on Eva Galperin 237 45 Patching 239 Patching Facts 240 Most Exploits Are Caused by Old Vulnerabilities That Patches Exist For 240 Most Exploits Are Caused by a Few Unpatched Programs 240 The Most Unpatched Program Isn’t Always the Most Exploited Program 241 You Need to Patch Hardware Too 241 Common Patching Problems 241 Detecting Missing Patching Isn’t Accurate 241 You Can’t Always Patch 242 Some Percentage of Patching Always Fails 242 Patching Will Cause Operational Issues 242 A Patch Is a Globally Broadcasted Exploit Announcement 243 46 Profile: Window Snyder 245 For More Information on Window Snyder 248 47 Writing as a Career 249 Computer Security Writing Outlets 250 Blogs 250 Social Media Sites 250 Articles 250 Books 251 Newsletters 253 Whitepapers 254 Technical Reviews 254 Conferences 254 Professional Writing Tips 255 The Hardest Part Is Starting 255 Read Differently 255 Start Out Free 255 Be Professional 256 Be Your Own Publicist 256 A Picture Is Worth a Thousand Words 256 48 Profile: Fahmida Y . Rashid 259 For More Information on Fahmida Y. Rashid 262 49 Guide for Parents with Young Hackers 263 Signs Your Kid Is Hacking 264 They Tell You They Hack 264 Overly Secretive About Their Online Activities 264 They Have Multiple Email/Social Media Accounts You Can’t Access 265 You Find Hacking Tools on the System 265 People Complain You Are Hacking 265 You Catch Them Switching Screens Every Time You Walk into the Room 265 These Signs Could Be Normal 265 Not All Hacking Is Bad 266 How to Turn Around Your Malicious Hacker 266 Move Their Computers into the Main Living Area and Monitor 267 Give Guidance 267 Give Legal Places to Hack 267 Connect Them with a Good Mentor 269 50 Hacker Code of Ethics 271 Hacker Code of Ethics 272 Be Ethical, Transparent, and Honest 273 Don’t Break the Law 273 Get Permission 273 Be Confidential with Sensitive Information 273 Do No Greater Harm 273 Conduct Yourself Professionally 274 Be a Light for Others 274 Index 275
£17.85
John Wiley & Sons Inc Hands on Hacking
Book SynopsisTable of ContentsForeword xviii Introduction xx Chapter 1 Hacking a Business Case 1 All Computers are Broken 2 The Stakes 4 What’s Stolen and Why It’s Valuable 4 The Internet of Vulnerable Things 4 Blue, Red, and Purple Teams 5 Blue Teams 5 Red Teams 5 Purple Teams 7 Hacking is Part of Your Company’s Immune System 9 Summary 11 Notes 12 Chapter 2 Hacking Ethically and Legally 13 Laws That Affect Your Work 14 Criminal Hacking 15 Hacking Neighborly 15 Legally Gray 16 Penetration Testing Methodologies 17 Authorization 18 Responsible Disclosure 19 Bug Bounty Programs 20 Legal Advice and Support 21 Hacker House Code of Conduct 22 Summary 22 Chapter 3 Building Your Hack Box 23 Hardware for Hacking 24 Linux or BSD? 26 Host Operating Systems 27 Gentoo Linux 27 Arch Linux 28 Debian 28 Ubuntu 28 Kali Linux 29 Verifying Downloads 29 Disk Encryption 31 Essential Software 33 Firewall 34 Password Manager 35 Email 36 Setting Up VirtualBox 36 Virtualization Settings 37 Downloading and Installing VirtualBox 37 Host-Only Networking 37 Creating a Kali Linux VM 40 Creating a Virtual Hard Disk 42 Inserting a Virtual CD 43 Virtual Network Adapters 44 Labs 48 Guest Additions 51 Testing Your Virtual Environment 52 Creating Vulnerable Servers 53 Summary 54 Chapter 4 Open Source Intelligence Gathering 55 Does Your Client Need an OSINT Review? 56 What are You Looking For? 57 Where Do You Find It? 58 OSINT Tools 59 Grabbing Email Addresses from Google 59 Google Dorking the Shadows 62 A Brief Introduction to Passwd and Shadow Files 62 The Google Hacking Database 65 Have You Been “Pwned” Yet? 66 OSINT Framework Recon-ng 67 Recon-ng Under the Hood 74 Harvesting the Web 75 Document Metadata 76 Maltego 80 Social Media Networks 81 Shodan 83 Protecting Against OSINT 85 Summary 86 Chapter 5 The Domain Name System 87 The Implications of Hacking DNS 87 A Brief History of DNS 88 The DNS Hierarchy 88 A Basic DNS Query 89 Authority and Zones 92 DNS Resource Records 92 BIND9 95 DNS Hacking Toolkit 98 Finding Hosts 98 WHOIS 98 Brute-Forcing Hosts with Recon-ng 100 Host 101 Finding the SOA with Dig 102 Hacking a Virtual Name Server 103 Port Scanning with Nmap 104 Digging for Information 106 Specifying Resource Records 108 Information Leak CHAOS 111 Zone Transfer Requests 113 Information-Gathering Tools 114 Fierce 115 Dnsrecon 116 Dnsenum 116 Searching for Vulnerabilities and Exploits 118 Searchsploit 118 Other Sources 119 DNS Traffic Amplification 120 Metasploit 121 Carrying Out a Denial-of-Service Attack 125 DoS Attacks with Metasploit 126 DNS Spoofi ng 128 DNS Cache Poisoning 129 DNS Cache Snooping 131 DNSSEC 131 Fuzzing 132 Summary 134 Chapter 6 Electronic Mail 135 The Email Chain 135 Message Headers 137 Delivery Status Notifications 138 The Simple Mail Transfer Protocol 141 Sender Policy Framework 143 Scanning a Mail Server 145 Complete Nmap Scan Results (TCP) 149 Probing the SMTP Service 152 Open Relays 153 The Post Office Protocol 155 The Internet Message Access Protocol 157 Mail Software 158 Exim 159 Sendmail 159 Cyrus 160 PHP Mail 160 Webmail 161 User Enumeration via Finger 162 Brute-Forcing the Post Office 167 The Nmap Scripting Engine 169 CVE-2014-0160: The Heartbleed Bug 172 Exploiting CVE-2010-4345 180 Got Root? 183 Upgrading Your Shell 184 Exploiting CVE-2017-7692 185 Summary 188 Chapter 7 The World Wide Web of Vulnerabilities 191 The World Wide Web 192 The Hypertext Transfer Protocol 193 HTTP Methods and Verbs 195 HTTP Response Codes 196 Stateless 198 Cookies 198 Uniform Resource Identifiers 200 LAMP: Linux, Apache, MySQL, and PHP 201 Web Server: Apache 202 Database: MySQL 203 Server-Side Scripting: PHP 203 Nginx 205 Microsoft IIS 205 Creepy Crawlers and Spiders 206 The Web Server Hacker’s Toolkit 206 Port Scanning a Web Server 207 Manual HTTP Requests 210 Web Vulnerability Scanning 212 Guessing Hidden Web Content 216 Nmap 217 Directory Busting 218 Directory Traversal Vulnerabilities 219 Uploading Files 220 WebDAV 220 Web Shell with Weevely 222 HTTP Authentication 223 Common Gateway Interface 225 Shellshock 226 Exploiting Shellshock Using Metasploit 227 Exploiting Shellshock with cURL and Netcat 228 SSL, TLS, and Heartbleed 232 Web Administration Interfaces 238 Apache Tomcat 238 Webmin 240 phpMyAdmin 241 Web Proxies 242 Proxychains 243 Privilege Escalation 245 Privilege Escalation Using DirtyCOW 246 Summary 249 Chapter 8 Virtual Private Networks 251 What is a VPN? 251 Internet Protocol Security 253 Internet Key Exchange 253 Transport Layer Security and VPNs 254 User Databases and Authentication 255 SQL Database 255 RADIUS 255 LDAP 256 PAM 256 TACACS+ 256 The NSA and VPNs 257 The VPN Hacker’s Toolkit 257 VPN Hacking Methodology 257 Port Scanning a VPN Server 258 Hping3 259 UDP Scanning with Nmap 261 IKE-scan 262 Identifying Security Association Options 263 Aggressive Mode 265 OpenVPN 267 LDAP 275 OpenVPN and Shellshock 277 Exploiting CVE-2017-5618 278 Summary 281 Chapter 9 Files and File Sharing 283 What is Network-Attached Storage? 284 File Permissions 284 NAS Hacking Toolkit 287 Port Scanning a File Server 288 The File Transfer Protocol 289 The Trivial File Transfer Protocol 291 Remote Procedure Calls 292 RPCinfo 294 Server Message Block 295 NetBIOS and NBT 296 Samba Setup 298 Enum4Linux 299 SambaCry (CVE-2017-7494) 303 Rsync 306 Network File System 308 NFS Privilege Escalation 309 Searching for Useful Files 311 Summary 312 Chapter 10 UNIX 315 UNIX System Administration 316 Solaris 316 UNIX Hacking Toolbox 318 Port Scanning Solaris 319 Telnet 320 Secure Shell 324 RPC 326 CVE-2010-4435 329 CVE-1999-0209 329 CVE-2017-3623 330 Hacker’s Holy Grail EBBSHAVE 331 EBBSHAVE Version 4 332 EBBSHAVE Version 5 335 Debugging EBBSHAVE 335 R-services 338 The Simple Network Management Protocol 339 Ewok 341 The Common UNIX Printing System 341 The X Window System 343 Cron and Local Files 347 The Common Desktop Environment 351 EXTREMEPARR 351 Summary 353 Chapter 11 Databases 355 Types of Databases 356 Flat-File Databases 356 Relational Databases 356 Nonrelational Databases 358 Structured Query Language 358 User-Defined Functions 359 The Database Hacker’s Toolbox 360 Common Database Exploitation 360 Port Scanning a Database Server 361 MySQL 362 Exploring a MySQL Database 362 MySQL Authentication 373 PostgreSQL 374 Escaping Database Software 377 Oracle Database 378 MongoDB 381 Redis 381 Privilege Escalation via Databases 384 Summary 392 Chapter 12 Web Applications 395 The OWASP Top 10 396 The Web Application Hacker’s Toolkit 397 Port Scanning a Web Application Server 397 Using an Intercepting Proxy 398 Setting Up Burp Suite Community Edition 399 Using Burp Suite Over HTTPS 407 Manual Browsing and Mapping 412 Spidering 415 Identifying Entry Points 418 Web Vulnerability Scanners 418 Zed Attack Proxy 419 Burp Suite Professional 420 Skipfish 421 Finding Vulnerabilities 421 Injection 421 SQL Injection 422 SQLmap 427 Drupageddon 433 Protecting Against SQL Injection 433 Other Injection Flaws 434 Broken Authentication 434 Sensitive Data Exposure 436 XML External Entities 437 CVE-2014-3660 437 Broken Access Controls 439 Directory Traversal 440 Security Misconfiguration 441 Error Pages and Stack Traces 442 Cross-Site Scripting 442 The Browser Exploitation Framework 445 More about XSS Flaws 450 XSS Filter Evasion 450 Insecure Deserialization 452 Known Vulnerabilities 453 Insufficient Logging and Monitoring 453 Privilege Escalation 454 Summary 455 Chapter 13 Microsoft Windows 457 Hacking Windows vs. Linux 458 Domains, Trees, and Forests 458 Users, Groups, and Permissions 461 Password Hashes 461 Antivirus Software 462 Bypassing User Account Control 463 Setting Up a Windows VM 464 A Windows Hacking Toolkit 466 Windows and the NSA 467 Port Scanning Windows Server 467 Microsoft DNS 469 Internet Information Services 470 Kerberos 471 Golden Tickets 472 NetBIOS 473 LDAP 474 Server Message Block 474 ETERNALBLUE 476 Enumerating Users 479 Microsoft RPC 489 Task Scheduler 497 Remote Desktop 497 The Windows Shell 498 PowerShell 501 Privilege Escalation with PowerShell 502 PowerSploit and AMSI 503 Meterpreter 504 Hash Dumping 505 Passing the Hash 506 Privilege Escalation 507 Getting SYSTEM 508 Alternative Payload Delivery Methods 509 Bypassing Windows Defender 512 Summary 514 Chapter 14 Passwords 517 Hashing 517 The Password Cracker’s Toolbox 519 Cracking 519 Hash Tables and Rainbow Tables 523 Adding Salt 525 Into the /etc/shadow 526 Different Hash Types 530 MD5 530 SHA-1 531 SHA-2 531 SHA256 531 SHA512 531 bcrypt 531 CRC16/CRC32 532 PBKDF2 532 Collisions 533 Pseudo-hashing 533 Microsoft Hashes 535 Guessing Passwords 537 The Art of Cracking 538 Random Number Generators 539 Summary 540 Chapter 15 Writing Reports 543 What is a Penetration Test Report? 544 Common Vulnerabilities Scoring System 545 Attack Vector 545 Attack Complexity 546 Privileges Required 546 User Interaction 547 Scope 547 Confidentiality, Integrity, and Availability Impact 547 Report Writing as a Skill 549 What Should a Report Include? 549 Executive Summary 550 Technical Summary 551 Assessment Results 551 Supporting Information 552 Taking Notes 553 Dradis Community Edition 553 Proofreading 557 Delivery 558 Summary 559 Index 561
£26.25
John Wiley & Sons Inc The Pentester BluePrint
Book SynopsisJUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentesteroffers readers a chance to delve deeply into the world of the ethical, or white-hat hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals,The Pentester BluePrintalso belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style,The Pentester BluePrintavoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systemsThe development of hacking skills and a hacker mindsetWhere to find educational options, including college and university classes, security training providers, volunteer work, and self-studyWhich certifications and degrees are most useful for gaining employment as a pentesterHow to get experience in the pentesting field, including labs, CTFs, and bug bountiesTable of ContentsForeword xvi Introduction xviii 1 What is a Pentester? 1 Synonymous Terms and Types of Hackers 2 Pentests Described 3 Benefits and Reasons 3 Legality and Permission 5 Pentest Methodology 5 Pre-engagement Interactions 7 Intelligence Gathering 7 Threat Modeling 7 Vulnerability Analysis 7 Exploitation 8 Post Exploitation 8 Reporting 8 Pentest Types 9 Vulnerability Scanning 10 Vulnerability Assessments 10 Pentest Targets and Specializations 11 Generalist Pentesting 11 Application Pentesting 11 Internet of Things (IoT) 12 Industrial Control Systems (ICS) 12 Hardware and Medical Devices 13 Social Engineering 13 Physical Pentesting 13 Transportation Pentesting 14 Red Team Pentesting 14 Career Outlook 14 Summary 16 2 Prerequisite Skills 17 Skills Required for Learning Pentesting 18 Operating Systems 18 Networking 19 Information Security 19 Prerequisites Learning 19 Information Security Basics 20 What is Information Security? 21 The CIA Triad 22 Security Controls 24 Access Control 26 Incident Response 28 Malware 30 Advanced Persistent Threats 34 The Cyber Kill Chain 35 Common Vulnerabilities and Exposures 36 Phishing and Other Social Engineering 37 Airgapped Machines 38 The Dark Web 39 Summary 40 3 Education of a Hacker 43 Hacking Skills 43 Hacker Mindset 44 The Pentester Blueprint Formula 45 Ethical Hacking Areas 45 Operating Systems and Applications 46 Networks 46 Social Engineering 47 Physical Security 48 Types of Pentesting 48 Black Box Testing 49 White Box Testing 49 Gray Box Testing 50 A Brief History of Pentesting 50 The Early Days of Pentesting 51 Improving the Security of Your Site by Breaking into It 51 Pentesting Today 52 Summary 53 4 Education Resources 55 Pentesting Courses 55 Pentesting Books 56 Pentesting Labs 60 Web Resources 60 Summary 64 5 Building a Pentesting Lab 65 Pentesting Lab Options 65 Minimalist Lab 66 Dedicated Lab 66 Advanced Lab 67 Hacking Systems 67 Popular Pentesting Tools 68 Kali Linux 68 Nmap 69 Wireshark 69 Vulnerability Scanning Applications 69 Hak5 70 Hacking Targets 70 PentestBox 70 VulnHub 71 Proving Grounds 71 How Pentesters Build Their Labs 71 Summary 81 6 Certifications and Degrees 83 Pentesting Certifications 83 Entry-Level Certifications 84 Intermediate-Level Certifications 85 Advanced-Level Certifications 87 Specialization Web Application Pentesting Certifications 88 Wireless Pentesting Certifications 90 Mobile Pentesting Certifications 91 Pentesting Training and Coursework 91 Acquiring Pentesting Credentials 92 Certification Study Resources 99 CEH v10 Certified Ethical Hacker Study Guide 100 EC-Council 100 Quizlet CEH v10 Study Flashcards 100 Hacking Wireless Networks for Dummies 100 CompTIA PenTest+ Study Guide 101 CompTIA PenTest+ Website 101 Cybrary’s Advanced Penetration Testing 101 Linux Server Security: Hack and Defend 101 Advanced Penetration Testing: Hacking the World’s Most Secure Networks 102 The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws 102 Summary 102 7 Developing a Plan 105 Skills Inventory 105 Skill Gaps 111 Action Plan 112 Summary 113 8 Gaining Experience 115 Capture the Flag 115 Bug Bounties 123 A Brief History of Bug Bounty Programs 124 Pro Bono and Volunteer Work 125 Internships 126 Labs 126 Pentesters on Experience 126 Summary 135 9 Getting Employed as a Pentester 137 Job Descriptions 137 Professional Networking 138 Social Media 139 Résumé and Interview Tips 139 Summary 148 Appendix: The Pentester Blueprint 149 Glossary 155 Index 167
£20.00
John Wiley & Sons Inc CEH v11 Certified Ethical Hacker Study Guide
Book SynopsisMaster CEH v11 and identify your weak spots As protecting information continues to be a growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. CEH v11 Certified Ethical Hacker Study Guide and Practice Tests Set provides you with all of the technical review you need of CEH skills PLUS SEVEN practice tests to prove your readiness for exam day. About the CEH v11 Certified Ethical Hacker Study Guide The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review q
£43.12
Taylor & Francis Ltd Cybercrime
Book SynopsisNow in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation.Table of Contents1. Cybercrime Part I: Crimes Against Computers 2. Hacking and Malware: Targeting the Technology 3. Targeting Data 4. From Hacktivism to Cyberwarfare: Weaponising Cyberspace Part II: "Property" 5. Intellectual and Virtual Property 6. Fraud Part III: Offensive Content 7. Hate and Harm 8. Sexualised Content 1: Adult pornography 9. Sexualised Content 2: Child pornography Part IV: Offences Against the Person 10. Offences Against the Person Part V: Investigating Cybercrime 11. Jurisdiction 12.Policing Cybercrime: Structures 13. Policing Cybercrime: Investigative Powers
£45.99
Kogan Page Ltd Crypto Wars
Book SynopsisErica Stanford is a crypto and future of money expert. The founder and CEO of the UK's most recommended crypto networking and events organization, Crypto Curry Club, she publishes the weekly Crypto Currier industry newsletter as well as Blockchain Industry Review. The advisor to several crypto start-ups, she is an in-demand speaker and commentator on the potential and use cases of digital currencies. She is the guest associate lecturer in cryptocurrency at Warwick Business School and has featured in The Express, Finance News, Coin Rivet and on the BBC. She is based in London, England.Trade Review"An accessible guide to the confusing and fast-growing world of crypto scams. If you're thinking of investing in cryptocurrency, read this first!" * Jamie Bartlett, host of BBC podcast The Missing Cryptoqueen, author of The People Vs Tech, The Dark Net, Radicals and The Missing Cryptoqueen, presenter and journalist *"Crypto has proved the quickest get-rich scheme in all history. Unfortunately, the easiest people to rip off are those hoping to get rich quick, so scam after inevitable scam has preyed on the sector. Erica Stanford's page turner tells their bitter, but compelling stories." * Dominic Frisby, comedian, actor, MoneyWeek columnist and author of Daylight Robbery *"Erica Stanford covers everything that is oh so wrong and oh so right about the transformational world of cryptocurrencies. Prepare to laugh, cringe or be spooked. This book combines technology, business, mystery, fantasy and popular culture in a fascinating and enlightening way. And the best part: it's all true." * Anthony Day, Blockchain Partner, IBM, and host of Blockchain Won’t Save the World podcast *"Fascinating read on the boom days of crypto's Initial Coin Offerings, analysing the hype that threatened to overshadow the technology. Erica Stanford captures the mood and energy of the time in this greatly entertaining and insightful work." * Caroline Casey, Vice President, Innovation and Consumer Experience, Europe, Mastercard *"In what other book could you read about the biggest Ponzi schemes in the world, espionage, an $800 billion bubble, fake death, cryptoqueens, gambling and porn - literally 50 shades of the dodgiest grey with regulators and the FBI in hot pursuit? Erica Stanford brilliantly analyses the future of crypto in a world where the real future including security-backed tokens and CBDC's is only just beginning." * Bob Wigley, Chair UK Finance, Co-Chair, Cross Market Operational Resilience Group, Bank of England, Board Member, DIT and UK Home Office, NED, adjunct professor and author of Born Digital *"The is a marvellous romp through the crazy world of cryptocurrency and its wackier elements. But as well as the fun, we get a glimpse into what might one day give the global financial system a run for its money." * Mike Butcher MBE, Editor-at-Large, TechCrunch *"Crypto Wars is a fascinating and gripping account of human nature and its demons emerging from the frontiers of the crypto economy. It is mandatory reading for investors, regulators and builders of our financial future" * Lex Sokolin, fintech futurist and philosopher, Founder, The Fintech Blueprint, and Head Economist, ConsenSys *"This book is essential reading, especially for anyone thinking of dipping even their little toe into cryptocurrency." * Sara Vaughan, innovator and creator of global brands with purpose, positive change maker *"Erica Stanford takes readers through the complicated history of crypto hacks, scams and pump and dump schemes with such vivid detail and engaging narrative, you'll find it hard to put the book down." * Leslie Lamb, Head of Institutional Sales, Amber Group, and host of the Crypto Unstacked podcast *"As the market booms it's timely that someone has done justice to the extraordinary story of crypto - this unputdownable book captures the fun and the ups and the downs. It's a mesmeric read." * Charlie Kerrigan, Partner and Global Head of Fintech, CMS *"Erica Stanford's entertaining exploration of the world of scams, grifts, frauds and fantasies serves as a reminder that while on the one hand there is nothing new under the sun, on the other hand we have barely begun to understand the impact of cryptocurrency." * David Birch, author of The Currency Cold War and international adviser and commentator on digital financial services *
£15.29
Kogan Page Ltd Crypto Wars
Book SynopsisErica Stanford is a crypto and future of money expert. The founder and CEO of the UK's most recommended crypto networking and events organization, Crypto Curry Club, she publishes the weekly Crypto Currier industry newsletter as well as Blockchain Industry Review. The advisor to several crypto start-ups, she is an in-demand speaker and commentator on the potential and use cases of digital currencies. She is the guest associate lecturer in cryptocurrency at Warwick Business School and has featured in The Express, Finance News, Coin Rivet and on the BBC. She is based in London, England.Trade Review"An accessible guide to the confusing and fast-growing world of crypto scams. If you're thinking of investing in cryptocurrency, read this first!" * Jamie Bartlett, host of BBC podcast The Missing Cryptoqueen, author of The People Vs Tech, The Dark Net, Radicals and The Missing Cryptoqueen, presenter and journalist *"Crypto has proved the quickest get-rich scheme in all history. Unfortunately, the easiest people to rip off are those hoping to get rich quick, so scam after inevitable scam has preyed on the sector. Erica Stanford's page turner tells their bitter, but compelling stories." * Dominic Frisby, comedian, actor, MoneyWeek columnist and author of Daylight Robbery *"Erica Stanford covers everything that is oh so wrong and oh so right about the transformational world of cryptocurrencies. Prepare to laugh, cringe or be spooked. This book combines technology, business, mystery, fantasy and popular culture in a fascinating and enlightening way. And the best part: it's all true." * Anthony Day, Blockchain Partner, IBM, and host of Blockchain Won’t Save the World podcast *"Fascinating read on the boom days of crypto's Initial Coin Offerings, analysing the hype that threatened to overshadow the technology. Erica Stanford captures the mood and energy of the time in this greatly entertaining and insightful work." * Caroline Casey, Vice President, Innovation and Consumer Experience, Europe, Mastercard *"In what other book could you read about the biggest Ponzi schemes in the world, espionage, an $800 billion bubble, fake death, cryptoqueens, gambling and porn - literally 50 shades of the dodgiest grey with regulators and the FBI in hot pursuit? Erica Stanford brilliantly analyses the future of crypto in a world where the real future including security-backed tokens and CBDC's is only just beginning." * Bob Wigley, Chair UK Finance, Co-Chair, Cross Market Operational Resilience Group, Bank of England, Board Member, DIT and UK Home Office, NED, adjunct professor and author of Born Digital *"The is a marvellous romp through the crazy world of cryptocurrency and its wackier elements. But as well as the fun, we get a glimpse into what might one day give the global financial system a run for its money." * Mike Butcher MBE, Editor-at-Large, TechCrunch *"Crypto Wars is a fascinating and gripping account of human nature and its demons emerging from the frontiers of the crypto economy. It is mandatory reading for investors, regulators and builders of our financial future" * Lex Sokolin, fintech futurist and philosopher, Founder, The Fintech Blueprint, and Head Economist, ConsenSys *"This book is essential reading, especially for anyone thinking of dipping even their little toe into cryptocurrency." * Sara Vaughan, innovator and creator of global brands with purpose, positive change maker *"Erica Stanford takes readers through the complicated history of crypto hacks, scams and pump and dump schemes with such vivid detail and engaging narrative, you'll find it hard to put the book down." * Leslie Lamb, Head of Institutional Sales, Amber Group, and host of the Crypto Unstacked podcast *"As the market booms it's timely that someone has done justice to the extraordinary story of crypto - this unputdownable book captures the fun and the ups and the downs. It's a mesmeric read." * Charlie Kerrigan, Partner and Global Head of Fintech, CMS *"Erica Stanford's entertaining exploration of the world of scams, grifts, frauds and fantasies serves as a reminder that while on the one hand there is nothing new under the sun, on the other hand we have barely begun to understand the impact of cryptocurrency." * David Birch, author of The Currency Cold War and international adviser and commentator on digital financial services *
£45.60
O'Reilly Media Hackers
Book SynopsisSteven Levy's classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated material from noteworthy hackers such as Bill Gates, Mark Zukerberg, Richard Stallman, and Tim O'Reilly.
£21.59
APress Firewalls Dont Stop Dragons
Book SynopsisRely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. Shop and bank online with maximum security and peace of mind. Block online tracking, data mining and malicious online ads.Table of Contents
£31.34
O'Reilly Media Ransomware
Book SynopsisThe biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.
£23.99
University of Minnesota Press Deconstruction Machines: Writing in the Age of
Book SynopsisA bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating.In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes that cyberwar is best envisioned as a series of networks whose constantly shifting connections shape its very possibilities. He ultimately envisions cyberwar as a form of writing, advancing the innovative thesis that cyber attacks should be seen as a militarized form of deconstruction in which computer programs are systems that operate within the broader world of texts. Throughout, Joque addresses hot-button subjects such as technological social control and cyber-resistance entities like Anonymous and Wikileaks while also providing a rich, detailed history of cyberwar. Deconstruction Machines provides a necessary new interpretation of deconstruction and timely analysis of media, war, and technology. Trade Review"Deconstruction machines provides a powerful insight into how cyberwar serves to militarize writing, threatens civic infrastructure and thereby brings war into the code and software that governs our everyday lives." —International AffairsTable of ContentsContentsForewordCatherine MalabouAcknowledgmentsIntroduction: Root Kit1. Buffer Overflow: The Space and Time of Cyberwar2. Injection Attack: Writing and the Information Catastrophe3. Distributed Denial of Service: Cybernetic Sovereignty4. Spear Phishing: Nodal SubjectsConclusion: Firmware VulnerabilitiesNotesIndex
£20.69
PublicAffairs,U.S. Cult of the Dead Cow: How the Original Hacking
Book SynopsisThe Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.
£12.74
INGRAM PUBLISHER SERVICES US Cult of the Dead Cow How the Original Hacking
Book Synopsis
£18.04
Artech House Publishers Computer and Intrusion Forensics
Book SynopsisA comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.Table of ContentsComputer Crime. Computer Forensics and Computer Security. Current Practice. Computer Forensics in Law Enforcement and National Security. Computer Forensics in Forensic Accounting. Case Studies. Intrusion Detection and Intrusion Forensics. Research Directions and Future Developments.
£87.31
Nova Science Publishers Inc China's Cyberwarfare Capability
Book SynopsisThe government of the People''s Republic of China (PRC) is a decade into a sweeping military modernisation program that has fundamentally transformed its ability to fight high tech wars. The Chinese military, using increasingly networked forces capable of communicating across service arms and among all echelons of command, is pushing beyond its traditional missions focused on Taiwan and toward a more regional defence posture. This book presents a comprehensive open source assessment of China''s capability to conduct computer network operations (CNO) both during peacetime and periods of conflict, and will hopefully serve as a useful reference to policymakers, China specialists, and information operations professionals.
£36.74
Bravex Publications Cybersecurity: What You Need to Know About
Book Synopsis
£26.99
No Starch Press,US How To Hack Like A Legend: Breaking Windows
Book SynopsisStep into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today s advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems.Trade Review"How To Hack Like a Legend is a well written, story lead, day in a life of a hacker taking you into his hacking mindset and showing the reader even failure can be turned into a successful hack. This sort of hands-on material is normally only ever gained through experiences in real life. Above all, being able to get all this information down on paper and wrapping it all up with a fictional story really shows Sparc knows what he’s talking about."—Security Tutorials"Another great hacker plot by Spark Flow. This is the 7th book in his series on penetration testing, and like the rest it does not disappoint . . . Short, engaging, technical, and really fun."—LockBoxx: A Hacker's Blog"A good addition to his series. It covers many more topics to the existing others. This book is available to everyone because all tools and techniques presented are open sources."—OnlineBooksReview"What sets this book apart from other cyber security books is the unique plot it follows . . . The book is written for penetration testers and red teamers, but if you have some knowledge in IT do not hesitate to pick it up. It is a great read and Sparc Flow details step-by-step every line of code and obscure tip to make it understandable by everyone."—Tech Guide and Reviews"A good introduction to the entire process of infiltrating and compromising a network from beginning to end, and the kind of logical and creative thinking needed to successfully compromise a well secured environment."—Darlene Hibbs, Senior Cybersecurity Researcher, Fortra
£23.19
No Starch Press,US Hacks, Leaks, And Revelations: The Art of
Book SynopsisIn the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest - if you know how to unravel them. For investigative journalists or amateur researchers with or without prior programming knowledge, this book gives you the technical expertise to find and interrogate complex datasets, transforming unintelligible files into ground-breaking reports. Through hands-on assignments and examples that highlight real-world cases, information security expert and well-known investigative journalist Micah Lee guides you through the process of analysing leaked datasets from governments, companies, and political groups. You'll dig into hacked files from the BlueLeaks dataset of law enforcement records, analyse social media traffic from those behind the 2021 insurrection at the US Capitol, hear the exclusive story of privately leaked data from the anti-vaccine group America's Frontline Doctors, anTrade Review“Micah’s book is a fantastic and friendly introduction for journalists, activists, and anyone else who is interested in learning to analyze large data sets but has been too intimidated by the technical details. I hope this book will inspire more people to find the stories inside the data.”—Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation “Masterfully breaks down how to handle a data leak and provides the reader with hands-on examples to hone their skills. If only I had this book when I broke the news of the Epik data breach!”—Steven Monacelli, Special Investigative Correspondent at the Texas Observer “For more than a decade, Micah Lee has been on the cutting edge of protecting journalists and their sources from surveillance. It's a gift to all of us that he has downloaded his wisdom into this highly readable and vitally important guide.”—Julia Angwin, Investigative Journalist at The New York Times “Thanks to whistleblowing leaks, gold mines of valuable digital data now exist. There is no better account than Micah Lee’s lively and readable how-to guide for arming journalists and researchers with the tools necessary to find, excavate, and make sense of this rich data. Sourced from Lee’s experiences mining data for his hard-hitting journalistic exposes, readers will come away inspired and equipped to follow in his footsteps.”—Gabriella Coleman, Harvard Professor, Founder of Hack_Curio, and Tor Project Board Member “As a journalist who has been working with data breaches for close to ten years, actually getting to grips with that data is often the hardest part of any reporting project. Lee's clear and concise book will be an invaluable resource for reporters or researchers just dipping into this sort of data, or those looking for new techniques. I will certainly be using some of the tools myself. Hacked and dumped datasets are rich sources of information that are in the public interest, and Lee's book will only increase the number of important stories others are able to extract from them.”—Joseph Cox, Senior Staff Writer at Motherboard/Vice Media “Seamlessly blends real-world stories of whistleblowers and data dumps with a top to bottom guide on how to approach those very scenarios yourself. From protecting sources to accessing leaked data, no page is wasted. A must-read for any researcher or journalist regardless of experience.” —Mikael Thalen, Tech and Security Reporter at The Daily Dot “The world is awash in hacked and leaked data, and any investigator or journalist hoping to handle it safely and find the newsworthy threads needs to buy this book. Micah's step-by-step approach to the ethics, safety and tooling is both approachable for the average person with even basic data skills and will also be useful for those with an advanced background. A guide like this was waiting to be written.”—AJ Vicens, Reporter at CyberScoop"A comprehensive yet highly digestible resource that I would wholeheartedly recommend to anyone remotely interested by modern journalism [practices]." —Julien Voisin, Artificial Truth“Of special interest for anyone concerned with the increasing issues around cyberspace and internet database security, Hacks, Leaks, and Revelations must be considered basic, fundamental reading.”—Midwest Book ReviewTable of ContentsIntroductionPart 1: Sources and DatasetsChapter 1: Protecting Sources and YourselfChapter 2: Acquiring DatasetsPart 2: Tools of the TradeChapter 3: The Command Line InterfaceChapter 4: Exploring Datasets in the TerminalChapter 5: Docker, Aleph, and Making Datasets SearchableChapter 6: Reading Other People's EmailsPart 3: Writing CodeChapter 7: An Introduction to PythonChapter 8: Working with Data in PythonPart 4: Structured DataChapter 9: BlueLeaks, Black Lives Matter, and the CSV File FormatChapter 10: BlueLeaks ExplorerChapter 11: Parler, the Insurrection of January 6, and the JSON File FormatChapter 12: Epik Fail, Extremism Research, and SQL DatabasesPart 5: Case StudiesChapter 13: Pandemic Profiteers and COVID-19 DisinformationChapter 14: Neo-Nazis and Their Chat RoomsAfterwordAppendixesAppendix A: Using the Windows Subsystem for LinuxAppendix B: Scraping the Web
£35.99
WBE Creative The Manager
Book SynopsisIn the City of London, the scent of money and power lingers in the corridors of the shiny office buildings and clings to the suits of the men who work in them. Chasing that scent is the only thing that matters. But not to Katy Daly. She has spent her life working in the City, but wealth and power are things granted to other people. Her childhood was shattered by the pursuit of them, and since then she's coasted along on a course of risk-avoidance and underachieving. Then Katy starts working for Riley Daniels, the beautiful and charismatic CEO of Byrsa, one of the most successful yet secretive tech companies in the world. Katy can't help but be fascinated by this clever, fiercely ambitious woman making it in a man's world. Riley has a way of making her wonder if there could be more to life than letting other people shape your destiny. But power comes at a cost. As Katy is drawn deeper into Riley's intoxicating world, she is forced to confront who she is, who she has become, and how far she will go to protect Riley's secrets - and her own.
£8.99
Oneworld Publications Democracy Hacked: Political Turmoil and
Book SynopsisIn the space of one election cycle, authoritarian governments, moneyed elites and fringe hackers figured out how to game elections, bypass democratic processes, and turn social networks into battlefields. Facebook, Google and Twitter – where our politics now takes place – have lost control and are struggling to claw it back. Prepare for a new strain of democracy. A world of datafied citizens, real-time surveillance, enforced wellness and pre-crime. Where switching your mobile platform will have more impact on your life than switching your government. Where freedom and privacy are seen as incompatible with social wellbeing and compulsory transparency. As our lives migrate online, we have become increasingly vulnerable to digital platforms founded on selling your attention to the highest bidder. Our laws don’t cover what is happening and our politicians don’t understand it. But if we don’t change the system now, we may not get another chance.Trade Review‘Excellent.’ * New Statesman *‘Democracy Hacked gets beyond the headlines – a compelling, informed and highly readable account of how democracy is being disrupted by the tech revolution, and what can be done to get us back on track. One of the best expositions I’ve read yet of what is the biggest political challenge of our generation.’ -- Jamie Bartlett, author of The People Vs Tech and The Dark Net‘Enormously wide-ranging and deeply researched, this is the definitive account of how digital technology has changed the entire political landscape, with profound consequences for democracy. From Brexit to Trump, and from Estonia to the Philippines, Martin Moore uncovers the real stories behind the fake ones. You’ll discover that the truth is often stranger than fiction and that the future is more open than you think.’ -- David Runciman, author of How Democracy Ends‘The world is belatedly waking up to some frightening realities about the intersection of digital technologies and the health of democracies. Martin Moore’s book is a sharp wake-up call – ambitious in its sweep and urgent in its important message.’ -- Alan Rusbridger, author of Breaking News‘Eye-opening… An important, timely, and clearly written look at a crucial subject.’ * Booklist *‘Moore demonstrates how data has affected elections across the world, in the Philippines, Turkey, India, Iran, Britain and beyond... Engrossing, instructive, and urgently necessary.’ * Kirkus *
£19.82
Oneworld Publications Kingdom of Lies: Adventures in cybercrime
Book SynopsisWould you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone – an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You’ve never heard of them and you’re not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. Kingdom of Lies is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.Trade Review'Reads like a thriller... You probably couldn't tell a lot of the stories she tells as straightforward pieces of journalism... And, arguably, you learn far more about this world the way Fazzini tells it than you would in a sober news story.' * The Times *‘Kate Fazzini is the rare top-level reporter who can make you see, smell and feel a hidden world, not just understand it. Cybercrime (and security) has found its Michael Lewis.’ -- Bret Witter, co-author of the New York Times bestseller The Monuments Men"Written almost like a novel, Kingdom of Lies, offers a vivid account of how these gangs of black hat hackers spreading from Romania to China extort money from individuals like me and the most powerful Wall Street banks, and how the white hats are trying to stop these people who can halt global companies in their tracks and produce digital campaigns to sway popular opinion." * The Times *‘Kate Fazzini has crafted a gripping page-turner that is all too timely and real. Good luck putting it down – or going to sleep once you do.’ -- Marc Guggenheim, producer of Law & Order and executive producer of Wizards‘Kate Fazzini’s work breaking complex cybersecurity news down for a consumer audience is critical. She is tackling this unconventional topic by providing an alternative perspective on the threat, actors and convoluted dynamics.’ -- Dr Frederic Lemieux, Faculty Director of the Applied Intelligence and Cybersecurity Programs, Georgetown University‘Cybersecurity isn’t just ones and zeros, it’s also about the people who sit behind the keyboards – something Fazzini describes in vivid detail.’ -- Naveed Jamali, former US Naval Reserve intelligence officer and author of How to Catch a Russian Spy
£9.49
Legend Press Ltd Conquer the Web: The Ultimate Cybersecurity Guide
Book SynopsisThis is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it?''A must read for anyone looking to upskill their cyber awareness'' Steve Durbin, Managing Director, Information Security ForumTons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? Do you have children and want to ensure they stay safe online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep devices safe... you are wrong. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks.This Guide covers areas such as: Building resilience into our IT Lifestyle Online Identity Cyber Abuse: Scenarios and Stories Protecting Devices Download and share Gaming, gamble and travel Copycat websites I Spy and QR Codes Banking, apps and Passwords Includes chapers from Nick Wilding, General Manager at AXELOS, Tim Mitchell, Content Director at Get Safe Online, Maureen Kendal, Director at Cybercare, Nick Ioannou, Founder of Boolean Logical, and CYBERAWARE.''Conquer the Web is a full and comprehensive read for anyone wanting to know more about cyber-security. It takes it time to explain the many acronyms and jargon that are associated with our industry, and goes into detail where necessary.'' Sarah Jane MD of Layer8 Ltd''Online fraud, cyber bullying, identity theft and these are the unfortunate by products of the cyber age. The challenge is how do we protect ourselves in the online world? Conquer the Web provides practical guidance in an easy to understand language that allows readers to take a small number of steps that will greatly increase their online security. A must read for anyone looking to upskill their cyber awareness.'' Steve Durbin MD of Information Security Forum Limited
£13.49
Reaktion Books Crime Dot Com: From Viruses to Vote Rigging, How
Book SynopsisOn 4 May 2000, an email that read ‘kindly check the attached LOVELETTER’ was sent from Philippines. Attached was a virus, the Love Bug, and within days it had paralysed banks, broadcasters and businesses across the globe. The age of Crime Dot Com had begun. Geoff White charts the astonishing development of hacking, from its birth among the ruins of the Eastern Bloc to its coming of age as the most pervasive threat to our connected world. He takes us inside the workings of real-life cybercrimes, revealing how the tactics of high-tech crooks are now being harnessed by nation states. From Ashley Madison to election rigging, Crime Dot Com is a thrilling account of hacking, past and present, and of what the future might hold.Trade Review‘Arguing that cybercrime has grown in power and in danger, journalist White offers a well-written, expertly researched examination of the topic. Relying on published reports and in-depth interviews, the author looks at three different facets: cybercrime gangs, 'hacktivist' movements, and ways in which nation states use cybercrimes. White is at his best when describing this seemingly legally sanctioned hacking, such as in Russia and North Korea. In vivid detail, he explores the 2015 raid on Bangladesh’s Central Bank; the movement Anonymous, which has made attacks on governments; and ways in which data is hacked for profit . . . This is a fascinating, often gripping read, and a solid update to Brian Krebs’s Spam Nation . . . For true crime and technology enthusiasts in search of an overview of cybercrime.’ — Library Journal ‘Journalist White uses the stories of different hacks, dating from the 1980s to the 2016 election, to connect illicit activity on the earliest Internet forums to today's cyberattacks by hacktivists and state-sanctioned hacking teams. He humanizes this history by highlighting the people behind the tech: the Filipino student who unleashed the Love Bug, one of the first global cyberattacks to rely on psychological manipulation; the former cybercriminal who worked with the FBI to bring down Silk Road, a dark Web black market for illegal drugs (a scheme that involved him faking his own death); and the audio producer who lost thousands of dollars in a scam that exploited personal information stolen from telecommunications company TalkTalk.’ — Scientific American ‘Beginning with a tour of hacks from the 1980s through to the 2016 election (and a thrilling account of the 2015 Bangladesh Central Bank heist), this is a fascinating primer on the dangers of the cyber underworld, which includes hacktivist movements, cyber gangs, and nation-state attacks.’ — Globe and Mail, Toronto ‘Brilliantly researched and written, Crime Dot Com is a vivid insight into the scale of the threat to us all from crime born of and facilitated by the digital age.’ — Jon Snow, Channel 4 News ‘Geoff White is one of the most authoritative reporters on cybercrime and Crime Dot Com is an informative, accessible and entertaining tour of the cyber underworld. If you want to understand everything from ransomware to nation state attacks on key infrastructure this is an excellent primer.’ — Rory Cellan-Jones, BBC News ‘Geoff White offers up a comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. He ranges from the lone hacktivist to state-sponsored surveillance, from the Love Bug to the Lazarus Group, from Snowden’s revelations to the Huawei controversy. His book is, thankfully, jargon-free, keeping a tight focus on the humans involved rather than the technology. It is lively, insightful and, often, alarming.’ — Ewen MacAskill, former Chief Political Correspondent for the Guardian ‘Geoff White writes with insight and flair about a subject that concerns everyone – or should do. Criminals, hooligans, hostile state actors and terrorists attack our computers and networks every minute of every day. Our money, security and freedom are at risk. Yet the public is still pitifully unaware of the threats we face – and what we need to do to protect ourselves at an individual, business and government level. Crime Dot Com joins the dots, painting a well-informed, easy-to-understand and up-to-date picture of the mounting dangers caused by our complacency, greed and ignorance.’ — Edward Lucas, author of Deception: Spies, Lies and How Russia Dupes the West
£11.69