Nonfiction » Computers & Internet » Security / viruses

Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise
Price: $6.99 USD. Words: 24,010. Language: English. Published: July 26, 2019. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Security / viruses
The ability of the USAF to prevail in the highly contested environment of 2040 will be dictated by its ability to defend cyber-enabled systems, and the data within them, from compromise and manipulation. Yet contemporary cyber defense is faltering, and incremental improvements seem unlikely to overcome an exponentially growing cyber threat.
Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM
Price: $7.99 USD. Words: 80,880. Language: English. Published: July 25, 2019. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces four important government documents and reports dealing with the scientific and technical angle of flying, fighting and winning in cyberspace.
An Antifragile Approach to Preparing for Cyber Conflict - Historical Analogies, Current U.S. National Cyber Strategic Approach, Probability and Consequence of Positive and Negative Black Swan Events
Price: $4.99 USD. Words: 21,980. Language: English. Published: July 24, 2019. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » Computers & Internet » Security
"Defense" of any system against all highly improbable, but significant events, what are sometimes referred to as Black Swan events, is not possible. These events are, by their very nature unpredictable and uncertain, which is why they so dominate our thinking, and our culture.
When Norms Fail: North Korea and Cyber as an Element of Statecraft - Review of Notable DarkSeoul and Sony Pictures Hack Korean Cyber Attacks, Deterrence and Coercion, and Escalation Dominance
Price: $7.99 USD. Words: 24,080. Language: English. Published: January 31, 2019. Categories: Nonfiction » History » Asian, Nonfiction » Computers & Internet » Security / viruses
This paper reviews select malicious cyber actions by North Korea in an effort to analyze the effectiveness of cyber as a form of statecraft for weaker states and potential deterrence responses by victims of such malign actions.Powerful states already use cyber in attempts to coerce and deter actions by other states. Russia is perhaps the most active in this respect.
How to Hack Like a Legend
Price: $9.99 USD. Words: 37,110. Language: English. Published: July 21, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Security / viruses
This is the story of a hacker who met his match while breaking into a company: machine learning, behavioral analysis, artificial intelligence... Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent?
Time Sensitivity in Cyberweapon Reusability - Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
Price: $8.99 USD. Words: 28,320. Language: English. Published: June 24, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Security / viruses
A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched.
How to Hack Like a GOD
Price: $9.99 USD. Words: 22,300. Language: English. Published: September 1, 2017. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security / viruses
Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try.
How to Hack Like a Pornstar
Price: $9.99 USD. Words: 24,480. Language: English. Published: September 1, 2017. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » Computers & Internet » Networking / security
We will set up a fake – but realistic enough – target and go in detail over the main steps to hack the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.
Chinese Cyber Warfare: China's Cyber Incursions, Strategic Method, Information Warfare Threat - Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing
Price: $6.99 USD. Words: 127,070. Language: English. Published: March 14, 2014. Categories: Nonfiction » Computers & Internet » Security / viruses
Cyber espionage activities are activated due to a specific strategic thought process and resulting paradigm that subsequently uncovers strategic opportunities.

Related Categories