DEFCON-2


Book Description

The closest we've ever come to the end of the world "DEFCON-2 is the best single volume on the Cuban Missile Crisis published and is an important contribution to the history of the Cold War. Beyond the military and political facts of the crisis, Polmar and Gresham sketch the personalities that created and coped with the crisis. They also show us how close we came to the edge without becoming sensationalistic."—Larry Bond, bestselling author of Dangerous Ground Spy-satellite and aerial-reconnaissance photos reveal that one of the United States's bitterest enemies may be acquiring weapons of mass destruction and the means to use them against the American homeland. Administration officials refuse to accept intelligence professionals' interpretation of these images and order an end to spy missions over the offending nation. More than a month later, after vicious infighting, the president orders the spy missions to resume. The new photos reveal an array of ballistic missiles, capable of carrying nuclear warheads and striking deep within U.S. territory. It appears that the missiles will be fully operational within one week. This is not a plot setup for a suspense novel; it is the true story of the most terrifying moment in the 45-year Cold War between the United States and the Soviet Union: the Cuban Missile Crisis. DEFCON-2 tells this tale as it has never been told before—from both sides, with the help of hundreds of recently declassified U.S. and Soviet documents, as well as interviews with numerous former spies, military figures, and government officials who speak out here for the first time.




DEFCON One


Book Description

From the acclaimed thriller writer, Joe Weber, comes a chilling novel of the Cold War. The United States and Soviet Union are at the brink of war. Fearful of U.S. plans for an anti-missile defense system that could defeat a USSR first strike, the Soviet General Secretary, the conservative successor to Gorbachev, conceives a plan to act first. Russian Bear bombers violate U.S. airspace, leading to a response by American F-15s. A U.S. Navy battle group is attacked in the North Atlantic. And in orbit, a Soviet hunter killer satellite attacks an American space shuttle. As the world careens towards a nuclear conflict, only a lone CIA operative stands between peace and utter destruction. But can he act in time? Vividly portraying the real world of military hardware and combining it with page-turning action, DEFCON One is the definition of a classic thriller.




Google Hacking for Penetration Testers


Book Description

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.




Rootkits and Bootkits


Book Description

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software. As you inspect and dissect real malware, you’ll learn: • How Windows boots—including 32-bit, 64-bit, and UEFI mode—and where to find vulnerabilities • The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard • Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi • How to perform static and dynamic analysis using emulation and tools like Bochs and IDA Pro • How to better understand the delivery stage of threats against BIOS and UEFI firmware in order to create detection capabilities • How to use virtualization tools like VMware Workstation to reverse engineer bootkits and the Intel Chipsec tool to dig into forensic analysis Cybercrime syndicates and malicious actors will continue to write ever more persistent and covert attacks, but the game is not lost. Explore the cutting edge of malware analysis with Rootkits and Bootkits. Covers boot processes for Windows 32-bit and 64-bit operating systems.




Applications of Evolutionary Computation


Book Description

Evolutionary Computation (EC) techniques are e?cient, nature-inspired me- ods based on the principles of natural evolution and genetics. Due to their - ciency and simple underlying principles, these methods can be used for a diverse rangeofactivitiesincludingproblemsolving,optimization,machinelearningand pattern recognition. A large and continuously increasing number of researchers and professionals make use of EC techniques in various application domains. This volume presents a careful selection of relevant EC examples combined with a thorough examination of the techniques used in EC. The papers in the volume illustrate the current state of the art in the application of EC and should help and inspire researchers and professionals to develop e?cient EC methods for design and problem solving. All papers in this book were presented during EvoApplications 2010, which included a range of events on application-oriented aspects of EC. Since 1998, EvoApplications — formerly known as EvoWorkshops— has provided a unique opportunity for EC researchers to meet and discuss application aspects of EC and has been an important link between EC research and its application in a variety of domains. During these 12 years, new events have arisen, some have disappeared,whileothershavematuredtobecomeconferencesoftheirown,such as EuroGP in 2000, EvoCOP in 2004, and EvoBIO in 2007. And from this year, EvoApplications has become a conference as well.




Kingpin


Book Description

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime. The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy. The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots. The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring. And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police. Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead. Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today. Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.




Direct Selling Success


Book Description

The eagerly awaited sequel to the worldwide bestseller How to Build a Multi-Level Money Machine from Direct Selling icon and Hall of Famer Randy Gage Randy Gage revolutionized the Direct Selling profession with the bestselling phenomenon How to Build a Multi-Level Money Machine, translated into more than 20 languages. Now he’s at it again with the long-waited sequel: Direct Selling Success. This all-new book is the ultimate textbook on creating success in the business. You’ll learn everything from choosing the right company, finding the best candidates, becoming a rock star recruiter—to advanced skills like making powerful presentations, becoming a leader, and creating a leadership factory on your team. Since Randy’s previous book took the profession by storm, there have been significant changes to the business that demand a fully up-to-date sequel: Regulatory oversight of the industry has increased dramatically, it’s now much trickier to make simple product or income claims, and distributors are hungry for the right information on how to get it done. The business model has gained widespread public acceptance—it’s now common for industry companies to secure naming rights for sports arenas and sponsor major league teams. Even Warren Buffet and Forbes Magazine promote the business. More and more people are taking on side hustles and are considering or already in the business.Maybe the biggest change is the impact of e-commerce, social media, and mobile apps on the business today. Randy’s up-to-the-minute book explains how you can become successful in this new environment. The need for expert, proven guidance on the Direct Selling and Network Marketing profession has never been greater than right now. Direct Selling Success will help you: Choose the best company for you Locate the best candidates Become a Rock Star recruiter Design your system to create maximum duplication Employ the latest e-commerce and social media marketing techniques to grow your business Conduct powerful persuasive presentations Become a positive, dynamic leader for your team The Direct Selling industry continues to experience robust growth. The opportunity to generate passive income and create complete financial freedom is immense under current conditions. Direct Selling Success is a must-have resource for anyone who wants to build a team of customers and distributors that will generate residual income for years to come.




Sandworm


Book Description

"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.




The Ethics of Computer Games


Book Description

Why computer games can be ethical, how players use their ethical values in gameplay, and the implications for game design. Despite the emergence of computer games as a dominant cultural industry (and the accompanying emergence of computer games as the subject of scholarly research), we know little or nothing about the ethics of computer games. Considerations of the morality of computer games seldom go beyond intermittent portrayals of them in the mass media as training devices for teenage serial killers. In this first scholarly exploration of the subject, Miguel Sicart addresses broader issues about the ethics of games, the ethics of playing the games, and the ethical responsibilities of game designers. He argues that computer games are ethical objects, that computer game players are ethical agents, and that the ethics of computer games should be seen as a complex network of responsibilities and moral duties. Players should not be considered passive amoral creatures; they reflect, relate, and create with ethical minds. The games they play are ethical systems, with rules that create gameworlds with values at play. Drawing on concepts from philosophy and game studies, Sicart proposes a framework for analyzing the ethics of computer games as both designed objects and player experiences. After presenting his core theoretical arguments and offering a general theory for understanding computer game ethics, Sicart offers case studies examining single-player games (using Bioshock as an example), multiplayer games (illustrated by Defcon), and online gameworlds (illustrated by World of Warcraft) from an ethical perspective. He explores issues raised by unethical content in computer games and its possible effect on players and offers a synthesis of design theory and ethics that could be used as both analytical tool and inspiration in the creation of ethical gameplay.




Encyclopedia of the Cold War


Book Description

Between 1945 and 1991, tension between the USA, its allies, and a group of nations led by the USSR, dominated world politics. This period was called the Cold War – a conflict that stopped short to a full-blown war. Benefiting from the recent research of newly open archives, the Encyclopedia of the Cold War discusses how this state of perpetual tensions arose, developed, and was resolved. This work examines the military, economic, diplomatic, and political evolution of the conflict as well as its impact on the different regions and cultures of the world. Using a unique geopolitical approach that will present Russian perspectives and others, the work covers all aspects of the Cold War, from communism to nuclear escalation and from UFOs to red diaper babies, highlighting its vast-ranging and lasting impact on international relations as well as on daily life. Although the work will focus on the 1945–1991 period, it will explore the roots of the conflict, starting with the formation of the Soviet state, and its legacy to the present day.