Truth


Book Description




Hack Stone


Book Description

He's just made it home and found his unwanted past waiting on his doorstep! After barely surviving his last mission, a link to his secret past emerges and once again military runaway Hack has to hit the road in the search for answers. Joined by fellow cyber experiment Jane, what starts as a simple task to track down some of their creators turns into a nightmare cross country journey with everyone gunning for their destruction, even an entire town out to make their lives a misery! From the Triad to bikers to corrupt cops, Hack is going to learn the hard way that sometimes family secrets are sometimes best left deep underground.




Stone’s Promise


Book Description

After narrowly missing putting down Denny Craven at the end of Stone's Way, Zack and his partner Dounia Al Zanawi have reached a level of frustration that does not sit well with either. Denny, having come out of the assassination attempt unscathed, begins a counter campaign to rid himself of not only Zack, but takes on the entire CAPSTONE-X team. Promising himself he will spare no expense, nor effort in putting down his arch rivals, Denny calls on the resources of the Consortium, a Washington DC based group of the most powerful men and women in North America, to assist in his effort. Denny's plan brings some success, executing two of the CAPSTONE team, and managing to send the rest scattering for safety. Come along, as Zack takes on the bad guys, in a head-to-head battle for the heart and soul of the American People.










Surrogate Warfare


Book Description

Surrogate Warfare explores the emerging phenomenon of “surrogate warfare” in twenty-first century conflict. The popular notion of war is that it is fought en masse by the people of one side versus the other. But the reality today is that both state and non-state actors are increasingly looking to shift the burdens of war to surrogates. Surrogate warfare describes a patron's outsourcing of the strategic, operational, or tactical burdens of warfare, in whole or in part, to human and/or technological substitutes in order to minimize the costs of war. This phenomenon ranges from arming rebel groups, to the use of armed drones, to cyber propaganda. Krieg and Rickli bring old, related practices such as war by mercenary or proxy under this new overarching concept. Apart from analyzing the underlying sociopolitical drivers that trigger patrons to substitute or supplement military action, this book looks at the intrinsic trade-offs between substitutions and control that shapes the relationship between patron and surrogate. Surrogate Warfare will be essential reading for anyone studying contemporary conflict.




Science Hacks


Book Description

With Science Hacks, you no longer need a PhD to understand the fascinating ideas behind science's greatest theories and discoveries. This latest addition to the ingenious new Hacks series will show you a technique for understanding and, crucially, remembering 100 of the most important and most interesting scientific theories from throughout the ages. On each topic, you'll start with a helicopter overview of the subject, which will give you an introduction to the idea and some context surrounding it. Next, you'll zoom in on the core elements of the theory, with clear explanation of each point to make sure you really understand the concept before finally, you'll be given a one-liner hack to really make the theory stick in your mind. Includes such topics and fields as: Particle Physics Evolutionary Biology Genetics Medicine Chemistry Ecology










Learn Ethical Hacking from Scratch


Book Description

Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is for Learning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.