The Logic Bomb


Book Description

Tom Tresh is a small-time Los Angeles attorney always looking for a big score. Divorced and broke, with an ex-wife and a seven year old son to support, Tom has spent his career trying to walk the line between defending his criminal clients and becoming involved in their crimes. So when his old friend Charlie asks him to help broker a deal for a mysterious new computer program and promises him a huge payday for his services, Tom is willing to turn a blind eye to the details. Big mistake. Two of the people involved in the theft are found gruesomely slaughtered in a vacant lot. It’s a warning. If Tom doesn’t return the program, a “Logic Bomb” capable of destroying the world’s vital computer systems, then all Tom has -- his family, his friends, his life -- will be brutally exterminated. Tom’s frantic fight to unravel the conspiracy erupts into an all-out war waged in court and in the street against a cartel of corporate thugs, Chinese spies, domestic terrorists, and the U.S. government. Tom recruits an army of his own, led by the head of a murderous LA gang, a beautiful and deadly former cop, and a mysterious genius hacker. As Tom’s team races towards a fierce and violent showdown, no one can be trusted and everything is at stake. In The Logic Bomb, veteran Los Angeles attorney Scott Richard Lord has crafted a riveting novel as fresh as tomorrow’s Internet headlines. Populated with vividly compelling and original characters, sprawling across indelible Left Coast landmarks, the story is filled with the incredible but true details of the secret machinery behind the cyber war being fought everywhere today.




The Logic Bomb


Book Description

Amsterdam 2054: Damen van Hool is working on just another job: directing the vid story of how, three decades before, gravity wave signals were detected from another intelligence. His work takes him inside the datasystems of Kittcorps, the international corporation set up to exploit the new science and technologies arising from the alien contact. But he stumbles across something that Kittcorps would rather keep secret; something which puts him in mortal peril...




Subprime Attention Crisis


Book Description

From FSGO x Logic: a revealing examination of digital advertising and the internet's precarious foundation In Subprime Attention Crisis, Tim Hwang investigates the way big tech financializes attention. In the process, he shows us how digital advertising—the beating heart of the internet—is at risk of collapsing, and that its potential demise bears an uncanny resemblance to the housing crisis of 2008. From the unreliability of advertising numbers and the unregulated automation of advertising bidding wars, to the simple fact that online ads mostly fail to work, Hwang demonstrates that while consumers’ attention has never been more prized, the true value of that attention itself—much like subprime mortgages—is wildly misrepresented. And if online advertising goes belly-up, the internet—and its free services—will suddenly be accessible only to those who can afford it. Deeply researched, convincing, and alarming, Subprime Attention Crisis will change the way you look at the internet, and its precarious future. FSG Originals × Logic dissects the way technology functions in everyday lives. The titans of Silicon Valley, for all their utopian imaginings, never really had our best interests at heart: recent threats to democracy, truth, privacy, and safety, as a result of tech’s reckless pursuit of progress, have shown as much. We present an alternate story, one that delights in capturing technology in all its contradictions and innovation, across borders and socioeconomic divisions, from history through the future, beyond platitudes and PR hype, and past doom and gloom. Our collaboration features four brief but provocative forays into the tech industry’s many worlds, and aspires to incite fresh conversations about technology focused on nuanced and accessible explorations of the emerging tools that reorganize and redefine life today.




Computer Security Basics


Book Description

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST




The Bomb


Book Description

From the author of the classic The Wizards of Armageddon and Pulitzer Prize finalist comes the definitive history of American policy on nuclear war—and Presidents’ actions in nuclear crises—from Truman to Trump. Fred Kaplan, hailed by The New York Times as “a rare combination of defense intellectual and pugnacious reporter,” takes us into the White House Situation Room, the Joint Chiefs of Staff’s “Tank” in the Pentagon, and the vast chambers of Strategic Command to bring us the untold stories—based on exclusive interviews and previously classified documents—of how America’s presidents and generals have thought about, threatened, broached, and just barely avoided nuclear war from the dawn of the atomic age until today. Kaplan’s historical research and deep reporting will stand as the permanent record of politics. Discussing theories that have dominated nightmare scenarios from Hiroshima and Nagasaki, Kaplan presents the unthinkable in terms of mass destruction and demonstrates how the nuclear war reality will not go away, regardless of the dire consequences.




Information Risk and Security


Book Description

Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.




Legal Issues in Information Security


Book Description

This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --




Fundamentals of Information Systems Security


Book Description

Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of the new risks, threats, and vulnerabilities associated with the transition to a digital world. Part 2 presents a high level overview of the Security+ Exam and provides students with information as they move toward this certification.




CompTIA Security+ SY0-601 Cert Guide


Book Description

This is the eBook edition of the CompTIA Security+ SY0-601 Cert Guide. This eBook does not include access to the Pearson Test Prep practice exams that comes with the print edition. Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA Security+ SY0-601 Cert Guide from Pearson IT Certification, a leader in IT certification learning. CompTIA Security+ SY0-601 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. CompTIA Security+ SY0-601 Cert Guide focuses specifically on the objectives for the CompTIA Security+ SY0-601 exam. Leading security experts Omar Santos, Ron Taylor, and Joseph Mlodzianowski share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. This complete study package includes * A test-preparation routine proven to help you pass the exams * Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section * Chapter-ending exercises, which help you drill on key concepts you must know thoroughly * An online interactive Flash Cards application to help you drill on Key Terms by chapter * A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies * Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. This study guide helps you master all the topics on the CompTIA Security+ SY0-601 exam, including * Cyber attacks, threats, and vulnerabilities * Social engineering, wireless attacks, denial of service attacks * Threat hunting and incident response * Indicators of compromise and threat intelligence * Cloud security concepts and cryptography * Security assessments and penetration testing concepts * Governance, risk management, and cyber resilience * Authentication, Authorization, and Accounting (AAA) * IoT and Industrial Control Systems (ICS) security * Physical and administrative security controls




Information Technology in 21st Century Battlespace


Book Description