The Logic Bomb


Book Description

Tom Tresh is a small-time Los Angeles attorney always looking for a big score. Divorced and broke, with an ex-wife and a seven year old son to support, Tom has spent his career trying to walk the line between defending his criminal clients and becoming involved in their crimes. So when his old friend Charlie asks him to help broker a deal for a mysterious new computer program and promises him a huge payday for his services, Tom is willing to turn a blind eye to the details. Big mistake. Two of the people involved in the theft are found gruesomely slaughtered in a vacant lot. It’s a warning. If Tom doesn’t return the program, a “Logic Bomb” capable of destroying the world’s vital computer systems, then all Tom has -- his family, his friends, his life -- will be brutally exterminated. Tom’s frantic fight to unravel the conspiracy erupts into an all-out war waged in court and in the street against a cartel of corporate thugs, Chinese spies, domestic terrorists, and the U.S. government. Tom recruits an army of his own, led by the head of a murderous LA gang, a beautiful and deadly former cop, and a mysterious genius hacker. As Tom’s team races towards a fierce and violent showdown, no one can be trusted and everything is at stake. In The Logic Bomb, veteran Los Angeles attorney Scott Richard Lord has crafted a riveting novel as fresh as tomorrow’s Internet headlines. Populated with vividly compelling and original characters, sprawling across indelible Left Coast landmarks, the story is filled with the incredible but true details of the secret machinery behind the cyber war being fought everywhere today.




Subprime Attention Crisis


Book Description

From FSGO x Logic: a revealing examination of digital advertising and the internet's precarious foundation In Subprime Attention Crisis, Tim Hwang investigates the way big tech financializes attention. In the process, he shows us how digital advertising—the beating heart of the internet—is at risk of collapsing, and that its potential demise bears an uncanny resemblance to the housing crisis of 2008. From the unreliability of advertising numbers and the unregulated automation of advertising bidding wars, to the simple fact that online ads mostly fail to work, Hwang demonstrates that while consumers’ attention has never been more prized, the true value of that attention itself—much like subprime mortgages—is wildly misrepresented. And if online advertising goes belly-up, the internet—and its free services—will suddenly be accessible only to those who can afford it. Deeply researched, convincing, and alarming, Subprime Attention Crisis will change the way you look at the internet, and its precarious future. FSG Originals × Logic dissects the way technology functions in everyday lives. The titans of Silicon Valley, for all their utopian imaginings, never really had our best interests at heart: recent threats to democracy, truth, privacy, and safety, as a result of tech’s reckless pursuit of progress, have shown as much. We present an alternate story, one that delights in capturing technology in all its contradictions and innovation, across borders and socioeconomic divisions, from history through the future, beyond platitudes and PR hype, and past doom and gloom. Our collaboration features four brief but provocative forays into the tech industry’s many worlds, and aspires to incite fresh conversations about technology focused on nuanced and accessible explorations of the emerging tools that reorganize and redefine life today.




Computer Security Basics


Book Description

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security concepts you need to know, including access controls, malicious software, security policy, cryptography, biometrics, as well as government regulations and standards. This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing. Topics include: Computer security concepts Security breaches, such as viruses and other malicious programs Access controls Security policy Web attacks Communications and network security Encryption Physical security and biometrics Wireless network security Computer security and requirements of the Orange Book OSI Model and TEMPEST




The New Retirement Savings Time Bomb


Book Description

AS SEEN ON PUBLIC TELEVISION New for 2021—The complete action plan from Ed Slott, "the best source of IRA advice" (Wall Street Journal), to help you make sure your 401(k)s, IRAs, and retirement savings aren't depleted by taxes by the time you need to use them. If you're like most Americans, your most valuable asset is your retirement fund. We diligently save money for years, yet most of us don't know how to avoid the costly mistakes that cause a good chunk of those savings to be lost to needless and excessive taxation. Now, in the midst of a financial crisis, there is more need than ever to protect your assets. The New Retirement Savings Time Bomb, by renowned tax advisor Ed Slott, shows you in clear-cut layman's terms how to take control over your retirement savings plan. This easy-to-follow plan helps you place your assets to avoid the latest traps set out by congress in addition to any that might be set down the road, so you can keep your hard-earned money no matter what. And, it's fully up-to date with information on the SECURE Act and everything you need to know about how the coronavirus relief bills will affect your savings down the road. This book is required reading for every American with savings and investments who is planning to retire, be it five years from now or fifty.




Introduction to Cybercrime


Book Description

Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government—international, national, state, and local. As the exponential growth of the Internet has made the exchange and storage of information quick and inexpensive, the incidence of cyber-enabled criminal activity—from copyright infringement to phishing to online pornography—has also exploded. These crimes, both old and new, are posing challenges for law enforcement and legislators alike. What efforts—if any—could deter cybercrime in the highly networked and extremely fast-moving modern world? Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century seeks to address this tough question and enables readers to better contextualize the place of cybercrime in the current landscape. This textbook documents how a significant side effect of the positive growth of technology has been a proliferation of computer-facilitated crime, explaining how computers have become the preferred tools used to commit crimes, both domestically and internationally, and have the potential to seriously harm people and property alike. The chapters discuss different types of cybercrimes—including new offenses unique to the Internet—and their widespread impacts. Readers will learn about the governmental responses worldwide that attempt to alleviate or prevent cybercrimes and gain a solid understanding of the issues surrounding cybercrime in today's society as well as the long- and short-term impacts of cybercrime.




Computer Security Basics


Book Description

Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".




The Bomb


Book Description

From the author of the classic The Wizards of Armageddon and Pulitzer Prize finalist comes the definitive history of American policy on nuclear war—and Presidents’ actions in nuclear crises—from Truman to Trump. Fred Kaplan, hailed by The New York Times as “a rare combination of defense intellectual and pugnacious reporter,” takes us into the White House Situation Room, the Joint Chiefs of Staff’s “Tank” in the Pentagon, and the vast chambers of Strategic Command to bring us the untold stories—based on exclusive interviews and previously classified documents—of how America’s presidents and generals have thought about, threatened, broached, and just barely avoided nuclear war from the dawn of the atomic age until today. Kaplan’s historical research and deep reporting will stand as the permanent record of politics. Discussing theories that have dominated nightmare scenarios from Hiroshima and Nagasaki, Kaplan presents the unthinkable in terms of mass destruction and demonstrates how the nuclear war reality will not go away, regardless of the dire consequences.




Official (ISC)2 Guide to the CISSP CBK


Book Description

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da




Advances in Cyber Security


Book Description

As you read this your computer is in jeopardy of being hacked and your identity being stolen. How can you protect yourself? The world's foremost cyber security experts from FBI Director Robert S. Mueller, III to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack




What Every Engineer Should Know About Cyber Security and Digital Forensics


Book Description

Updates content and introduces topics such as business changes and outsourcing. Addresses new cyber security risks such as IoT and Distributed Networks (i.e., blockchain). Covers strategy based on the OODA loop in the cycle. Demonstrates application of the concepts through short case studies of real-world incidents chronologically delineating related events. Discusses certifications and reference manuals in cyber security and digital forensics. Includes an entire chapter on tools used by professionals in the field.