Athens Affair

Athens Affair

Author: Elle James

Publisher: Twisted Page Inc

Published: 2024-04-23

Total Pages: 227

ISBN-13: 1626955514

DOWNLOAD EBOOK

Former Navy SEAL Ace “Hammer” Hammerson, on security detail in Jordan, corners a thief, who is vaguely familiar, absconding with portions of an ancient copper scroll. When the thief is attacked and the scroll is stolen, Ace is drawn into a dangerous quest to retrieve the priceless antiquity. Former Israeli Sayeret Matkal, Jasmine Nassar, is forced to steal an ancient copper scroll from a museum in Amman Jordan to save her son’s life. After she successful retrieves the scroll from the museum, she’s knocked out by two men. They take the scrolls, leaving her without the bargaining chip she needs to save her son. She has forty-eight hours to retrieve the scroll, or her son will be killed. When Ace finds the semi-conscious thief and learns of her dilemma, he joins her in a mad dash across the Mediterranean to Athens, following a trail of intrigue that leads to danger and rekindled love that wasn’t in his original Brotherhood Protectors mission statement.


The Cuckoo's Egg

The Cuckoo's Egg

Author: Cliff Stoll

Publisher: Simon and Schuster

Published: 2024-07-02

Total Pages: 432

ISBN-13: 1668048167

DOWNLOAD EBOOK

In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.


Routledge Companion to Intelligence Studies

Routledge Companion to Intelligence Studies

Author: Robert Dover

Publisher: Routledge

Published: 2013-09-05

Total Pages: 536

ISBN-13: 1134480369

DOWNLOAD EBOOK

The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion will be essential reading for students of intelligence studies and strategic studies, and highly recommended for students of defence studies, foreign policy, Cold War studies, diplomacy and international relations in general.


The Cybersecurity Dilemma

The Cybersecurity Dilemma

Author: Ben Buchanan

Publisher: Oxford University Press

Published: 2017-02-01

Total Pages: 300

ISBN-13: 0190694807

DOWNLOAD EBOOK

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.


Thinking Security

Thinking Security

Author: Steven M. Bellovin

Publisher: Addison-Wesley Professional

Published: 2015-12-03

Total Pages: 468

ISBN-13: 0134278232

DOWNLOAD EBOOK

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk than ever, and even the world’s most security-focused organizations are being victimized by massive attacks. In Thinking Security, author Steven M. Bellovin provides a new way to think about security. As one of the world’s most respected security experts, Bellovin helps you gain new clarity about what you’re doing and why you’re doing it. He helps you understand security as a systems problem, including the role of the all-important human element, and shows you how to match your countermeasures to actual threats. You’ll learn how to move beyond last year’s checklists at a time when technology is changing so rapidly. You’ll also understand how to design security architectures that don’t just prevent attacks wherever possible, but also deal with the consequences of failures. And, within the context of your coherent architecture, you’ll learn how to decide when to invest in a new security product and when not to. Bellovin, co-author of the best-selling Firewalls and Internet Security, caught his first hackers in 1971. Drawing on his deep experience, he shares actionable, up-to-date guidance on issues ranging from SSO and federated authentication to BYOD, virtualization, and cloud security. Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively. Thinking Security will help you do just that.


Cybersecurity in Context

Cybersecurity in Context

Author: Chris Jay Hoofnagle

Publisher: John Wiley & Sons

Published: 2024-10-08

Total Pages: 548

ISBN-13: 1394262442

DOWNLOAD EBOOK

“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.


Jihadist Terror

Jihadist Terror

Author: Anthony Richards

Publisher: Bloomsbury Publishing

Published: 2019-08-22

Total Pages: 361

ISBN-13: 1788315561

DOWNLOAD EBOOK

The past 18 months have seen a radical increase in incidents of jihadist terrorism within the United Kingdom – from the Manchester Arena attack, to the Houses of Parliament, to London Bridge. As a result, there are renewed calls for a high-level national conversation about the causes of, and the responses to, this particular terrorist problem. This book identifies policy and research gaps from an evidence-based perspective – it analyses what we know, what we don't know and what we need to know in relation to understanding and countering the jihadist terrorist threat. It provides readers with a synthesis of the knowledge and evidence that exists on each of the key topic areas, representing a distinctive and valuable resource for policymakers, academics and students. The contributors to the volume are leading international and national experts, from both the scholarly and policy-making communities, who are ideally placed to comment on the question of jihadist terrorism and the future of the threat in the UK.


Surveillance or Security?

Surveillance or Security?

Author: Susan Landau

Publisher: MIT Press

Published: 2011-01-28

Total Pages: 400

ISBN-13: 0262294915

DOWNLOAD EBOOK

How, in the name of greater security, our current electronic surveillance policies are creating major security risks. Digital communications are the lifeblood of modern society. We “meet up” online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security?, the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks. How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.