Cyber Spy Hunters!

Cyber Spy Hunters!

Author: Mari Rich

Publisher: Mason Crest Publishers

Published: 2015-09

Total Pages: 0

ISBN-13: 9781422234242

DOWNLOAD EBOOK

Hackers are out to get you . . . but these experts are on the job to stop them! Cybercrime is a growing problem, affecting businesses, governments, and individuals. A growing number of computer wizards are using science to prevent crime . . . or track down the cybercriminals. Visit this secret world inside! Every book in the SCIENTISTS IN ACTION! series takes you on a journey where science and adventure meet. Science is not just for the classroom or the lab--it's a living, breathing, exciting part of our world today. Throw off that lab coat and get out and do some science! Each title in this series contains color photos, insider quotes from real scientists in the field, recent news items highlighting the excitement of each field, and back matter including: an index, further reading lists for books and internet resources, and a series glossary. Mason Crest's editorial team has placed Key Icons to Look for throughout the books in this series in an effort to encourage library readers to build knowledge, gain awareness, explore possibilities and expand their viewpoints through our content rich non-fiction books. Key Icons are as follows: Words to Understand are shown at the front of each chapter with definitions. These words are then used in the prose throughout that chapter, and are emboldened, so that the reader is able to reference back to the definitions- building their vocabulary and enhancing their reading comprehension. Sidebars are highlighted graphics with content rich material within that allows readers to build knowledge and broaden their perspectives by weaving together additional information to provide realistic and holistic perspectives. Text Dependent Questions are placed at the end of each chapter. They challenge the reader's comprehension of the chapter they have just read, while sending the reader back to the text for more careful attention to the evidence presented there. Research Projects are provided at the end of each chapter as well and provide readers with suggestions for projects that encourage deeper research and analysis. A Series Glossary of Key Terms is included in the back matter contains terminology used throughout the series. Words found here broaden the reader's knowledge and understanding of terms used in this field.


Gray Day

Gray Day

Author: Eric O'Neill

Publisher: Crown

Published: 2020-03-24

Total Pages: 306

ISBN-13: 0525573534

DOWNLOAD EBOOK

A cybersecurity expert and former FBI “ghost” tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. “Both a real-life, tension-packed thriller and a persuasive argument for traditional intelligence work in the information age.”—Bruce Schneier, New York Times bestselling author of Data and Goliath and Click Here to Kill Everybody Eric O’Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI’s top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets. With zero training in face-to-face investigation, O’Neill found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies—and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a fondness for handguns. In the months that follow, O’Neill’s self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches O’Neill the game of spycraft. The student will just have to learn to outplay his teacher if he wants to win. A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage—and how we might begin to catch up.


Hunting Cyber Criminals

Hunting Cyber Criminals

Author: Vinny Troia

Publisher: John Wiley & Sons

Published: 2020-02-11

Total Pages: 544

ISBN-13: 1119540925

DOWNLOAD EBOOK

The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book’s unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization’s data.


CUCKOO'S EGG

CUCKOO'S EGG

Author: Clifford Stoll

Publisher: Doubleday

Published: 2012-05-23

Total Pages: 473

ISBN-13: 0307819426

DOWNLOAD EBOOK

Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter"—a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases—a one-man sting operation that finally gained the attention of the CIA . . . and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.


The Quantum Spy: A Thriller

The Quantum Spy: A Thriller

Author: David Ignatius

Publisher: W. W. Norton & Company

Published: 2017-11-07

Total Pages: 411

ISBN-13: 039325416X

DOWNLOAD EBOOK

“The Quantum Spy takes us to a whole new level of intrigue and espionage. It’s also unbelievably timely. In short: David Ignatius knows his stuff.” —Wolf Blitzer A hyper-fast quantum computer is the digital equivalent of a nuclear bomb; whoever possesses one will be able to shred any encryption and break any code in existence. The question is: who will build one first, the U.S. or China? In this gripping thriller, U.S. quantum research labs are compromised by a suspected Chinese informant, inciting a mole hunt of history-altering proportions. CIA officer Harris Chang leads the charge, pursuing his target from Singapore to Mexico and beyond. Do the leaks expose real secrets, or are they false trails meant to deceive the Chinese? The answer forces Chang to question everything he thought he knew about loyalty, morality, and the primacy of truth.


Forensic Science Investigator

Forensic Science Investigator

Author: Tamra B. Orr

Publisher: Cherry Lake

Published: 2015-08-01

Total Pages: 36

ISBN-13: 1633627403

DOWNLOAD EBOOK

Readers will learn what it takes to succeed as a forensic science investigator. The book also explains the necessary educational steps, useful character traits, potential hazards, and daily job tasks related to this career. Sidebars include thought-provoking trivia. Questions in the backmatter ask for text-dependent analysis. Photos, a glossary, and additional resources are included.


The Recruiter

The Recruiter

Author: Douglas London

Publisher:

Published: 2022-09-06

Total Pages: 432

ISBN-13: 9780306847318

DOWNLOAD EBOOK

This revealing memoir from a 34-year veteran of the CIA who worked as a case officer and recruiter of foreign agents before and after 9/11 provides an invaluable perspective on the state of modern spy craft, how the CIA has developed, and how it must continue to evolve. If you've ever wondered what it's like to be a modern-day spy, Douglas London is here to explain. London's overseas work involved spotting and identifying targets, building relationships over weeks or months, and then pitching them to work for the CIA--all the while maintaining various identities, a day job, and a very real wife and kids at home. The Recruiter: Spying and the Lost Art of American Intelligence captures the best stories from London's life as a spy, his insights into the challenges and failures of intelligence work, and the complicated relationships he developed with agents and colleagues. In the end, London presents a highly readable insider's tale about the state of espionage, a warning about the decline of American intelligence since 9/11 and Iraq, and what can be done to recover.


Cyberspies

Cyberspies

Author: Gordon Corera

Publisher: Simon and Schuster

Published: 2016-07-05

Total Pages: 367

ISBN-13: 1681771942

DOWNLOAD EBOOK

As the digital era become increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all.Corera’s compelling narrative takes us from the Second World War through the Cold War and the birth of the internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.


Cyber Attacks, Counterattacks, and Espionage

Cyber Attacks, Counterattacks, and Espionage

Author: Daniel E. Harmon

Publisher: The Rosen Publishing Group, Inc

Published: 2016-12-15

Total Pages: 66

ISBN-13: 1508173176

DOWNLOAD EBOOK

With constant headlines announcing the latest infiltration by hackers, it is more important than ever to be well informed on the topic. In this timely book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime. Readers will be as informed as they are captivated by cryptography’s internet-age version of a criminal and crime-fighting story.