CNN called Richard Thieme "a member of the cyber avant-garde". Digital Delirium named him "one of the most creative minds of the digital generation". Now Richard Thieme's wisdom on the social and cultural dimensions of technology is available in a single volume. "Islands in the Clickstream" ranges beyond the impact of technology to spirituality, psychological insight, and social commentary. Now that people are used to living in virtual worlds and move easily between online and offline worlds, they want to connect that experience to the deeper issues of our lives, including spiritual issues. Some examples include "Dreams Engineers Have", "The Crazy Lady on the Treadmill", and "Whistleblowers and Team Players". These essays raise serious questions for thoughtful readers. They have attracted favorable commentary from around the world and a fanatic, almost rabid fan base.* This author has become an extremely popular and highly visible talking head. He is a rare "personality" in the otherwise bland world of technology commentators.* The book leverages the loyalty of his audience in the same way Bill O'Reilly's "The O'Reilly Factor" and Al Franken's "Lies and the Lying Liars Who Tell Them" do.* The book is an easy read intended to provoke thought, discussion and disagreement.
"The only way you can tell the truth is through fiction," a veteran NSA senior told Richard Thieme. Mobius: A Memoir does just that. It is about a spy but not a typical "spy novel;" it is a love story but definitely not a "romance." Mobius is a stunning exploration of the impact of a life of deception and professional intelligence work which illuminates the world in which we all now live. Fiction that preceded Mobius includes 35 short stories, 19 of which are collected in "Mind Games," and the novel "FOAM." As a security researcher said, "Richard Thieme knows what he is talking about." A senior Technical Director at NSA noted, "The depth, complexity, and texture of Thieme's thought processes break the mold."
Governments around the world have had to deal with the UFO phenomenon for a good part of a century. How and why they did so is the subject of UFOs and Government, a history that for the first time tells the story from the perspective of the governments themselves. It's a perspective that reveals a great deal about what we citizens have seen, and puzzled over, from the "outside" for so many years. The story, which is unmasked by the governments' own documents, explains much that is new, or at least not commonly known, about the seriousness with which the military and intelligence communities approached the UFO problem internally. Those approaches were not taken lightly. In fact, they were considered matters of national security. At the same time, the story reveals how a subject with such apparent depth of experience and interest became treated as if it were a triviality. And it explains why one government, the United States government, deemed it wise, and perhaps even necessary, to treat it so. Though the book focuses primarily on the U. S. government's response to the UFO phenomenon, also included is the treatment of the subject by the governments of Sweden, Australia, France, Spain, and other countries. This large-format, fully illustrated book is the result of a team effort that called itself "The UFO History Group," a collection of veteran UFO historians and researchers who spent more than four years researching, consulting, writing, and editing to present a work of historical scholarship on government response to the UFO phenomenon. Michael Swords was the primary author of the United States chapters. The work was coordinated and edited by Robert Powell. Clas Svahn, Vicente-Juan Ballester Olmos, Bill Chalker, and Robert Powell contributed country chapters. Jan Aldrich was the primary content consultant, with additional content consultation and writing coming from Barry Greenwood and Richard Thieme. Steve Purcell was the primary photo illustration editor. From the foreword by Jerome Clark: "While UFOs and Government revisits an often unhappy history, the reading of it is far from an unhappy experience. The authors, eloquent, intelligent, sophisticated, and conscientious, provide us with the first credible, comprehensive overview of official UFO history in many years... Most of the current volume deals with U.S. military and intelligence responses to the UFO phenomenon, but it also features richly informative chapters that expand the story across the international arena. If you're looking for an example of a nation that dealt productively with the UFO reports that came its official way, you will take heart in the chapter on the French projects... From here on, every responsible treatment of UFOs and government will have to cite UFOs and Government prominently among its sources... this is the real story as accurately as it can be reconstructed in the second decade of the new century. I expect to keep my copy close at hand and to return to it often. While it cannot be said of many books, UFO-themed or otherwise, this is among the essential ones. Stray from it at your peril."
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter of success or failure for big business.* This groundbreaking book takes on the difficult ethical issues that IT professional confront every day.* The book provides clear guidelines that can be readily translated into policies and procedures.* This is not a text book. Rather, it provides specific guidelines to System Administrators, Security Consultants and Programmers on how to apply ethical standards to day-to-day operations.
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations. - Written by an internationally renowned author of Spies Among Us who travels the world making security presentations to tens of thousands of people a year - This short and concise book is specifically for the business, consumer, and technical user short on time but looking for the latest information along with reader friendly analogies - Describes the REAL security threats that you have to worry about, and more importantly, what to do about them
"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.This book will cover the program "Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things. - Google has 41% of the search engine market making it by far the most commonly used search engine - The Instant Messaging market has 250 million users world wide - Google Talking will be the first book to hit the streets about Google Talk
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.* Remember being a child and wanting to take something apart, like a phone, to see how it worked? This book is for you then as it details how specific hacker tools and techniques accomplish the things they do. * This book will not only give you knowledge of security tools but will provide you the ability to design more robust security solutions * Anyone can tell you what a tool does but this book shows you how the tool works
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel's entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.· If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need. · It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements· Also covers how to secure your entire multimedia network from malicious attacks