Rogue Code

Rogue Code PDF Author: Mark Russinovich
Publisher: Macmillan
ISBN: 1250035376
Category : Fiction
Languages : en
Pages : 398

Get Book Here

Book Description
"Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system been infiltrated but that those in charge knew about it. Yet for some reason, they allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. When Jeff uncovers the crime, they suddenly turn on him. Accused of grand larceny, Jeff must find and expose the criminals not just to prove his innocence but to stop a billion-dollar heist that could upend the U.S. economy. Praised for his combination of real-world technology and sharp action, Mark Russinovich delivers a thriller about a cyber threat that seems all-too-possible"--

Rogue Code

Rogue Code PDF Author: Mark Russinovich
Publisher: Macmillan
ISBN: 1250035376
Category : Fiction
Languages : en
Pages : 398

Get Book Here

Book Description
"Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system been infiltrated but that those in charge knew about it. Yet for some reason, they allowed the hackers to steal millions of dollars from accounts without trying to stop the theft. When Jeff uncovers the crime, they suddenly turn on him. Accused of grand larceny, Jeff must find and expose the criminals not just to prove his innocence but to stop a billion-dollar heist that could upend the U.S. economy. Praised for his combination of real-world technology and sharp action, Mark Russinovich delivers a thriller about a cyber threat that seems all-too-possible"--

Code 44

Code 44 PDF Author: S. D. Crockett
Publisher:
ISBN: 9781734200454
Category :
Languages : en
Pages :

Get Book Here

Book Description
In the year 2029, people are allowing neural implants known as chips to be inserted into their foreheads. Marketed as a medical device that will prevent disease and provide health benefits, the chip also tracks everything we see and do. In an Internet of Things world, the chip is celebrated for curing disease and creating unlimited virtual realities. An underground resistance group is working to expose a government plan designed to hack into citizens' brains via the chip and control their thoughts. The group recruits Nick Winston, a young tech executive, to go undercover in the government's newest agency, BrainShare, and find evidence that will expose the truth. Nick slowly descends into a whistleblower's worst nightmare, walking a dangerous tightrope-each action becoming a choice to save his own life or save his society.Code 44 thrusts us into a dystopian future, not too far off, where the merging of man and machine unravels to show how the subtle erosion of a free society creates the ultimate fight between individual privacy and the national good.

Zero Day

Zero Day PDF Author: Mark Russinovich
Publisher: Macmillan
ISBN: 1429968044
Category : Fiction
Languages : en
Pages : 327

Get Book Here

Book Description
An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.

The Codes of the Exiled Rogue

The Codes of the Exiled Rogue PDF Author: Sandeep Adnani
Publisher: Sandeep Adnani
ISBN: 9781393436942
Category : Fiction
Languages : en
Pages : 306

Get Book Here

Book Description
The three seek the truth that the duo already know. The Host watches them all. The year is 2039. Tristan, Aurora and Sid get a mysterious hand written note inviting them to a clandestine meeting which promises them to reveal the truth they have been seeking. They embark on a stimulating journey of riddles, sharing their stories as they go along wondering who their invisible Host is! They are finally presented with a reality they are Ill-equipped to handle. Will they abandon their expedition into truth? Whose is the invisible hand that guides them? Why were they the ones who were chosen? What is their ultimate fate? Are they the victims of a terrible experiment or are they to be the torch-bearers for humanity? The Codes of the Exiled Rogue will shatter every belief you hold real and true!

Investigating Computer-Related Crime, Second Edition

Investigating Computer-Related Crime, Second Edition PDF Author: Peter Stephenson
Publisher: CRC Press
ISBN: 1482218429
Category : Law
Languages : en
Pages : 407

Get Book Here

Book Description
Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the field, and new technology to offer a fresh look at the topic of digital investigation. Following an introduction to cybercrime and its impact on society, this book examines: Malware and the important differences between targeted attacks and general attacks The framework for conducting a digital investigation, how it is conducted, and some of the key issues that arise over the course of an investigation How the computer forensic process fits into an investigation The concept of system glitches vs. cybercrime and the importance of weeding out incidents that don’t need investigating Investigative politics that occur during the course of an investigation, whether to involve law enforcement, and when an investigation should be stopped How to prepare for cybercrime before it happens End-to-end digital investigation Evidence collection, preservation, management, and effective use How to critique your investigation and maximize lessons learned This edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Discussion questions at the end of each chapter are designed to stimulate further debate into this fascinating field.

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK PDF Author: Adam Gordon
Publisher: CRC Press
ISBN: 1482262762
Category : Computers
Languages : en
Pages : 1283

Get Book Here

Book Description
As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC) conducts this process on a regular basis to ensure that the examinations and

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security PDF Author: Michael Cross
Publisher: Elsevier
ISBN: 0080504094
Category : Computers
Languages : en
Pages : 513

Get Book Here

Book Description
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. - The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 - Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more

Trojan Horse

Trojan Horse PDF Author: Mark Russinovich
Publisher: Macmillan
ISBN: 1250010497
Category : Fiction
Languages : en
Pages : 309

Get Book Here

Book Description
It's two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida's assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team. But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace---more sophisticated than any virus seen before---has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance. A thrilling suspense story and a sober warning from one of the world's leading experts on cyber-security, Trojan Horse exposes the already widespread use of international cyber-espionage as a powerful and dangerous weapon, and the lengths to which one man will go to stop it.

Investigating Computer-Related Crime

Investigating Computer-Related Crime PDF Author: Peter Stephenson
Publisher: CRC Press
ISBN: 1420048872
Category : Computers
Languages : en
Pages : 326

Get Book Here

Book Description
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techn

Mastering Windows Network Forensics and Investigation

Mastering Windows Network Forensics and Investigation PDF Author: Steve Anson
Publisher: John Wiley & Sons
ISBN: 1118236084
Category : Computers
Languages : en
Pages : 663

Get Book Here

Book Description
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement personnel, prosecutors, and corporate investigators--provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.