Available: macOS, Windows, Android, Tablet

An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.

Product Details :

Genre Book : Fiction
Author Book : Mark Russinovich
Publisher : Macmillan
Release Book : 2011-03-15
Download Book : 336 Pages
ISBN-10 : 9781429968041


Available: macOS, Windows, Android, Tablet

Looks at how banks and their lending policies facilitate fraud and identity theft, revealing the many ways large lending institutions have put customers at risk to maximize profits.

Product Details :

Genre Book : Business & Economics
Author Book : Byron Acohido
Publisher : Union Square Press
Release Book : 2008
Download Book : 297 Pages
ISBN-10 : 140275695X


Available: macOS, Windows, Android, Tablet

Eight years ago, Addie Webster was the victim of the most notorious kidnapping of the decade. Addie vanished—and her high-profile parents were forced to move on. Mark Webster is now president of the United States, fighting to keep the oval office after a tumultuous first term. Then the unthinkable happens: the president's daughter resurfaces. Addie is brought back into her family's fold, but who is this sixteen-year-old girl with a quiet, burning intelligence now living in the White House? There are those in the president's political circle who find her timely return suspicious. When a national security advisor approaches Darrow Fergusson, Addie's childhood best friend and the son of the president's chief of staff, he doesn't know what to think. How could the girl he's missed for all these years be a threat to national security? Still, at the risk of having his own secrets exposed, Darrow agrees to spy on Addie. He soon realizes that his old friend is much more than the traumatized victim of a sick political fringe group. Addie has come with a mission...but will she choose to complete it?

Product Details :

Genre Book : Juvenile Fiction
Author Book : Jan Gangsei
Publisher : Disney Electronic Content
Release Book : 2016-01-12
Download Book : 320 Pages
ISBN-10 : 9781484722633


Available: macOS, Windows, Android, Tablet

Will the world’s next war be fought in cyberspace? "It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world’s activity takes place on the internet now – including commerce, banking and communications -- the Pentagon has declared war in cyberspace an inevitability. For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This ebook, Zero Day: The Threat in Cyberspace, is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

Product Details :

Genre Book : Computers
Author Book : Robert O'Harrow
Publisher : Diversion Books
Release Book : 2013-01-15
Download Book : 100 Pages
ISBN-10 : 9781938120763


Available: macOS, Windows, Android, Tablet

"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"--

Product Details :

Genre Book : COMPUTERS
Author Book : Kim Zetter
Publisher : Broadway Books
Release Book : 2014
Download Book : 433 Pages
ISBN-10 : 9780770436193


Available: macOS, Windows, Android, Tablet

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. * This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists. * Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Product Details :

Genre Book : Computers
Author Book : Rob Shein
Publisher : Syngress
Release Book : 2004-07-16
Download Book : 412 Pages
ISBN-10 : 0080543928


Available: macOS, Windows, Android, Tablet

From David Baldacci--the modern master of the thriller and #1 worldwide bestselling novelist-comes a hero: a lone Army Special Agent taking on the toughest crimes facing the nation. And Zero Day is where it all begins.... John Puller is a combat veteran and the best military investigator in the U.S. Army's Criminal Investigation Division. His father was an Army fighting legend, and his brother is serving a life sentence for treason in a federal military prison. Puller has an indomitable spirit and an unstoppable drive to find the truth. Now, Puller is called out on a case in a remote, rural area in West Virginia coal country far from any military outpost. Someone has stumbled onto a brutal crime scene, a family slaughtered. The local homicide detective, a headstrong woman with personal demons of her own, joins forces with Puller in the investigation. As Puller digs through deception after deception, he realizes that absolutely nothing he's seen in this small town, and no one in it, are what they seem. Facing a potential conspiracy that reaches far beyond the hills of West Virginia, he is one man on the hunt for justice against an overwhelming force.

Product Details :

Genre Book : Fiction
Author Book : David Baldacci
Publisher : Grand Central Publishing
Release Book : 2011-10-31
Download Book : 448 Pages
ISBN-10 : 9780446573030


Available: macOS, Windows, Android, Tablet

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There’s also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Product Details :

Genre Book : Computers
Author Book : Mohssen Mohammed
Publisher : CRC Press
Release Book : 2013-07-02
Download Book : 337 Pages
ISBN-10 : 9781482219050


Available: macOS, Windows, Android, Tablet

Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and resulting liability of attacks and data breaches for U.S. consumers, companies, insurers, and for the civil justice system broadly. The authors provide insights about the zero-day vulnerability research and exploit development industry; give information on what proportion of zero-day vulnerabilities are alive (undisclosed), dead (known), or somewhere in between; and establish some baseline metrics regarding the average lifespan of zero-day vulnerabilities, the likelihood of another party discovering a vulnerability within a given time period, and the time and costs involved in developing an exploit for a zero-day vulnerability"--Publisher's description.

Product Details :

Genre Book : Computers
Author Book : Lillian Ablon
Publisher : Rand Corporation
Release Book : 2017-03-09
Download Book : 132 Pages
ISBN-10 : 9780833097613


Available: macOS, Windows, Android, Tablet

In April 2004, Barbara Egbert and Gary Chambers and their precocious 10-year-old daughter Mary embarked on a 2,650-mile hike from Mexico to Canada along the famed Pacific Crest Trail. This the well-told tale of their epic adventure, which required love, perseverance, and the careful rationing of toilet paper. Six months later, Mary would become the youngest person ever to successfully walk the entire trail.The trio weathered the heat of the Mojave, the jagged peaks of the Sierra, the rain of Oregon, and the final cold stretch through the Northern Cascades. They discovered which family values, from love and equality to thrift and cleanliness, could withstand a long, narrow trail and 137 nights together in a 6-by-8-foot tent. Filled with tidbits of wisdom, practical advice, and humor, this story will both entertain and inspire readers to dream about and plan their own epic journey.

Product Details :

Genre Book : Travel
Author Book : Barbara Egbert
Publisher : Wilderness Press
Release Book : 2010-01-01
Download Book : 224 Pages
ISBN-10 : 9780899974958