About Us
Welcome to BookAbout, the revolutionary platform for book lovers like us! We believe that finding the right book should be an enjoyable and effortless experience. As avid readers ourselves, we understand the frustration of searching through countless books by name or category, only to come up empty-handed.
That's why we created BookAbout, a platform that uses the latest AI technology to search through over 500,000 books to find the one that matches the idea of your query. With BookAbout, you can say goodbye to the traditional way of searching for books and hello to a new way of discovering your next favorite read.
We are dedicated to providing you with the best reading experience possible. We will be constantly updating our database to ensure that we have the latest books, and we're always working to improve our search algorithms to make your experience even better.
We invite you to join us on our journey of discovering the world of books. With BookAbout, you'll never have to settle for a mediocre book again. Start your search today and find your next literary adventure

Cyberwar: The Next Threat to National Security & What to Do About It
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security — and he was right. Now he warns us of another threat, silent but equally dangerous. Cyber W...ar is a powerful book about technology, government, and military strategy; about criminals, spies, soldiers, and hackers. This is the first book about the war of the future — cyber war — and a convincing argument that we may already be in peril of losing it. Cyber War goes behind the "geek talk" of hackers and computer scientists to explain clearly and convincingly what cyber war is, how cyber weapons work, and how vulnerable we are as a nation and as individuals to the vast and looming web of cyber criminals. From the first cyber crisis meeting in the White House a decade ago to the boardrooms of Silicon Valley and the electrical tunnels under Manhattan, Clarke and coauthor Robert K. Knake trace the rise of the cyber age and profile the unlikely characters and places at the epicenter of the battlefield. They recount the foreign cyber spies who hacked into the office of the Secretary of Defense, the control systems for U.S. electric power grids, and the plans to protect America's latest fighter aircraft. Economically and militarily, Clarke and Knake argue, what we've already lost in the new millennium's cyber battles is tantamount to the Soviet and Chinese theft of our nuclear bomb secrets in the 1940s and 1950s. The possibilities of what we stand to lose in an all-out cyber war — our individual and national security among them — are just as chilling. Powerful and convincing, Cyber War begins the critical debate about the next great threat to national security.

Secrets and Lies: Digital Security in a Networked World
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward g...uide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more. * Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs * Explains what cryptography can and can't do in achieving digital security

DarkMarket: Cyberthieves, Cybercops and You
An Investigative Reporter Evaluates The Capacity Of The International Law-enforcement Community To Combat Cybercrime, Offering Insight Into The Personalities Of Online Criminals And What Motivates The...ir Activities. An Inspector Calls ; Miranda Speaks Of A Brave New World ; Mr Hyde Of Lagos -- The Odessa Files ; Carderplanet ; A Family Affair ; Boa Constricted ; Script Rewrite -- Tiger, Tiger ; Game Theory ; No Turning Back ; A Passage To India ; Shadowlands -- The Iceman Cometh ; Cardersmarket ; Darkmarket ; The Office ; Suspicious Minds ; Donnie Brasco ; A Cunning Plan -- The Dron Legacy ; Dude You Fucked Up ; Matrix Squared ; The French Connection ; The Invisible Man -- Interlude : The Land Of I Know Not What And I Know Not Where -- Bilal In Pittsburgh ; The Sublime Portal -- Ciao, Cha0 ; Softly, Softly -- Orientation. The Dream World Of Mert Ortaç ; A Servant Of Two Masters ; Turkish Delight ; Return To Hades ; Turkey Shoot ; The Death Of Darkmarket -- Double Jeopardy ; Zorro Unmasked ; Who Are You? ; On The Road To Nowhere ; Midday Express. Misha Glenny. Includes Bibliographical References And Index.

Cybersecurity and Cyberwar: What Everyone Needs to Know(r)
Our Entire Modern Way Of Life Fundamentally Depends On The Internet. The Resultant Cybersecurity Issues Challenge Literally Everyone. Singer And Friedman Provide An Easy-to-read Yet Deeply Informative... Book Structured Around The Driving Questions Of Cybersecurity: How It All Works, Why It All Matters, And What We Can Do. Introduction -- Part I: How It All Works -- Part Ii: Why It Matters -- Part Iii: What Can We Do? -- Conclusions -- Glossary. P.w. Singer And Allan Friedman. Includes Bibliographical References And Index.

Cyberpunk: Outlaws and Hackers on the Computer Frontier
Using the exploits of three international hackers, Cyberpunk provides a fascinating tour of a bizarre subculture populated by outlaws who penetrate even the most sensitive computer networks and wreak ...havoc on the information they find — everything from bank accounts to military secrets. In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them. Publishers Weekly The spirit of cyberpunk only flickers in these three more-or-less able pieces of journalism about headline hacker cases that shook the computer industry. The authors' straightforward style serves the topic well, and portraits of the hackers' personalities are tantalizingly good. But the programming jargon invoked suggests little of the ``outlaw'' mentality that converts programming talent into hacking. The only case that really earns the title is ``Pengo and the Project Equalizer,'' the story of a West Berlin punk turned hacker, which contains enough exotic characters to cast a miniseries. Hafner is a computer reporter for the New York Times ; Markoff is a former Business Week reporter. (July)

Hacking S3crets
No description available

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
Over The Past Decade, There Have Been A Series Of Internet-linked Attacks On American Interests, Including North Korea's Retaliatory Hack Of Sony Pictures, China's Large-scale Industrial Espionage, Ru...ssia's 2016 Propaganda Campaign, And Quite A Lot More. The Cyber War Is Upon Us. Former Assistant Attorney General John Carlin Has Been On The Frontlines Of America's Ongoing Cyber War With Its Enemies. In This Dramatic Book, He Tells The Story Of His Years-long Secret Battle To Keep America Safe, And Warns Us Of The Perils That Await Us As We Embrace The Latest Digital Novelties -- Smart Appliances, Artificial Intelligence, Self-driving Cars -- With Little Regard For How Our Enemies Might Compromise Them. The Potential Targets For Our Enemies Are Multiplying: Our Electrical Grid, Our Companies, Our Information Sources, Our Satellites. As Each Sector Of The Economy Goes Digital, A New Vulnerability Is Exposed. The Internet Of Broken Things Is Not Merely A Cautionary Tale, Though. It Makes The Urgent Case That We Need To Start Innovating More Responsibly. As A Fleet Of Web-connected Cars And Pacemakers Rolls Off The Assembly Lines, The Potential For Danger Is Overwhelming. We Must See And Correct These Flaws Before Our Enemies Exploit Them.--procisws By Publisher. Foreword: Teamp0ison -- The Rise Of The Hackers -- Byzantine Hades -- Operation Aurora -- Qassam Cyber Fighters -- Apt 1 -- Slavik -- The Guardians Of Peace -- Black Vine -- Fake News -- Epilogue: Winning The Code War. John P. Carlin With Garrett M. Graff. Includes Bibliographical References And Index.

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
A former top-level National Security Agency insider goes behind the headlines to explore America's next great battleground: digital security. An urgent wake-up call that identifies our foes; unveils t...heir methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a glass house, all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
No description available

Stealing the Network: How to Own a Continent
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could b...e used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring * An informative and scary insight into the boundries of hacking and cyber-terrorism * Written by a team of the most accomplished cyber-security specialists in the world This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
