Herbert George Wells
- The Invisible Man
- The New Machiavelli
- The Time Machine
- The War of the Worlds
- The World Set Free
- Time Machine
The four threat mitigation strategies fall into several categories. IPv6 is a technical solution. Art of War is military. The third and fourth strategies are hybrid: deterrence is a mix of military and political considerations; arms control is a political/technical approach.
The Decision Making Trial and Evaluation Laboratory (DEMATEL) is used to place the key research concepts into an influence matrix. DEMATEL analysis demonstrates that IPv6 is currently the most likely of the four examined strategies to improve a nation’s cyber defence posture.
There are two primary reasons why IPv6 scores well in this research. First, as a technology, IPv6 is more resistant to outside influence than the other proposed strategies, particularly deterrence and arms control, which should make it a more reliable investment. Second, IPv6 addresses the most significant advantage of cyber attackers today – anonymity.
This should be titled “some infosec books” – namely the infosec books that I have recently read or used.
“SQL Injection Attacks and Defense” by Justin Clarke Amazon – http://www.amazon.com/gp/product/1597494240/ |
|
“The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws” by Dafydd Stuttard, Marcus Pinto Amazon – http://www.amazon.com/gp/product/0470170778/ |
|
“The Database Hacker’s Handbook: Defending Database Servers” by David Litchfield, Chris Anley, John Heasman, Bill Grindlay Amazon – http://www.amazon.com/gp/product/0764578014/ref=cm_li_v_cr_self?tag=linkedin-20 |
|
“Netcat Power Tools” by Jan Kanclirz, Brian Baskin, Thomas Wilhelm Amazon – http://www.amazon.com/gp/product/1597492574/r |
|
“Network Security Assessment: Know Your Network” by Chris McNab; O’Reilly 2004.03; ISBN: 0-596-00611-X
Recommended: Very good complement to Horton’s and Mugge’s “HackNotes Network Security Portable Reference”. It would be nice to be able to cross-pollinate these two books into one useful tome. |
|
“Network Security Hacks: Tips & Tools for Protecting Your Privacy” by Andrew Lockhart et al.; O’Reilly; 1st ed 2004.04, 2nd ed 2006.11; ISBN 10: 0-596-52763-2, ISBN 13: 978-0-596-52763-1.
Recommended: Very good guide to hardening of common network/server platforms, both the first and the second editions. |
|
“HackNotes(tm) Web Security Pocket Reference” by Mike Shema\ Amazon – http://www.amazon.com/gp/product/0072227842/ |
|
“HackNotes(tm) Windows Security Portable Reference” by Michael O’Dea; McGraw-Hill/Osborne 2004; ISBN 0-07-222785-0.
Recommended |
|
“HackNotes(tm) Linux and Unix Security – Portable Reference” by Nitesh Dhanjani; McGraw-Hill/Osborne 2004; ISBN 0-07-222786-9.
Recommended. |
|
“HackNotes(tm) Network Security Portable Reference” by Michael Horton, Clinton Mugge; McGraw-Hill/Osborne 2004; ISBN 0-07-222783-4.
Recommended: Most delicious little book of how-to’s for network and host security assessment. I wish I can get the plain text of that book and annotate it with all the notes and new tools that appeared since publication. |
|
“Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast” by Paco Hope, Ben Walther Amazon – http://www.amazon.com/gp/product/0596514832/ Book has several chapters on interesting tools, but overall it is not going into sufficient depth in any of its subjects. |
|
“Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition” by Stuart McClure, Joel Scambray, George Kurtz Amazon – http://www.amazon.com/gp/product/0071613749/ |
|
“The Best of 2600, Collector’s Edition: A Hacker Odyssey” by Emmanuel Goldstein Amazon – http://www.amazon.com/gp/product/0470458534/ref=cm_li_v_cr_self?tag=linkedin-20 Comment: Being reader of the magazine for last couple of years, I have come to expect more specific information from this compilation. Impressive in volume, book is very informative on the history and the problem solving (aka “hacking”) mindset. However, I have found hard to read majority of included articles – they impressed me as a mixture of Gibson’s cyber-punk and of puerile boasting. I do not recommend this book. |
|
“Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning” by Gordon Fyodor Lyon Amazon – http://www.amazon.com/gp/product/0979958717/ |
There exist many other collections/lists of books in this domain. Some are:
Similar at this blog: Book: Enterprise Security For the Executive – https://eikonal.wordpress.com/2010/01/07/book-enterprise-security-for-the-executive/ | Infosec pages at this blog – https://eikonal.wordpress.com/2011/05/17/information-security-sites/ | Infosec online (= infosec sites) – https://eikonal.wordpress.com/2010/02/01/infosec-online/
“Alternate Realities: Mathematical Models of Nature and Man” by John L. Casti
Recently I have re-read this book 15 years after the first reading. It covers various topics from definition of complexity (as a measure of surprise/difference between the anticipated and real outputs of the system), building mathematical model generating predetermined series of outputs, introduction to theory of catastrophes, cellular automata, etc.
“Linear Structures” (Charles Griffin Series-Griffin’s Statistical Monographs, No 42) by Jan R. Magnus
Impressive book on the generalized matrix inverses and so called L(linear) structures. I wish I had access to this book much earlier, it sheds the light on various questions/problems I have been working through last 20+ years. It is an absolutely recommendable book.
Lauren Weinstein at [NNSquad] has a short posting (http://www.nnsquad.org/archives/nnsquad/msg03513.html) on an American socialist publisher from the first half of 20th century, Emanuel Haldeman-Julius. Interesting links contained in it:
Related at this blog: Physics sites – https://eikonal.wordpress.com/2010/02/12/physics-sites/ | Books online – https://eikonal.wordpress.com/2010/01/04/books-online/ | Mathematics sites (go to Books section)- https://eikonal.wordpress.com/2010/03/17/mathematics-sites/ | Expand your mind – https://eikonal.wordpress.com/2010/01/04/expand-your-mind/
Archives at large:
Local libraries:
The New Republic (tnr.com) has an article “Toward a New Alexandria” by Lisbet Rausing (2010.03.12) – http://www.tnr.com/print/article/books-and-arts/toward-new-alexandria.
Health:
IT:
Finances:
Music:
VARIOUS:
Related here: Mathematics sites (go to Books section)- https://eikonal.wordpress.com/2010/03/17/mathematics-sites/ | Physics books online – https://eikonal.wordpress.com/2010/03/28/physics-books-online/ | Infosec books – https://eikonal.wordpress.com/2010/10/19/infosec-books/ | Toward a New Alexandria Library – https://eikonal.wordpress.com/2010/03/13/toward-a-new-alexandria/ | Martial Arts magazines and other sources (see Books) – https://eikonal.wordpress.com/2010/02/05/martial-arts-magazines-and-other-sources/ | Philosophy books – https://eikonal.wordpress.com/2011/03/09/philosophy/ | Emanuel Haldeman-Julius – https://eikonal.wordpress.com/2010/05/04/emanuel-haldeman-julius/ | Download sites – https://eikonal.wordpress.com/2010/01/23/download-sites/