Athens Affair

Athens Affair
Author: Elle James
Publisher: Twisted Page Inc
Total Pages: 227
Release: 2024-04-23
Genre: Fiction
ISBN: 1626955514

Former Navy SEAL Ace “Hammer” Hammerson, on security detail in Jordan, corners a thief, who is vaguely familiar, absconding with portions of an ancient copper scroll. When the thief is attacked and the scroll is stolen, Ace is drawn into a dangerous quest to retrieve the priceless antiquity. Former Israeli Sayeret Matkal, Jasmine Nassar, is forced to steal an ancient copper scroll from a museum in Amman Jordan to save her son’s life. After she successful retrieves the scroll from the museum, she’s knocked out by two men. They take the scrolls, leaving her without the bargaining chip she needs to save her son. She has forty-eight hours to retrieve the scroll, or her son will be killed. When Ace finds the semi-conscious thief and learns of her dilemma, he joins her in a mad dash across the Mediterranean to Athens, following a trail of intrigue that leads to danger and rekindled love that wasn’t in his original Brotherhood Protectors mission statement.

The Cuckoo's Egg

The Cuckoo's Egg
Author: Cliff Stoll
Publisher: Simon and Schuster
Total Pages: 432
Release: 2024-07-02
Genre: Biography & Autobiography
ISBN: 1668048167

In this white-knuckled true story that is “as exciting as any action novel” (The New York Times Book Review), an astronomer-turned-cyber-detective begins a personal quest to expose a hidden network of spies that threatens national security and leads all the way to the KGB. When Cliff Stoll followed the trail of a 75-cent accounting error at his workplace, the Lawrence Berkeley National Laboratory, it led him to the presence of an unauthorized user on the system. Suddenly, Stoll found himself crossing paths with a hacker named “Hunter” who had managed to break into sensitive United States networks and steal vital information. Stoll made the dangerous decision to begin a one-man hunt of his own: spying on the spy. It was a high-stakes game of deception, broken codes, satellites, and missile bases, one that eventually gained the attention of the CIA. What started as simply observing soon became a game of cat and mouse that ultimately reached all the way to the KGB.

After the Greek Affair

After the Greek Affair
Author: Chantelle Shaw
Publisher: Harlequin
Total Pages: 190
Release: 2012-05-01
Genre: Fiction
ISBN: 1459227220

Billionaire tycoon Loukas Christakis has learned the hard way never to trust a woman. The only female he cares about is his soon-to-be-married little sister. And that's why he's reluctantly allowed struggling designer Belle Andersen to make the wedding dress on his private island—where he can keep an eye on her! Alone together as she works, innocent Belle becomes an unexpected temptation to the virile Loukas. But what should just have been a short paradise affair has consequences. And, as Belle is about to find out, Loukas will do whatever it takes to secure what he feels is rightfully his….

Routledge Companion to Intelligence Studies

Routledge Companion to Intelligence Studies
Author: Robert Dover
Publisher: Routledge
Total Pages: 536
Release: 2013-09-05
Genre: Political Science
ISBN: 1134480369

The Routledge Companion to Intelligence Studies provides a broad overview of the growing field of intelligence studies. The recent growth of interest in intelligence and security studies has led to an increased demand for popular depictions of intelligence and reference works to explain the architecture and underpinnings of intelligence activity. Divided into five comprehensive sections, this Companion provides a strong survey of the cutting-edge research in the field of intelligence studies: Part I: The evolution of intelligence studies; Part II: Abstract approaches to intelligence; Part III: Historical approaches to intelligence; Part IV: Systems of intelligence; Part V: Contemporary challenges. With a broad focus on the origins, practices and nature of intelligence, the book not only addresses classical issues, but also examines topics of recent interest in security studies. The overarching aim is to reveal the rich tapestry of intelligence studies in both a sophisticated and accessible way. This Companion will be essential reading for students of intelligence studies and strategic studies, and highly recommended for students of defence studies, foreign policy, Cold War studies, diplomacy and international relations in general.

The Cybersecurity Dilemma

The Cybersecurity Dilemma
Author: Ben Buchanan
Publisher: Oxford University Press
Total Pages: 300
Release: 2017-02-01
Genre: Political Science
ISBN: 0190694807

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Thinking Security

Thinking Security
Author: Steven M. Bellovin
Publisher: Addison-Wesley Professional
Total Pages: 468
Release: 2015-12-03
Genre: Computers
ISBN: 0134278232

If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk than ever, and even the world’s most security-focused organizations are being victimized by massive attacks. In Thinking Security, author Steven M. Bellovin provides a new way to think about security. As one of the world’s most respected security experts, Bellovin helps you gain new clarity about what you’re doing and why you’re doing it. He helps you understand security as a systems problem, including the role of the all-important human element, and shows you how to match your countermeasures to actual threats. You’ll learn how to move beyond last year’s checklists at a time when technology is changing so rapidly. You’ll also understand how to design security architectures that don’t just prevent attacks wherever possible, but also deal with the consequences of failures. And, within the context of your coherent architecture, you’ll learn how to decide when to invest in a new security product and when not to. Bellovin, co-author of the best-selling Firewalls and Internet Security, caught his first hackers in 1971. Drawing on his deep experience, he shares actionable, up-to-date guidance on issues ranging from SSO and federated authentication to BYOD, virtualization, and cloud security. Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively. Thinking Security will help you do just that.

Cybersecurity in Context

Cybersecurity in Context
Author: Chris Jay Hoofnagle
Publisher: John Wiley & Sons
Total Pages: 548
Release: 2024-10-08
Genre: Computers
ISBN: 1394262442

“A masterful guide to the interplay between cybersecurity and its societal, economic, and political impacts, equipping students with the critical thinking needed to navigate and influence security for our digital world.” —JOSIAH DYKSTRA, Trail of Bits “A comprehensive, multidisciplinary introduction to the technology and policy of cybersecurity. Start here if you are looking for an entry point to cyber.” —BRUCE SCHNEIER, author of A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend Them Back The first-ever introduction to the full range of cybersecurity challenges Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.

Jihadist Terror

Jihadist Terror
Author: Anthony Richards
Publisher: Bloomsbury Publishing
Total Pages: 361
Release: 2019-08-22
Genre: Political Science
ISBN: 1788315561

The past 18 months have seen a radical increase in incidents of jihadist terrorism within the United Kingdom – from the Manchester Arena attack, to the Houses of Parliament, to London Bridge. As a result, there are renewed calls for a high-level national conversation about the causes of, and the responses to, this particular terrorist problem. This book identifies policy and research gaps from an evidence-based perspective – it analyses what we know, what we don't know and what we need to know in relation to understanding and countering the jihadist terrorist threat. It provides readers with a synthesis of the knowledge and evidence that exists on each of the key topic areas, representing a distinctive and valuable resource for policymakers, academics and students. The contributors to the volume are leading international and national experts, from both the scholarly and policy-making communities, who are ideally placed to comment on the question of jihadist terrorism and the future of the threat in the UK.

Surveillance or Security?

Surveillance or Security?
Author: Susan Landau
Publisher: MIT Press
Total Pages: 400
Release: 2011-01-28
Genre: Law
ISBN: 0262294915

How, in the name of greater security, our current electronic surveillance policies are creating major security risks. Digital communications are the lifeblood of modern society. We “meet up” online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security?, the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks. How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.