List Headline Image
Updated by Bob Gourley on Feb 23, 2017
 REPORT
Bob Gourley Bob Gourley
Owner
7 items   1 followers   5 votes   20 views

Privacy and Online Security: Books that can help you reduce your digital risk

Experienced professionals are quick to tell you there is no such thing as 100% security. There are just too many vulnerabilities and the bad guys are just too creative to ever assume that. But we can all take steps to reduce our risk. The books we highlight here are our current favorites.

The Cyber Threat Paperback – September 23, 2014

What do business leaders need to know about the cyber threat to their operations? Author Bob Gourley, the Director of Intelligence in the first Department of Defense cyber defense organization and lead for cyber intelligence at Cognitio Corp shares lessons from direct contact with adversaries in cyberspace in a new book titled “The Cyber Threat” (newly updated for 2016)

Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. Reading this book will teach you things your adversaries wish you did not know and in doing so will enhance your ability to defend against cyber attack. The book explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information actionable in support of your business objectives.

Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies Paperback – April 6, 2016

Just how secure is your computer right now? My guess is that you probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work or what the real threats are.

Hacking: Basic Security, Penetration Testing and How to Hack Paperback – May 21, 2015

Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking.

Cybersecurity and Cyberwar: What Everyone Needs to Know® 1st Edition

A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It First Edition Edition

It won't surprise many people to read that computers, networks, and personal information are under constant attack. Most of us install a commonly available anti-virus program, mind our clicks, and hope for the best. More than that seems like work, and stories of data theft have become so ubiquitous that a certain amount of desensitization is probably inevitable. Well, Goodman's book should take care of that. When your C.V. includes titles like "futurist-in-residence with the FBI," you've seen who's creeping through those internet pipes, and it's harrowing; his litany of cyber criminals and their multitudinous misdeeds are often shocking in their inventiveness and audacity, and Goodman brings the nightmares one after another at an almost breathless pace. But not all is hopeless--Goodman aims to educate, offering from high-level policy to practical layman's advice for buttoning down your own data. Despite the scare factor, it's a fun, fast, and fascinating 400 pages.

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big ...

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.

Complete Guide to Internet Privacy, Anonymity & Security Paperback – January 10, 2015

In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to:

  • stop search engines, social media and other powerful Internet players from tracking and profiling your online activities
  • gain unrestricted access to all the content and downloads the Internet has to offer
  • use social media to stay connected with friends in ways that don’t compromise your privacy or safety
  • keep hackers, identity thieves and adversaries from gaining access to your computer
  • use the best (and often free!) privacy, anonymity and security apps that really work
  • mask your IP address with a proxy, The Onion Router (Tor) or a virtual private network (VPN)
  • use encryption to keep your digital items, downloads and personal information completely hidden and safe
  • prevent surveillance and the monitoring of your activities by Internet service providers (ISP), governments, adversaries and other unwelcome snoops
  • enjoy all the benefits (and downloads) of torrent file-sharing and Usenet newsgroups while staying protected and anonymous
  • get rid of trace and hidden data on your computer that exposes your private activities
  • conduct checks on how private your online activities and devices really are