
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer security &#8211; The Bell Bookshop</title>
	<atom:link href="https://www.bellbookshop.co.uk/product-tag/computer-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.bellbookshop.co.uk</link>
	<description>Henley-on-Thames</description>
	<lastBuildDate>Sat, 14 Sep 2024 18:27:03 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.bellbookshop.co.uk/wp-content/uploads/2020/08/cropped-Bell-Background-Blue-32x32.png</url>
	<title>Computer security &#8211; The Bell Bookshop</title>
	<link>https://www.bellbookshop.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fancy bear goes phishing</title>
		<link>https://www.bellbookshop.co.uk/product/fancy-bear-goes-phishing-2/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 02 May 2024 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=40091</guid>

					<description><![CDATA[With lucidity and wit, Scott Shapiro establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others. In telling their stories, he exposes the hackers' tool kits and gives fresh answers to vital questions - why is the internet so vulnerable, and what can we do in response?]]></description>
										<content:encoded><![CDATA[<p><b>Hacking, espionage, war and cybercrime as you&#8217;ve never read about them before</b></p>
<p><i>Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.</i></p>
<p><i>Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released &#8220;the Great Worm&#8221; and became the first person to crash the internet.</i></p>
<p><i>Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.</i></p>
<p>Why is the internet so insecure? How do hackers exploit its vulnerabilities? <i>Fancy Bear Goes Phishing </i>tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton&#8217;s cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro&#8217;s five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.</p>
<p>Yet as Shapiro shows, hackers do not just abuse computer code &#8211; they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, <i>Fancy Bear Goes Phishing </i>exposes the secrets of the digital age.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The people hacker</title>
		<link>https://www.bellbookshop.co.uk/product/the-people-hacker/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=37897</guid>

					<description><![CDATA[A compelling insight into the world of the people hackers - those who are paid to find out the secrets we want to keep hidden.]]></description>
										<content:encoded><![CDATA[<p><b>&#8216;This is a rip-roaring read, full of derring-do and sometimes comic, often foolhardy bravery. [Jenny] sounds an absolute hoot, and her book is never anything less&#8217; -  <i>Daily Mail</i></p>
<p> &#8216;A fascinating and quirky take on how easily we can be hoodwinked and hacked. Next time you hear anyone complain about the cost of cyber-protection, hand them a copy of  People Hacker.  It could save them a fortune&#8217; -  <i>The Times</i></p>
<p> &#8212;&#8212;-</b></p>
<p><b>&#8216;From an early age, locked doors, high fences and the secrets kept by businesses, buildings and people, fascinated me. I wanted to find out what they wanted to hide away.&#8217;</b></p>
<p> A  burglar for hire, con-artist and expert in deception and physical infiltration &#8211; Jenny Radcliffe is a professional people hacker. After being schooled in the art of breaking and entering by her family, she became an expert social engineer, doing an insider&#8217;s job to exploit the flaws and weaknesses in top-grade security operations.</p>
<p> In <i>People Hacker</i>, Jenny reveals how she uses her inimitable blend of psychology, stagecraft and charm to gain access to top-grade private and commercial properties. From the back streets of Liverpool to the City of London&#8217;s Square Mile, across rooftops, cellars and staircases in Europe to the mansions of gangsters in the Far East, Jenny has risked it all to earn the title &#8216;People Hacker&#8217;.</p>
<p> This is Jenny insider&#8217;s account of how her working-class upbringing, northern sense of humour and femininity in a male-dominated industry all helped her to become one of the most sought-after social engineers in the world. Told in her trademark colourful style, and packed full of stories of the crazy and dangerous situations she has found herself in along the way, Jenny shines a light on the security mistakes we all make &#8211; and how to avoid them.   </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fancy bear goes phishing</title>
		<link>https://www.bellbookshop.co.uk/product/fancy-bear-goes-phishing/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Tue, 23 May 2023 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=31284</guid>

					<description><![CDATA[With lucidity and wit, Scott Shapiro establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others. In telling their stories, he exposes the hackers' tool kits and gives fresh answers to vital questions - why is the internet so vulnerable, and what can we do in response?]]></description>
										<content:encoded><![CDATA[<p><b>Hacking, espionage, war and cybercrime as you&#8217;ve never read about them before</b></p>
<p><i>Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.</i></p>
<p><i>Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released &#8220;the Great Worm&#8221; and became the first person to crash the internet.</i></p>
<p><i>Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.</i></p>
<p>Why is the internet so insecure? How do hackers exploit its vulnerabilities? <i>Fancy Bear Goes Phishing </i>tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton&#8217;s cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro&#8217;s five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.</p>
<p>Yet as Shapiro shows, hackers do not just abuse computer code &#8211; they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, <i>Fancy Bear Goes Phishing </i>exposes the secrets of the digital age.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>This Is How They Tell Me the World Ends</title>
		<link>https://www.bellbookshop.co.uk/product/this-is-how-they-tell-me-the-world-ends-2/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 23 Jun 2022 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=23647</guid>

					<description><![CDATA[Zero day: a software bug that allows a hacker to break in and scamper through the world's computer networks invisibly until discovered. One of the most coveted tools in a spy's arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation - just ask the Ukraine. Zero days are the blood diamonds of the security trade, pursued by nation states, defense contractors, cybercriminals, and security defenders alike. In this market, governments aren't regulators; they are clients - paying huge sums to hackers willing to turn over gaps in the Internet, and stay silent about them. This book is cybersecurity reporter Nicole Perlroth's discovery, unpacked. An intrepid journalist unravels an opaque, code-driven market from the outside in - encountering spies, hackers, arms dealers, mercenaries and a few unsung heroes along the way.]]></description>
										<content:encoded><![CDATA[<p><b><u>WINNER OF THE FT &#038; McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021</u></b><b>The instant <i>New York Times </i>bestseller</b><b>A <i>Financial Times </i>and <i>The Times </i>Book of the Year</b><b>&#8216;A terrifying exposé&#8217; <i>The Times</i>&#8216;Part John le Carré . . . Spellbinding&#8217; <i>New Yorker</i></b>We plug in anything we can to the internet. We can control our entire lives, economy and grid via a remote web control. But over the past decade, as this transformation took place, we never paused to think that we were also creating the world&#8217;s largest attack surface. And that the same nation that maintains the greatest cyber advantage on earth could also be among its most vulnerable.Filled with spies, hackers, arms dealers and a few unsung heroes, <i>This Is How They Tell Me the World Ends </i>is an astonishing and gripping feat of journalism. Drawing on years of reporting and hundreds of interviews, Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>This Is How They Tell Me the World Ends</title>
		<link>https://www.bellbookshop.co.uk/product/this-is-how-they-tell-me-the-world-ends/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 18 Feb 2021 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/product/this-is-how-they-tell-me-the-world-ends/</guid>

					<description><![CDATA[Zero day: a software bug that allows a hacker to break in and scamper through the world's computer networks invisibly until discovered. One of the most coveted tools in a spy's arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation - just ask the Ukraine. Zero days are the blood diamonds of the security trade, pursued by nation states, defense contractors, cybercriminals, and security defenders alike. In this market, governments aren't regulators; they are clients - paying huge sums to hackers willing to turn over gaps in the Internet, and stay silent about them. This book is cybersecurity reporter Nicole Perlroth's discovery, unpacked. A intrepid journalist unravels an opaque, code-driven market from the outside in - encountering spies, hackers, arms dealers, mercenaries and a few unsung heroes along the way.]]></description>
										<content:encoded><![CDATA[<p><b>THE INSTANT <i>NEW YORK TIMES </i>BESTSELLER</b><b>WINNER OF THE FT &#038; McKINSEY BUSINESS BOOK OF THE YEAR AWARD 2021</b><b>&#8216;An intricately detailed, deeply sourced and reported history of the origins and growth of the cyberweapons market . . . Hot, propulsive . . . Sets out from the start to scare us out of our complacency&#8217; <i>New York Times</i></b><b>&#8216;A terrifying exposé&#8217; <i>The Times</i></b> <b>&#8216;Part John le Carré and more parts Michael Crichton . . . Spellbinding&#8217; <i>New Yorker</i></b>Zero day: a software bug that allows a hacker to break in and scamper through the world&#8217;s computer networks invisibly until discovered. One of the most coveted tools in a spy&#8217;s arsenal, a zero day has the power to tap into any iPhone, dismantle safety controls at a chemical plant and shut down the power in an entire nation &#8211; just ask the Ukraine.Zero days are the blood diamonds of the security trade, pursued by nation states, defense contractors, cybercriminals, and security defenders alike. In this market, governments aren&#8217;t regulators; they are clients &#8211; paying huge sums to hackers willing to turn over gaps in the Internet, and stay silent about them. <i>This Is How They Tell Me the World End</i>s is cybersecurity reporter Nicole Perlroth&#8217;s discovery, unpacked. A intrepid journalist unravels an opaque, code-driven market from the outside in &#8211; encountering spies, hackers, arms dealers, mercenaries and a few unsung heroes along the way. As the stakes get higher and higher in the rush to push the world&#8217;s critical infrastructure online, <i>This Is How They Tell Me the World Ends</i> is the urgent and alarming discovery of one of the world&#8217;s most extreme threats.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber warfare &#8211; truth, tactics, and strategies</title>
		<link>https://www.bellbookshop.co.uk/product/cyber-warfare-truth-tactics-and-strategies/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Tue, 25 Feb 2020 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/product/cyber-warfare-truth-tactics-and-strategies/</guid>

					<description><![CDATA[This volume takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools, and strategies presented for you to learn how to think about defending.]]></description>
										<content:encoded><![CDATA[<p><b>Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.</b></p>
<h4>Key Features</h4>
<ul>
<li>Define and determine a cyber-defence strategy based on current and past real-life examples</li>
<li>Understand how future technologies will impact cyber warfare campaigns and society</li>
<li>Future-ready yourself and your business against any cyber threat</li>
</ul>
<h4>Book Description</h4>
<p>The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare &#8211; Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media.</p>
<p>Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light.</p>
<p>The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario.</p>
<p>Cyber Warfare &#8211; Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data.</p>
<h4>What you will learn</h4>
<ul>
<li>Hacking at scale &#8211; how machine learning (ML) and artificial intelligence (AI) skew the battlefield</li>
<li>Defending a boundaryless enterprise</li>
<li>Using video and audio as weapons of influence</li>
<li>Uncovering DeepFakes and their associated attack vectors</li>
<li>Using voice augmentation for exploitation</li>
<li>Defending when there is no perimeter</li>
<li>Responding tactically to counter-campaign-based attacks</li>
</ul>
<h4>Who this book is for</h4>
<p>This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
