Product Details
Excerpt – Front Cover: “… 7171J AIMIIMI of an ECONOMIC HIT MAN “Here are the real-life details …” See a random page in this book.

 

2.
Excerpt – Front Matter: “… disturbing detour from the mainstream will want to pick up Hit Man …” See a random page in this book.

 

3.

 

 
 
 
4.
Formats   Price   New Used Collectible
Paperback Order in the next 16 hours to get it by Monday, Jan 30.

Only 3 left in stock – order soon.
$16.95 $11.53   $9.37 $1.31 $20.00
Kindle Edition Auto-delivered wirelessly   $12.99        
Other Formats: Hardcover, Unknown Binding
Excerpt – Front Matter: “… HIT MEN “The most revealing look yet at the ‘characters’ who run the …” See a random page in this book.
5.
Formats   Price   New Used
Kindle Edition Auto-delivered wirelessly  
 (read for free)
to buy
7.
Formats   Price   New Used
Paperback In Stock $16.99 $11.55   $10.64 $11.47
Excerpt – Front Cover: “… Hit Men …” See a random page in this book.
9.
Excerpt – Front Matter: “… idea for Always Hit on the Wingman … deal with men who are like I …” See a random page in this book.
10.
Excerpt – Page 186: “… target because of evidence that he was Gottis hit man of choice. …” See a random page in this book.
12.
Hit Men by Chris Bartholomew (Dec 28, 2010)
Formats   Price   New Used
Paperback In Stock   $15.49   $15.49 $17.62

future releases in Computer Security & Encryption. (Learn more)

 
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
1.
5.0 out of 5 stars   (3)
Release Date: January 18, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
2.
Publication Date: February 21, 2012
Hardcover

List Price: $24.95

Price: $15.18

You Save: $9.77 (39%)

 
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
3.
Release Date: February 21, 2012
Kindle Edition
Available for Pre-order

Kindle Price: $9.99

 
 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
4.
Jonathan Zdziarski
Release Date: January 17, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
5.
Publication Date: February 23, 2012
Paperback

List Price: $59.95

Price: $34.83

You Save: $25.12 (42%)

 
Frank M. Ahearn The Digital Hit Man and His Weapons for Combating the Digital World
6.
5.0 out of 5 stars   (1)
Release Date: January 21, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
CompTIA Security+ SY0-301 Authorized Cert Guide (2nd Edition) (Cert Guides)
7.
5.0 out of 5 stars   (2)
Publication Date: January 7, 2012
Hardcover

List Price: $59.99

Price: $36.59

You Save: $23.40 (39%)

23 used & new from $19.95

 
Inside Cyber Warfare: Mapping the Cyber Underworld
8.
3.7 out of 5 stars   (3)
Publication Date: December 28, 2011
Paperback

List Price: $39.99

Price: $24.34

You Save: $15.65 (39%)

38 used & new from $16.57

 
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001 (Comptia Study Guide)
9.
by Michael Gregg, Billy Haines
Publication Date: March 6, 2012
Paperback

List Price: $59.99

Price: $35.39

You Save: $24.60 (41%)

 
2600 Magazine: The Hacker Quarterly - Mac/PC - Winter 2011-2012
10.
2600 Magazine
Release Date: January 2, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $5.99

 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
11.
by Jonathan Zdziarski
Publication Date: January 25, 2012
Paperback

List Price: $39.99

Price: $29.99

You Save: $10.00 (25%)

2 used & new from $29.99

 
Recruit 70 Best Antivirus Programs to Check Suspicious Files For FREE (Web Freebie)
12.
Lev Well
Release Date: January 13, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $0.99

 
Corporate Computer Security (3rd Edition)
13.
by Randy J Boyle, Raymond Panko
Publication Date: January 21, 2012
Hardcover

List Price: $132.00

Price: $128.70

You Save: $3.30 (3%)

3 new from $127.99

 
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
14.
by Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina
Publication Date: March 15, 2012
Paperback

List Price: $59.95

Price: $48.19

You Save: $11.76 (20%)

 
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)
15.
Publication Date: January 7, 2012
Hardcover

List Price: $79.99

Price: $48.46

You Save: $31.53 (39%)

29 used & new from $29.95

 
How to Spot Scams Online
16.
Release Date: December 31, 2011
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $5.99

 
Low Tech Hacking: Street Smarts for Security Professionals
17.
by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
3.0 out of 5 stars   (2)
Publication Date: January 2, 2012
Paperback

List Price: $49.95

Price: $30.40

You Save: $19.55 (39%)

14 used & new from $26.39

 
Mastering Microsoft Forefront UAG 2010 Customization
18.
by Erez Ben-Ari, Rainier Amara
Publication Date: March 29, 2012
Paperback

Price: $39.99

 
Computer Security: Principles and Practice (Stallings)
19.
Lawrie Brown William Stallings
Release Date: January 15, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $78.10

 
Official Certified Ethical Hacker Review Guide: For Version 7.1
20.
by Steven DeFino, Larry Greenblatt
Publication Date: February 15, 2012
Paperback

List Price: $32.95

Price: $29.77

You Save: $3.18 (10%)

American Privacy: The 400-Year History of Our Most Contested Right
American Privacy: The 400-Year History of Our Most Contested Right
An examination of privacy and the evolution of communication, from broken sealing wax to high-tech wiretapping

A sweeping story of the right to privacy as it sped along colonial postal routes, telegraph wires, and even today’s fiber-optic cables, American Privacy traces the lineage of cultural norms and legal mandates that have swirled around the Fourth Amendment since its adoption. Legally, technologically, and historically grounded, Frederick Lane’s book presents a vivid and penetrating exploration that, in the words of people’s historian Howard Zinn, “challenges us to defend our most basic rights.” 

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business.

By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn’t want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach.

Protect your net worth and bottom line using the 7 Mindsets of a Spy

  • AccumulateLayers of Privacy
  • Eliminatethe Source
  • DestroyData Risk
  • LockYour Assets
  • Evaluatethe Offer
  • Interrogatethe Enemy
  • Monitor the Signs

In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what’s most important and most at risk-your essential business and personal data.

The Right to Privacy

January 25, 2012

The Right to Privacy

The Right to Privacy

Can the police strip-search a woman who has been arrested for a minor traffic violation? Can a magazine publish an embarrassing photo of you without your permission? Does your boss have the right to read your email? Can a company monitor its employees’ off-the-job lifestyles–and fire those who drink, smoke, or live with a partner of the same sex? Although the word privacy does not appear in the Constitution, most of us believe that we have an inalienable right to be left alone. Yet in arenas that range from the battlefield of abortion to the information highway, privacy is under siege. In this eye-opening and sometimes hair-raising book, Alderman and Kennedy survey hundreds of recent cases in which ordinary citizens have come up against the intrusions of government, businesses, the news media, and their own neighbors. At once shocking and instructive, up-to-date and rich in historical perspective, The Right to Private is an invaluable guide to one of the most charged issues of our time.

Related articles

Frank M. Ahearn The Digital Hit Man

Frank M. Ahearn The Digital Hit Man

In all my years in business I have become extremely skilled at four unique talents. I can hunt down and find most people anywhere. I have the ability to extract sensitive information over the phone via pretext. I can also “disappear” people in need. These parts of my business are behind me, but the one thing they all have in common is the use of deception which is my fourth and greatest skill.

In my world you will never find the heavy sell or some bullshit about the use of innovative software designed by scientists, mathematicians and technologists. I leave that lie for the snake oil salesmen pimping tonic water as a remedy. The reality is I lie to deal with a client’s information but I never lie to a potential client or a client, or ever make promises I cannot deliver. There have been plenty of times I have walked away from big pay-days because the request was not doable.

I have always had the attitude that this is what I do and this is what it costs, take it or leave it. I am not a salesman—I am a master of deception. In the digital world there are dozens of articles floating around about me and my crazy life. The articles share tales of misdeeds, misfortunes, audits and alcohol, but none have ever had a complaint about my services. I have been described as a long-haired-hippy, biker and street-kind-of-guy and most recently as the kind of guy you meet in a corner bar. In the great words of Popeye, “I am what I am.” Because of that I am better at hiding, deleting, manipulating and creating digital distortion than any scientist, mathematician, technologist or Ph.D. So ask yourself, when you’re at war, who do you want fighting for you, a gunslinger or a word-slinger?

I do not have a sales pitch or a factory of employees working for me. But if you are going to place your trust, you should place it with one professional, not a company of two-hundred where your information is vulnerable and easily accessible to each and every one of these employees.

What I do is create digital deception which solves digital problems. Unfortunately not everyone can afford an expert to assist them with their needs. So I figured I would explain what I do just like I did in How to Disappear for those who need to take matters into their own hands.

How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

Privacy, Information, and Technology

Privacy, Information, and Technology

A comprehensive and in-depth treatment of all the important information privacy issues.Features:

  • An extensive and clear background about the law and policy issues relating to information privacyand computers, databases, and the Internet
  • Coverage of government surveillance topics, such as Fourth Amendment, sensory enhancement technologies, wiretapping, computer searches, ISP records, the Electronic Communications Privacy Act, the Foreign Intelligence Surveillance Act, and the USA-Patriot Act
  • A thorough examination of new issues such as privacy and access to public records, government access to personal information,airline passenger screening and profiling, data mining, identity theft, consumer privacy, and financial privacy
  • Several additional and new cases for coverage of the Fair Credit Reporting Act, the Privacy Act, and identity theft.
  • Coverage of emerging information technologiessuch as computer databases, RFID, cookies, spyware, data mining, and others
  • An introductory chapter with a thought-provoking philosophical discussion of information privacy
  • Clear explanations of the law

New to the Third Edition:

  • Expanded coverage of new technology that has an impact on privacy,including social media, locational information and mobile telephony, and behavioral advertising
  • Anonymous litigation
  • Expanded coverage of privacy and contract issues
  • Updated coverage of the NSA surveillance program cases, including Amnesty International USA v.Clapper
  • New FTC cases, including Sears, Econometrixand Google Buzz
  • NASA v. Nelson, a U.S. Supreme Court case regarding background questionnaires for employment and the constitutional right to information privacy
  • Coverage of personally identifiable information
  • Law enforcement access to GPS cases
How to be Invisible

How to be Invisible

From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle and real estate ownership, your bank accounts, your business dealings, your computer files, your home address, and more.

J.J. Luna, a highly trained and experienced security consultant, shows you how to achieve the privacy you crave and deserve, whether you just want to shield yourself from casual scrutiny or take your life savings with you and disappearing without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.

There is a prevailing sense in our society that true privacy is a thing of the past. Filled with vivid real life stories drawn from the headlines and from Luna’s own consulting experience, How to Be Invisible, Revised Edition is a critical antidote to the privacy concerns that continue only to grow in magnitude as new and more efficient ways of undermining our personal security are made available. Privacy is a commonly-lamented casualty of the Information Age and of the world’s changing climate-but that doesn’t mean you have to stand for it.

“If you’ve got nothing to hide,” many people say, “you shouldn’t worry about government surveillance.” Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can’t we have both? 

Nothing to Hide

Nothing to Hide

In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn’t fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. (20110215)

Understanding Privacy

January 25, 2012

Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible.

Understanding Privacy

Understanding Privacy

In the Amzon bestseller – This concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses historical changes in views on privacy. Drawing on a broad array of interdisciplinary sources, Solove sets forth a framework for understanding privacy that provides clear, practical guidance for engaging with relevant issues. Understanding Privacy will be an essential introduction to long-standing debates and an invaluable resource for crafting laws and policies about surveillance, data mining, identity theft, state involvement in reproductive and marital decisions, and other pressing contemporary matters concerning privacy.