Product Details
Excerpt – Front Cover: “… 7171J AIMIIMI of an ECONOMIC HIT MAN “Here are the real-life details …” See a random page in this book.

 

2.
Excerpt – Front Matter: “… disturbing detour from the mainstream will want to pick up Hit Man …” See a random page in this book.

 

3.

 

 
 
 
4.
Formats   Price   New Used Collectible
Paperback Order in the next 16 hours to get it by Monday, Jan 30.

Only 3 left in stock – order soon.
$16.95 $11.53   $9.37 $1.31 $20.00
Kindle Edition Auto-delivered wirelessly   $12.99        
Other Formats: Hardcover, Unknown Binding
Excerpt – Front Matter: “… HIT MEN “The most revealing look yet at the ‘characters’ who run the …” See a random page in this book.
5.
Formats   Price   New Used
Kindle Edition Auto-delivered wirelessly  
 (read for free)
to buy
7.
Formats   Price   New Used
Paperback In Stock $16.99 $11.55   $10.64 $11.47
Excerpt – Front Cover: “… Hit Men …” See a random page in this book.
9.
Excerpt – Front Matter: “… idea for Always Hit on the Wingman … deal with men who are like I …” See a random page in this book.
10.
Excerpt – Page 186: “… target because of evidence that he was Gottis hit man of choice. …” See a random page in this book.
12.
Hit Men by Chris Bartholomew (Dec 28, 2010)
Formats   Price   New Used
Paperback In Stock   $15.49   $15.49 $17.62

future releases in Computer Security & Encryption. (Learn more)

 
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
1.
5.0 out of 5 stars   (3)
Release Date: January 18, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
2.
Publication Date: February 21, 2012
Hardcover

List Price: $24.95

Price: $15.18

You Save: $9.77 (39%)

 
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
3.
Release Date: February 21, 2012
Kindle Edition
Available for Pre-order

Kindle Price: $9.99

 
 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
4.
Jonathan Zdziarski
Release Date: January 17, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
5.
Publication Date: February 23, 2012
Paperback

List Price: $59.95

Price: $34.83

You Save: $25.12 (42%)

 
Frank M. Ahearn The Digital Hit Man and His Weapons for Combating the Digital World
6.
5.0 out of 5 stars   (1)
Release Date: January 21, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $9.99

 
CompTIA Security+ SY0-301 Authorized Cert Guide (2nd Edition) (Cert Guides)
7.
5.0 out of 5 stars   (2)
Publication Date: January 7, 2012
Hardcover

List Price: $59.99

Price: $36.59

You Save: $23.40 (39%)

23 used & new from $19.95

 
Inside Cyber Warfare: Mapping the Cyber Underworld
8.
3.7 out of 5 stars   (3)
Publication Date: December 28, 2011
Paperback

List Price: $39.99

Price: $24.34

You Save: $15.65 (39%)

38 used & new from $16.57

 
CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-001 (Comptia Study Guide)
9.
by Michael Gregg, Billy Haines
Publication Date: March 6, 2012
Paperback

List Price: $59.99

Price: $35.39

You Save: $24.60 (41%)

 
2600 Magazine: The Hacker Quarterly - Mac/PC - Winter 2011-2012
10.
2600 Magazine
Release Date: January 2, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $5.99

 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
11.
by Jonathan Zdziarski
Publication Date: January 25, 2012
Paperback

List Price: $39.99

Price: $29.99

You Save: $10.00 (25%)

2 used & new from $29.99

 
Recruit 70 Best Antivirus Programs to Check Suspicious Files For FREE (Web Freebie)
12.
Lev Well
Release Date: January 13, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $0.99

 
Corporate Computer Security (3rd Edition)
13.
by Randy J Boyle, Raymond Panko
Publication Date: January 21, 2012
Hardcover

List Price: $132.00

Price: $128.70

You Save: $3.30 (3%)

3 new from $127.99

 
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
14.
by Cameron H. Malin, Eoghan Casey BS MA, James M. Aquilina
Publication Date: March 15, 2012
Paperback

List Price: $59.95

Price: $48.19

You Save: $11.76 (20%)

 
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)
15.
Publication Date: January 7, 2012
Hardcover

List Price: $79.99

Price: $48.46

You Save: $31.53 (39%)

29 used & new from $29.95

 
How to Spot Scams Online
16.
Release Date: December 31, 2011
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $5.99

 
Low Tech Hacking: Street Smarts for Security Professionals
17.
by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
3.0 out of 5 stars   (2)
Publication Date: January 2, 2012
Paperback

List Price: $49.95

Price: $30.40

You Save: $19.55 (39%)

14 used & new from $26.39

 
Mastering Microsoft Forefront UAG 2010 Customization
18.
by Erez Ben-Ari, Rainier Amara
Publication Date: March 29, 2012
Paperback

Price: $39.99

 
Computer Security: Principles and Practice (Stallings)
19.
Lawrie Brown William Stallings
Release Date: January 15, 2012
Kindle Edition
Auto-delivered wirelessly

Kindle Price: $78.10

 
Official Certified Ethical Hacker Review Guide: For Version 7.1
20.
by Steven DeFino, Larry Greenblatt
Publication Date: February 15, 2012
Paperback

List Price: $32.95

Price: $29.77

You Save: $3.18 (10%)

Frank M. Ahearn The Digital Hit Man

Frank M. Ahearn The Digital Hit Man

In all my years in business I have become extremely skilled at four unique talents. I can hunt down and find most people anywhere. I have the ability to extract sensitive information over the phone via pretext. I can also “disappear” people in need. These parts of my business are behind me, but the one thing they all have in common is the use of deception which is my fourth and greatest skill.

In my world you will never find the heavy sell or some bullshit about the use of innovative software designed by scientists, mathematicians and technologists. I leave that lie for the snake oil salesmen pimping tonic water as a remedy. The reality is I lie to deal with a client’s information but I never lie to a potential client or a client, or ever make promises I cannot deliver. There have been plenty of times I have walked away from big pay-days because the request was not doable.

I have always had the attitude that this is what I do and this is what it costs, take it or leave it. I am not a salesman—I am a master of deception. In the digital world there are dozens of articles floating around about me and my crazy life. The articles share tales of misdeeds, misfortunes, audits and alcohol, but none have ever had a complaint about my services. I have been described as a long-haired-hippy, biker and street-kind-of-guy and most recently as the kind of guy you meet in a corner bar. In the great words of Popeye, “I am what I am.” Because of that I am better at hiding, deleting, manipulating and creating digital distortion than any scientist, mathematician, technologist or Ph.D. So ask yourself, when you’re at war, who do you want fighting for you, a gunslinger or a word-slinger?

I do not have a sales pitch or a factory of employees working for me. But if you are going to place your trust, you should place it with one professional, not a company of two-hundred where your information is vulnerable and easily accessible to each and every one of these employees.

What I do is create digital deception which solves digital problems. Unfortunately not everyone can afford an expert to assist them with their needs. So I figured I would explain what I do just like I did in How to Disappear for those who need to take matters into their own hands.

How to Disappear is the authoritative and comprehensive guide for people who seek to protect their privacy as well as for anyone who’s ever entertained the fantasy of disappearing—whether actually dropping out of sight or by eliminating the traceable evidence of their existence.

How to be Invisible

How to be Invisible

From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle and real estate ownership, your bank accounts, your business dealings, your computer files, your home address, and more.

J.J. Luna, a highly trained and experienced security consultant, shows you how to achieve the privacy you crave and deserve, whether you just want to shield yourself from casual scrutiny or take your life savings with you and disappearing without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.

There is a prevailing sense in our society that true privacy is a thing of the past. Filled with vivid real life stories drawn from the headlines and from Luna’s own consulting experience, How to Be Invisible, Revised Edition is a critical antidote to the privacy concerns that continue only to grow in magnitude as new and more efficient ways of undermining our personal security are made available. Privacy is a commonly-lamented casualty of the Information Age and of the world’s changing climate-but that doesn’t mean you have to stand for it.

“If you’ve got nothing to hide,” many people say, “you shouldn’t worry about government surveillance.” Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can’t we have both? 

Nothing to Hide

Nothing to Hide

In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn’t fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. (20110215)