Chain of Attack

Download Chain of Attack PDF Online Free

Author :
Publisher : Simon and Schuster
ISBN 13 : 0743419839
Total Pages : 334 pages
Book Rating : 4.7/5 (434 download)

DOWNLOAD NOW!


Book Synopsis Chain of Attack by : Gene DeWeese

Download or read book Chain of Attack written by Gene DeWeese and published by Simon and Schuster. This book was released on 2000-09-22 with total page 334 pages. Available in PDF, EPUB and Kindle. Book excerpt: While mapping a series of gravitational anomalies, the U.S.S. Enterprise™ is suddenly hurled millions of light-years through space, into a distant galxy of scorched and lifeless worlds...into the middle of an endless interstellar war. With no way back home, the crippled starship finds itself under relentless and suicidal attack by both warring fleets! And Captain Kirk must gamble the lives of his crew on his ability to stop a war that has raged for centuries -- and ravaged a galaxy...

Cybersecurity - Attack and Defense Strategies

Download Cybersecurity - Attack and Defense Strategies PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 178847385X
Total Pages : 368 pages
Book Rating : 4.7/5 (884 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity - Attack and Defense Strategies by : Yuri Diogenes

Download or read book Cybersecurity - Attack and Defense Strategies written by Yuri Diogenes and published by Packt Publishing Ltd. This book was released on 2018-01-30 with total page 368 pages. Available in PDF, EPUB and Kindle. Book excerpt: Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics Learn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategies A practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your system Book DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.What you will learn Learn the importance of having a solid foundation for your security posture Understand the attack strategy using cyber security kill chain Learn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Learn how to perform an incident investigation Get an in-depth understanding of the recovery process Understand continuous security monitoring and how to implement a vulnerability management strategy Learn how to perform log analysis to identify suspicious activities Who this book is for This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.

Chain of Attack

Download Chain of Attack PDF Online Free

Author :
Publisher :
ISBN 13 : 9780329174576
Total Pages : 251 pages
Book Rating : 4.1/5 (745 download)

DOWNLOAD NOW!


Book Synopsis Chain of Attack by : Gene DeWeese

Download or read book Chain of Attack written by Gene DeWeese and published by . This book was released on 1987 with total page 251 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Enterprise is suddenly hurled millions of light-years through space into the middle of an endless interstellar war. Under attack by both sides, Kirk attempts to stop the war.

Cybersecurity – Attack and Defense Strategies

Download Cybersecurity – Attack and Defense Strategies PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1803243953
Total Pages : 571 pages
Book Rating : 4.8/5 (32 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity – Attack and Defense Strategies by : Yuri Diogenes

Download or read book Cybersecurity – Attack and Defense Strategies written by Yuri Diogenes and published by Packt Publishing Ltd. This book was released on 2022-09-30 with total page 571 pages. Available in PDF, EPUB and Kindle. Book excerpt: Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest tools for ethical hacking, pentesting, and Red/Blue teamingIncludes recent real-world examples to illustrate the best practices to improve security postureBook Description Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. What you will learnLearn to mitigate, recover from, and prevent future cybersecurity eventsUnderstand security hygiene and value of prioritizing protection of your workloadsExplore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerationsAdopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategiesExplore legendary tools such as Nmap and Metasploit to supercharge your Red TeamDiscover identity security and how to perform policy enforcementIntegrate threat detection systems into your SIEM solutionsDiscover the MITRE ATT&CK Framework and open-source tools to gather intelligenceWho this book is for If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.

Privileged Attack Vectors

Download Privileged Attack Vectors PDF Online Free

Author :
Publisher : Apress
ISBN 13 : 1484259149
Total Pages : 403 pages
Book Rating : 4.4/5 (842 download)

DOWNLOAD NOW!


Book Synopsis Privileged Attack Vectors by : Morey J. Haber

Download or read book Privileged Attack Vectors written by Morey J. Haber and published by Apress. This book was released on 2020-06-13 with total page 403 pages. Available in PDF, EPUB and Kindle. Book excerpt: See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today’s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and monitoring strategies to mitigate privilege threats and risk Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journeyDevelop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems

The Witness for the Dead

Download The Witness for the Dead PDF Online Free

Author :
Publisher : Tor Books
ISBN 13 : 0765387441
Total Pages : 206 pages
Book Rating : 4.7/5 (653 download)

DOWNLOAD NOW!


Book Synopsis The Witness for the Dead by : Katherine Addison

Download or read book The Witness for the Dead written by Katherine Addison and published by Tor Books. This book was released on 2021-06-22 with total page 206 pages. Available in PDF, EPUB and Kindle. Book excerpt: "At once intimate and literally operatic, it's everything I love about Katherine Addison's writing, in ways I didn't know to expect. I loved it." —John Scalzi Katherine Addison returns to the glittering world she created for her beloved novel, The Goblin Emperor, with book one of the Cemeteries of Amalo trilogy Locus Award Finalist and Mythopoeic Award Finalist! When the young half-goblin emperor Maia sought to learn who had set the bombs that killed his father and half-brothers, he turned to an obscure resident of his father’s Court, a Prelate of Ulis and a Witness for the Dead. Thara Celehar found the truth, though it did him no good to discover it. He lost his place as a retainer of his cousin the former Empress, and made far too many enemies among the many factions vying for power in the new Court. The favor of the Emperor is a dangerous coin. Now Celehar lives in the city of Amalo, far from the Court though not exactly in exile. He has not escaped from politics, but his position gives him the ability to serve the common people of the city, which is his preference. He lives modestly, but his decency and fundamental honesty will not permit him to live quietly. As a Witness for the Dead, he can, sometimes, speak to the recently dead: see the last thing they saw, know the last thought they had, experience the last thing they felt. It is his duty use that ability to resolve disputes, to ascertain the intent of the dead, to find the killers of the murdered. Celehar’s skills now lead him out of the quiet and into a morass of treachery, murder, and injustice. No matter his own background with the imperial house, Celehar will stand with the commoners, and possibly find a light in the darkness. Katherine Addison has created a fantastic world for these books – wide and deep and true. Within THE CHRONICLES OF OSRETH The Goblin Emperor The Cemeteries of Amalo trilogy The Witness for the Dead The Grief of Stones The Tomb of Dragons At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.

Mastering Attack Surface Management

Download Mastering Attack Surface Management PDF Online Free

Author :
Publisher : Cybellium Ltd
ISBN 13 :
Total Pages : 187 pages
Book Rating : 4.8/5 (591 download)

DOWNLOAD NOW!


Book Synopsis Mastering Attack Surface Management by : Cybellium Ltd

Download or read book Mastering Attack Surface Management written by Cybellium Ltd and published by Cybellium Ltd. This book was released on 2023-09-06 with total page 187 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybellium Ltd is dedicated to empowering individuals and organizations with the knowledge and skills they need to navigate the ever-evolving computer science landscape securely and learn only the latest information available on any subject in the category of computer science including: - Information Technology (IT) - Cyber Security - Information Security - Big Data - Artificial Intelligence (AI) - Engineering - Robotics - Standards and compliance Our mission is to be at the forefront of computer science education, offering a wide and comprehensive range of resources, including books, courses, classes and training programs, tailored to meet the diverse needs of any subject in computer science. Visit https://www.cybellium.com for more books.

Implications of Artificial Intelligence for Cybersecurity

Download Implications of Artificial Intelligence for Cybersecurity PDF Online Free

Author :
Publisher : National Academies Press
ISBN 13 : 0309494508
Total Pages : 99 pages
Book Rating : 4.3/5 (94 download)

DOWNLOAD NOW!


Book Synopsis Implications of Artificial Intelligence for Cybersecurity by : National Academies of Sciences, Engineering, and Medicine

Download or read book Implications of Artificial Intelligence for Cybersecurity written by National Academies of Sciences, Engineering, and Medicine and published by National Academies Press. This book was released on 2020-01-27 with total page 99 pages. Available in PDF, EPUB and Kindle. Book excerpt: In recent years, interest and progress in the area of artificial intelligence (AI) and machine learning (ML) have boomed, with new applications vigorously pursued across many sectors. At the same time, the computing and communications technologies on which we have come to rely present serious security concerns: cyberattacks have escalated in number, frequency, and impact, drawing increased attention to the vulnerabilities of cyber systems and the need to increase their security. In the face of this changing landscape, there is significant concern and interest among policymakers, security practitioners, technologists, researchers, and the public about the potential implications of AI and ML for cybersecurity. The National Academies of Sciences, Engineering, and Medicine convened a workshop on March 12-13, 2019 to discuss and explore these concerns. This publication summarizes the presentations and discussions from the workshop.

Star Trek: Chain of Attack

Download Star Trek: Chain of Attack PDF Online Free

Author :
Publisher :
ISBN 13 : 9780812464719
Total Pages : pages
Book Rating : 4.4/5 (647 download)

DOWNLOAD NOW!


Book Synopsis Star Trek: Chain of Attack by :

Download or read book Star Trek: Chain of Attack written by and published by . This book was released on with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Hardware Supply Chain Security

Download Hardware Supply Chain Security PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3030627071
Total Pages : 221 pages
Book Rating : 4.0/5 (36 download)

DOWNLOAD NOW!


Book Synopsis Hardware Supply Chain Security by : Basel Halak

Download or read book Hardware Supply Chain Security written by Basel Halak and published by Springer Nature. This book was released on 2021-02-04 with total page 221 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

The Game Design Reader

Download The Game Design Reader PDF Online Free

Author :
Publisher : MIT Press
ISBN 13 : 0262195364
Total Pages : 955 pages
Book Rating : 4.2/5 (621 download)

DOWNLOAD NOW!


Book Synopsis The Game Design Reader by : Katie Salen Tekinbas

Download or read book The Game Design Reader written by Katie Salen Tekinbas and published by MIT Press. This book was released on 2005-11-23 with total page 955 pages. Available in PDF, EPUB and Kindle. Book excerpt: Classic and cutting-edge writings on games, spanning nearly 50 years of game analysis and criticism, by game designers, game journalists, game fans, folklorists, sociologists, and media theorists. The Game Design Reader is a one-of-a-kind collection on game design and criticism, from classic scholarly essays to cutting-edge case studies. A companion work to Katie Salen and Eric Zimmerman's textbook Rules of Play: Game Design Fundamentals, The Game Design Reader is a classroom sourcebook, a reference for working game developers, and a great read for game fans and players. Thirty-two essays by game designers, game critics, game fans, philosophers, anthropologists, media theorists, and others consider fundamental questions: What are games and how are they designed? How do games interact with culture at large? What critical approaches can game designers take to create game stories, game spaces, game communities, and new forms of play? Salen and Zimmerman have collected seminal writings that span 50 years to offer a stunning array of perspectives. Game journalists express the rhythms of game play, sociologists tackle topics such as role-playing in vast virtual worlds, players rant and rave, and game designers describe the sweat and tears of bringing a game to market. Each text acts as a springboard for discussion, a potential class assignment, and a source of inspiration. The book is organized around fourteen topics, from The Player Experience to The Game Design Process, from Games and Narrative to Cultural Representation. Each topic, introduced with a short essay by Salen and Zimmerman, covers ideas and research fundamental to the study of games, and points to relevant texts within the Reader. Visual essays between book sections act as counterpoint to the writings. Like Rules of Play, The Game Design Reader is an intelligent and playful book. An invaluable resource for professionals and a unique introduction for those new to the field, The Game Design Reader is essential reading for anyone who takes games seriously.

Chains

Download Chains PDF Online Free

Author :
Publisher : Simon and Schuster
ISBN 13 : 1416905863
Total Pages : 338 pages
Book Rating : 4.4/5 (169 download)

DOWNLOAD NOW!


Book Synopsis Chains by : Laurie Halse Anderson

Download or read book Chains written by Laurie Halse Anderson and published by Simon and Schuster. This book was released on 2010-01-05 with total page 338 pages. Available in PDF, EPUB and Kindle. Book excerpt: If an entire nation could seek its freedom, why not a girl? As the Revolutionary War begins, thirteen-year-old Isabel wages her own fight...for freedom. Promised freedom upon the death of their owner, she and her sister, Ruth, in a cruel twist of fate become the property of a malicious New York City couple, the Locktons, who have no sympathy for the American Revolution and even less for Ruth and Isabel. When Isabel meets Curzon, a slave with ties to the Patriots, he encourages her to spy on her owners, who know details of British plans for invasion. She is reluctant at first, but when the unthinkable happens to Ruth, Isabel realizes her loyalty is available to the bidder who can provide her with freedom. From acclaimed author Laurie Halse Anderson comes this compelling, impeccably researched novel that shows the lengths we can go to cast off our chains, both physical and spiritual.

Recent Advances in Intrusion Detection

Download Recent Advances in Intrusion Detection PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 364223643X
Total Pages : 407 pages
Book Rating : 4.6/5 (422 download)

DOWNLOAD NOW!


Book Synopsis Recent Advances in Intrusion Detection by : Robin Sommer

Download or read book Recent Advances in Intrusion Detection written by Robin Sommer and published by Springer Science & Business Media. This book was released on 2011-09-01 with total page 407 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

Cybersecurity: The Beginner's Guide

Download Cybersecurity: The Beginner's Guide PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1789806933
Total Pages : 391 pages
Book Rating : 4.7/5 (898 download)

DOWNLOAD NOW!


Book Synopsis Cybersecurity: The Beginner's Guide by : Dr. Erdal Ozkaya

Download or read book Cybersecurity: The Beginner's Guide written by Dr. Erdal Ozkaya and published by Packt Publishing Ltd. This book was released on 2019-05-27 with total page 391 pages. Available in PDF, EPUB and Kindle. Book excerpt: Understand the nitty-gritty of Cybersecurity with ease Key FeaturesAlign your security knowledge with industry leading concepts and toolsAcquire required skills and certifications to survive the ever changing market needsLearn from industry experts to analyse, implement, and maintain a robust environmentBook Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learnGet an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you bestPlan your transition into cybersecurity in an efficient and effective wayLearn how to build upon your existing skills and experience in order to prepare for your career in cybersecurityWho this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful.

Distributed Denial of Service Attack and Defense

Download Distributed Denial of Service Attack and Defense PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 1461494915
Total Pages : 104 pages
Book Rating : 4.4/5 (614 download)

DOWNLOAD NOW!


Book Synopsis Distributed Denial of Service Attack and Defense by : Shui Yu

Download or read book Distributed Denial of Service Attack and Defense written by Shui Yu and published by Springer Science & Business Media. This book was released on 2013-11-04 with total page 104 pages. Available in PDF, EPUB and Kindle. Book excerpt: This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Chain Store Age

Download Chain Store Age PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 1258 pages
Book Rating : 4.3/5 (512 download)

DOWNLOAD NOW!


Book Synopsis Chain Store Age by : Godfrey Montague Lebhar

Download or read book Chain Store Age written by Godfrey Montague Lebhar and published by . This book was released on 1927 with total page 1258 pages. Available in PDF, EPUB and Kindle. Book excerpt:

The Dark Forest

Download The Dark Forest PDF Online Free

Author :
Publisher : Tor Books
ISBN 13 : 1466853433
Total Pages : 513 pages
Book Rating : 4.4/5 (668 download)

DOWNLOAD NOW!


Book Synopsis The Dark Forest by : Cixin Liu

Download or read book The Dark Forest written by Cixin Liu and published by Tor Books. This book was released on 2015-08-11 with total page 513 pages. Available in PDF, EPUB and Kindle. Book excerpt: The inspiration for the Netflix series 3 Body Problem! Over 1 million copies of the Three-Body Problem series sold in North America PRAISE FOR THE THREE-BODY PROBLEM SERIES: “A mind-bending epic.”—The New York Times • “War of the Worlds for the 21st century.”—The Wall Street Journal • “Fascinating.”—TIME • “Extraordinary.”—The New Yorker • “Wildly imaginative.”—Barack Obama • “Provocative.”—Slate • “A breakthrough book.”—George R. R. Martin • “Impossible to put down.”—GQ • “Absolutely mind-unfolding.”—NPR • “You should be reading Liu Cixin.”—The Washington Post The Dark Forest is the second novel in the groundbreaking, Hugo Award-winning series from China's most beloved science fiction author, Cixin Liu. In The Dark Forest, Earth is reeling from the revelation of a coming alien invasion-in just four centuries' time. The aliens' human collaborators may have been defeated, but the presence of the sophons, the subatomic particles that allow Trisolaris instant access to all human information, means that Earth's defense plans are totally exposed to the enemy. Only the human mind remains a secret. This is the motivation for the Wallfacer Project, a daring plan that grants four men enormous resources to design secret strategies, hidden through deceit and misdirection from Earth and Trisolaris alike. Three of the Wallfacers are influential statesmen and scientists, but the fourth is a total unknown. Luo Ji, an unambitious Chinese astronomer and sociologist, is baffled by his new status. All he knows is that he's the one Wallfacer that Trisolaris wants dead. The Three-Body Problem Series The Three-Body Problem The Dark Forest Death's End Other Books by Cixin Liu Ball Lightning Supernova Era To Hold Up the Sky The Wandering Earth A View from the Stars At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.