Practical SCADA for Industry (IDC Technology)

Practical SCADA for Industry (IDC Technology)A SCADA system gathers information, such as where a leak on a pipeline has occurred, transfers the information back to a central site, alerting the home station that the leak has occurred, carrying out necessary analysis and control, such as determining if the leak is critical, and displaying the information in a logical and organized fashion. SCADA systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system.

An engineer's introduction to Supervisory Control and Data Acquisition (SCADA) systems and their application in monitoring and controlling equipment and industrial plant.

Essential reading for data acquisition and control professionals in plant engineering, manufacturing, telecommunications, water and waste control, energy, oil and gas refining and transportation.

Provides the knowledge to analyse, specify and debug SCADA systems, covering the fundamentals of hardware, software and the communications systems that connect SCADA operator stations

Price: $66.95

Click here to buy from Amazon

Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History

Rating: 
Amazon Price: $24.95 $16.13 You save: $8.82 (35%). (as of July 21, 2017 02:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Bradley Manning perpetrated the biggest breach of military security in American history. While serving as an Army intelligence analyst, he leaked an astounding amount of classified information to WikiLeaks: classified combat videos, plus hundreds of thousands of documents from the wars in Afghanistan and Iraq and from embassies around the globe. Nearly all of WikiLeaks' headline-making releases of information have come from a single source: Bradley Manning.

The leaks affected governments the world over–the Arab Spring may have been sparked, in part, by Manning's revelations. They propelled WikiLeaks to a level of international prominence it never had before and forever changed the delicate dance between secrecy and transparency.
Continue reading “Private: Bradley Manning, WikiLeaks, and the Biggest Exposure of Official Secrets in American History”

Network Security and DDoS: Cooperative Defense against DDoS attack Using GOSSIP protocol

Network Security and DDoS: Cooperative Defense against DDoS attack Using GOSSIP protocolDDoS attack is the greatest threat of today in the field of Network Security. The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today?s network security issues. In this book, it has successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.






Price: $60.00

Click here to buy from Amazon

Detection of SMS Spam Botnets in Mobile Devices: Design, Analysis, Implementation

Amazon Price: $31.00 $31.00 (as of July 21, 2017 02:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Short Message Service (SMS) is widely used to provide communication between users around the world. In the last years, it has become a lucrative way for cybercriminals to infect mobile devices with botnets and launch malicious attacks without the user's knowledge such as: SMS spam and SMS premium rate fraud. SMS spam is one of the dangerous malicious activities as the user is charged for each sent SMS spam. Existing solutions to this issue are no longer adequate as they are either costly in terms of resources, inefficient, or require user intervention with some knowledge on security. In this book, we design, analyze, and implement a system that detects any attempt to send out malicious SMS spams from the mobile device. The proposed system combines the rule-based and the content-based approaches into one detection process. It achieves good performance in terms of detection time and execution cost, and offers a good tradeoff between resilience against attacks and user interaction with the system. This book is intended for multiple audiences: academic, professional, students, and anyone else who is interested in IT security, and particularly in mobile security and botnet detection.

Building Virtual Pentesting Labs for Advanced Penetration Testing

Rating: 
Amazon Price: N/A (as of July 21, 2017 02:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Build intricate virtual architecture to practice any penetration testing technique virtually

About This Book
Build and enhance your existing pentesting methods and skills
Get a solid methodology and approach to testing
Step-by-step tutorial helping you build complex virtual architecture
Continue reading “Building Virtual Pentesting Labs for Advanced Penetration Testing”