Amazon Price: N/A (as of December 13, 2017 18:54 –
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role.
Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there.
Continue reading “Breaking into Information Security: Crafting a Custom Career Path to Get the Job You Really Want”
Amazon Price: N/A (as of December 13, 2017 18:46 –
The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.
Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:
Continue reading “Handbook of SCADA/Control Systems Security”
Amazon Price: $124.00 $87.58 You save: $36.42 (29%). (as of December 13, 2017 22:55 –
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyberwar and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
Amazon Price: $16.95 $12.78 You save: $4.17 (25%). (as of December 13, 2017 15:53 –
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Amazon Price: N/A (as of December 14, 2017 06:44 –
The old world of spying-dead-letter boxes, microfilm cameras, an enemy reporting to the Moscow Center, and a hint of sexual blackmail-is history. The spymaster's technique has changed and the enemy has, too. He or she now frequently comes from a culture far removed from Western understanding and is part of a less well-organized group. The new enemy is constantly evolving and prepared to kill the innocent. In the face of this new threat, the spymasters of the world shunned human intelligence as the primary way to glean clandestine information and replaced it with an obsession that focuses on the technical methods of spying ranging from the use of high-definition satellite photography to the global interception of communications. However, this obsession with technology has failed, most spectacularly, with the devastation of the 9/11 attacks. In this searing modern history of espionage, Stephen Grey takes us from the CIA's Cold War legends, to the agents who betrayed the IRA, through to the spooks inside Al-Qaeda and ISIS. Techniques and technologies have evolved, but the old motivations for betrayal-patriotism, greed, revenge, compromise-endure. Based on years of research and interviews with hundreds of secret sources, Stephen Grey's The New Spymasters is an up-to-date exposé that shows how spycraft's human factor is once again being used to combat the world's deadliest enemies.