Cyber Attacks: Protecting National Infrastructure

Cyber Attacks: Protecting National InfrastructureNo nation – especially the United States – has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well

Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment.

This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments.

* Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems.

* Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Price: $59.95

Click here to buy from Amazon

Military Perspectives on Cyberpower

Rating: 
Amazon Price: $19.99 $19.99 (as of February 21, 2018 06:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

During the course of nearly two years, the Center for Technology and National Security Policy (CTNSP), National Defense University (NDU), has conducted extensive research to identify and explore major cyber issues. These activities were performed in response to a request in the 2006 Quadrennial Defense Review (QDR). The result of that research is documented in a book entitled Cyberpower and National Security.

精通Metasploit渗透测试

Amazon Price: N/A (as of February 21, 2018 00:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

本书是Metasploit渗透测试的指南,涵盖了使用Metasploit实现渗透测试的诸多方面,主要包括:渗透攻击,编写自定义渗透攻击模块,移植渗透攻击模块,测试服务,以及进行复杂的客户端测试。还将介绍Assembly、Ruby及Cortana等语言知识,Metasploit框架组件与模块,以及如何使用SET和Fast Track等工具。【看更多好书,请访问“风入松书屋”】链接:www.amazon.com/shops/chinabook

Linux Firewalls: Enhancing Security with nftables and Beyond (4th Edition)

Rating: 
Amazon Price: $49.99 $40.08 You save: $9.91 (20%). (as of February 21, 2018 21:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Definitive Guide to Building Firewalls with Linux

As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security.
Continue reading “Linux Firewalls: Enhancing Security with nftables and Beyond (4th Edition)”

Cyber-Security Glossary of Building Hacks and Cyber-Attacks

Amazon Price: $10.95 $10.95 (as of February 21, 2018 02:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to help facility and infrastructure engineers and building managers understand vulnerability of SCADA systems and building and industrial control systems to cyber-attack. The book includes definitions of technical terms related to automated equipment controls common to industry, utilities and buildings. Although written for facility engineers, much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Dictionary attack Cinderella attack Time Bomb attack Fork Bomb attack Logic Bomb attack Bluesnarfing Smurf attack Vampire Tap Water Holing Pass the Hash attack Tiny Fragment attack Protocol Fuzzing attack Replay attack Amplification attack Man in the Middle attack and many more. I also include steps to take to prevent a cyber-attack.