Amazon Price: N/A (as of April 20, 2018 05:10 –
This book provides for a comparative position of the laws, from varying jurisdictions like US, UK and India in regard to the laws for combating the myriad kinds of the cyber crimes. This book gives a comprehensive treatment to the major kinds of the cybercrimes prevalent in the modern digital age. This book also provides for constructive suggestions in order to combat and tackle the cybercrimes and the computer crimes.
The Book has been written by Mr. Bhavya Nain, Assistant Professor of Law, Amity Law School, Amity University, UP, India.
Amazon Price: N/A (as of April 20, 2018 00:19 –
Joe and his sister Alice have a famous father, a computer hacker nicknamed the Hatter whose exploits and criminal record are the stuff of legend.The Hatter has created a botnet, a collection of ordinary computers that have been taken over by a revolutionary new computer virus that can’t be stopped. The botnet has the potential to shut down the Internet, and a group of Middle-Eastern terrorists want it.
Amazon Price: $29.95 $29.95 (as of April 20, 2018 05:31 –
Carl Von Clausewitz described the purpose of war as "the compulsory submission of the enemy to our will." Unlike conventional military conflicts of the past, war in the information age is more a battle of wills than artillery, and doesn't necessarily end with decisive conclusions or clear winners. Cyber warfare between nations is conducted not only without the consent or participation of citizens but often without their knowledge, with little to see in the way of airstrikes and troop movements.
The weapons are information systems, intelligence, propaganda and the media. The combatants are governments, multinational corporations, hackers and whistleblowers. The battlefields are economies, command and control networks, election outcomes and the hearts and minds of populations. As with Russia's bloodless 2014 annexation of the Crimea, the cyberwar is fought before the infantry arrives. Written by a United States intelligence community insider, this book describes the covert aspects of modern wars and the agencies who fund and fight them.
Amazon Price: $24.30 (as of April 20, 2018 06:30 –
Written by leading information security educators, this fully revised, full-color computer security textbook covers CompTIA’s fastest-growing credential, CompTIA Security+. Principles of Computer Security, Fourth Edition is a student-tested, introductory computer security textbook that provides comprehensive coverage of computer and network security fundamentals in an engaging and dynamic full-color design.
In addition to teaching key computer security concepts, the textbook also fully prepares you for CompTIA Security+ exam SY0-401 with 100% coverage of all exam objectives. Each chapter begins with a list of topics to be covered and features sidebar exam and tech tips, a chapter summary, and an end-of-chapter assessment section that includes key term, multiple choice, and essay quizzes as well as lab projects. Electronic content includes CompTIA Security+ practice exam questions and a PDF copy of the book. CompTIA Approved Quality Content (CAQC) Instructor resource materials include Online Learning Center with Instructor Manuals, PowerPoint slides featuring artwork from the book, and a test bank of questions for use as quizzes or exams Electronic content features two simulated practice exams in the Total Tester exam engine and a PDF eBook Supplemented by Principles of Computer Security Lab Manual, Fourth Edition White and Conklin are two of the most well-respected computer security educators in higher education
Amazon Price: N/A (as of April 20, 2018 05:31 –
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented.
Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to “critical infrastructure and cyber security, potential risks and consequences of a cyber attack against an industrial control system, compliance controls in relation to network security practices, industrial network protocols, such as Modbus and DNP3, assessment of vulnerabilities and risk, how to secure enclaves, regulatory compliance standards applicable to industrial network security, and common pitfalls and mistakes, like complacency and deployment errors.
This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines.
Covers implementation guidelines for security measures of critical infrastructureApplies the security measures for system-specific complianceDiscusses common pitfalls and mistakes and how to avoid them