Attacks on Wireless LANs About the security of IEEE 802.11 based wireless networks

Attacks on Wireless LANs  About the security of IEEE 802.11 based wireless networksWireless LANs can be found nearly everywhere today. Most mobile computers ship with built-in wireless LAN hardware by default and most other computers can be equipped with additional hardware. Because all data is transmitted wirelessly, extra security is needed in these networks. This was a concern to the creators of the IEEE 802.11 standard, who designed a simple protocol called WEP which stands for Wired Equivalent Privacy to protect such networks. Unfortunately, the WEP protocol has some serious design flaws and various attacks are possible against WEP protected networks. This book presents nearly all currently known attacks on the WEP protocol, including their theoretical background and their implementation. This book is intended for network operators, who want to learn more about wireless security, and also for cryptographers, who want to understand the theoretical background of these attacks.

 

Price: $76.00

Click here to buy from Amazon

Asymmetric Warfare

Asymmetric WarfareAsymmetric warfare is war between belligerents whose relative military power differs significantly, or whose strategy or tactics differ significantly. “Asymmetric warfare” can describe a conflict in which the resources of two belligerents differ in essence and in the struggle, interact and attempt to exploit each other's characteristic weaknesses. Such struggles often involve strategies and tactics of unconventional warfare, the “weaker” combatants attempting to use strategy to offset deficiencies in quantity or quality. Such strategies may not necessarily be militarized. This is in contrast to symmetric warfare, where two powers have similar military power and resources and rely on tactics that are similar overall, differing only in details and execution.

Price: $57.00

Click here to buy from Amazon

Information Warfare: How to Survive Cyber Attacks

Information Warfare: How to Survive Cyber AttacksAnother release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.





Price: $29.99

Click here to buy from Amazon

Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)

Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)This cutting-edge volume takes network security professionals to the next level in protecting networks and web sites. Never-before-published advanced security techniques and concise explanations of core Internet infrastructure explain how to defend against devastating vulnerabilities in systems and the underlying network. With the authors' winning methodology for attack profiling and the theatre of war concept, you'll learn how to architect and prepare your network for threats that don’t yet exist.
By explaining specific in-depth technologies in use by not only the attackers, but also inside the applications they target, this book enables the reader to make better use of the tools available today, and to design new tools, techniques, and operational policies for the future.

Price: $54.95

Click here to buy from Amazon

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow’s Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation.

The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for.

To address the above mentioned problems an advanced research workshop: “Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT” was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Price: $129.00

Click here to buy from Amazon