Amazon Price: N/A (as of January 23, 2019 16:42 –
By implementing a comprehensive data analytics program, utility companies can meet the continually evolving challenges of modern grids that are operationally efficient, while reconciling the demands of greenhouse gas legislation and establishing a meaningful return on investment from smart grid deployments.
Readable and accessible, Big Data Analytics Strategies for the Smart Grid addresses the needs of applying big data technologies and approaches, including Big Data cybersecurity, to the critical infrastructure that makes up the electrical utility grid. It supplies industry stakeholders with an in-depth understanding of the engineering, business, and customer domains within the power delivery market.
Continue reading “Big Data Analytics Strategies for the Smart Grid”
Amazon Price: $72.95 $50.63 You save: $22.32 (31%). (as of January 22, 2019 21:34 –
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using honeypots and routers. It discusses honeypot concepts and architecture as well as the skills needed to deploy the best honeypot and router solutions for any network environment.
Honeypots and Routers: Collecting Internet Attacks begins by providing a strong grounding in the three main areas involved in Internet security: Computer networks: technologies, routing protocols, and Internet architecture Information and network security: concepts, challenges, and mechanisms System vulnerability levels: network, operating system, and applications
Continue reading “Honeypots and Routers: Collecting Internet Attacks”
Amazon Price: N/A (as of January 23, 2019 18:57 –
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.
In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.
Continue reading “Android Malware and Analysis”
Amazon Price: $90.95 $90.95 (as of January 23, 2019 03:13 –
Based on related courses and research on the cyber environment in Europe, the United States, and Asia, Cyberspace and Cybersecurity supplies complete coverage of cyberspace and cybersecurity. It not only emphasizes technologies but also pays close attention to human factors and organizational perspectives.
Detailing guidelines for quantifying and measuring vulnerabilities, the book also explains how to avoid these vulnerabilities through secure coding. It covers organizational-related vulnerabilities, including access authorization, user authentication, and human factors in information security. Providing readers with the understanding required to build a secure enterprise, block intrusions, and handle delicate legal and ethical issues, the text:
Continue reading “Cyberspace and Cybersecurity”
Amazon Price: $83.95 $64.88 You save: $19.07 (23%). (as of January 23, 2019 00:08 –
The book presents the concepts of information and communications technology (ICT) audit and control from this model. Readers will learn how to create a verifiable audit-based control structure, which will ensure comprehensive security for systems and data. The book explains how to establish systematic control and reporting procedures within a standard organizational framework, and build auditable trust into the security of ICT operations. This book is based around the belief that security is a strategic governance issue rather than an accounting or a technical concern. Besides presenting the concepts of that approach, the book provide exercises and other learning opportunities.