Amazon Price: $100.70 (as of June 2, 2020 07:00 –
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times.
Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
Continue reading “Smart Grid Security: Innovative Solutions for a Modernized Grid”
Amazon Price: $18.49 (as of June 3, 2020 02:07 –
Key FeaturesLearn wireless penetration testing with Kali Linux, the latest iteration of BacktrackDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
Continue reading “Kali Linux Wireless Penetration Testing: Beginner's Guide”
Amazon Price: $9.49 (as of June 2, 2020 16:23 –
The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure — a sociotechnical system that is ubiquitous, essential, and foundational. Increasingly integral to the operation of other critical infrastructures, such as transportation, energy, and finance, it functions, in effect, as a meta-infrastructure. As such, the cloud raises a variety of policy and governance issues, among them market regulation, fairness, access, reliability, privacy, national security, and copyright. In this book, experts from a range of disciplines offer their perspectives on these and other concerns. The contributors consider such topics as the economic implications of the cloud's shifting of computing resources from ownership to rental; the capacity of regulation to promote reliability while preserving innovation; the applicability of contract theory to enforce service guarantees; the differing approaches to privacy taken by United States and the European Union in the post-Snowden era; the delocalization or geographic dispersal of the archive; and the cloud-based virtual representations of our body in electronic health data.ContributorsNicholas Bauch, Jean-François Blanchette, Marjory Blumenthal, Sandra Braman, Jonathan Cave, Lothar Determann, Luciana Duranti, Svitlana Kobzar, William Lehr, David Nimmer, Andrea Renda, Neil Robinson, Helen Rebecca Schindler, Joe Weinman, Christopher S. Yoo
Amazon Price: $5.90 (as of June 2, 2020 05:30 –
In this quantitative quasi-experimental study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service attack. The characteristics of the distributed denial of service attacks were used as the independent variables in a quasi-experiment where network traffic was monitored with Snort to detect DDoS packets. The dependent variable for the experiment was false positive alerts for the DDoS packets. The findings showed that the characteristics of a distributed denial of service attack can be used to pro-actively detect botnets through egress monitoring.
Amazon Price: $14.99 (as of June 2, 2020 23:37 –
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.