Securing Cyber-Physical Systems

Amazon Price: N/A (as of April 24, 2018 14:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry.

CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical—their availability and correct operation is essential. This book focuses on the security of such mission-critical systems.
Continue reading “Securing Cyber-Physical Systems”

Applied Cryptography: Protocols, Algorithms and Source Code in C

Rating: 
Amazon Price: $70.00 $39.83 You save: $30.17 (43%). (as of April 25, 2018 09:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine
Continue reading “Applied Cryptography: Protocols, Algorithms and Source Code in C”

Mastering Metasploit

Rating: 
Amazon Price: N/A (as of April 24, 2018 20:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Write and implement sophisticated attack vectors in Metasploit using a completely handson approach

About This Book
Develops Real World Approaches to Penetration testing using Metasploit
Develop advanced skills to carry out effective Risk validation
Develop skills to fabricate any kind of function within the Framework.
Continue reading “Mastering Metasploit”

Cyber Warfare: A Reference Handbook (Contemporary World Issues)

Rating: 
Amazon Price: $58.00 $58.00 (as of April 24, 2018 15:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat—from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats.

This essential reference—the only of its kind to include an overview of other cyber warfare literature—emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers.

Hacking: Hacking For Beginners and Basic Security: How To Hack (Hackers, Computer Hacking, Computer Virus, Computer Security, Computer Programming)

Rating: 
Amazon Price: N/A (as of January 6, 2016 06:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

#1 Best Seller – HACKING: Ultimate Hacking for Beginners – 2nd Edition – NOW IN PAPERBACK!

Hacking is a widespread problem that has compromised the records of individuals, major corporations, and even the federal government.
Continue reading “Hacking: Hacking For Beginners and Basic Security: How To Hack (Hackers, Computer Hacking, Computer Virus, Computer Security, Computer Programming)”