Securing Cyber-Physical Systems

Amazon Price: N/A (as of November 24, 2017 13:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry.

CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical—their availability and correct operation is essential. This book focuses on the security of such mission-critical systems.
Continue reading “Securing Cyber-Physical Systems”

Threat Modeling: Designing for Security

Rating: 
Amazon Price: N/A (as of November 24, 2017 22:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Continue reading “Threat Modeling: Designing for Security”

Cyber Security Awareness for Corporate Directors and Board Members

Rating: 
Amazon Price: N/A (as of November 24, 2017 16:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do–especially as board members and directors of boards– to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

Presents the most current threats, detection techniques, and defenses for Corporate Directors and Board Members.

Internet Security: How To Defend Against Attackers On The Web

Rating: 
Amazon Price: $99.95 $46.99 You save: $52.96 (53%). (as of November 25, 2017 01:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Social Networking) provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications. New and Key Features of the Second Edition: NEW! – New Chapter 4, Securing Mobile Communications Provides a weatlh of exercises and real-world examples Details the latest internet threats and risks when connecting to the internet, as well as mitigating risk and securing applications Discusses penetration testing of production Web sites Examines mobile device and connectivity security

Python Penetration Testing Essentials

Rating: 
Amazon Price: N/A (as of November 24, 2017 15:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Employ the power of Python to get the best out of pentesting

About This BookLearn to detect and avoid various types of attacks that put the privacy of a system at riskEmploy practical approaches to penetration testing using Python to build efficient code and eventually save timeEnhance your concepts about wireless applications and information gathering of a web server
Continue reading “Python Penetration Testing Essentials”