Counterterrorism: Reassessing the Policy Response

Amazon Price: N/A (as of July 23, 2017 12:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Benoît Gomis responds to the problem of overreaction with guidelines that address terrorism as a problem to be managed rather than as an existential threat that can be eradicated. He proposes a more realistic assessment of the threat from terrorism, domestic or international, by relating terrorism to broader security, social, and political contexts.

The book examines current issues in counterterrorism, including the opportunity costs of counterterrorism policies, their psychological impact, the role of the media and experts, and the risks associated with oversimplifying the challenges posed by terrorism. It also explores less prominent areas of terrorism studies such as right-wing extremism, links between terrorism and organized crime, and citizen privacy.
Continue reading “Counterterrorism: Reassessing the Policy Response”

Cybercrime Risks and Responses: Eastern and Western Perspectives (Palgrave Studies in Cybercrime and Cybersecurity)

Amazon Price: N/A (as of July 23, 2017 14:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This volume examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The chapters come from established international scholars and policy practitioners in the fields of cybercrime and computer forensics. Their contributions show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and issues in cybercrime prevention and control.

This important book represents a compendium of current knowledge on some of the most pressing cybercrime concerns facing governments and industries globally and represents a review of best practice responses to the problems identified. It will be of great interest to policy analysts, law enforcement and industry specialists, as well as academic scholars.

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Rating: 
Amazon Price: $60.00 $48.00 You save: $12.00 (20%). (as of July 23, 2017 08:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks.

In this book, you'll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done:
Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital versionFor IT security professionals, help to understand the risksFor system administrators, help to deploy systems securelyFor developers, help to design and implement secure web applicationsPractical and concise, with added depth when details are relevantIntroduction to cryptography and the latest TLS protocol versionDiscussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilitiesCoverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and HeartbleedThorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinningGuide to using OpenSSL to generate keys and certificates and to create and run a private certification authorityGuide to using OpenSSL to test servers for vulnerabilitiesPractical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and TomcatThis book is available in paperback and a variety of digital formats without DRM. Digital version of Bulletproof SSL and TLS can be obtained directly from the author, at feistyduck.com.

Cyber-Security Glossary of Building Hacks and Cyber-Attacks

Amazon Price: $6.95 $6.95 (as of July 23, 2017 14:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to help facility and infrastructure engineers and building managers understand vulnerability of SCADA systems and building and industrial control systems to cyber-attack. The book includes definitions of technical terms related to automated equipment controls common to industry, utilities and buildings. Although written for facility engineers, much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Dictionary attack Cinderella attack Time Bomb attack Fork Bomb attack Logic Bomb attack Bluesnarfing Smurf attack Vampire Tap Water Holing Pass the Hash attack Tiny Fragment attack Protocol Fuzzing attack Replay attack Amplification attack Man in the Middle attack and many more. I also include steps to take to prevent a cyber-attack.

Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)

Rating: 
Amazon Price: N/A (as of July 23, 2017 14:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security

Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing.
Continue reading “Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)”