The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk

Amazon Price: $69.95 $44.10 You save: $25.85 (37%). (as of May 26, 2017 23:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threatsProvides the essential scientific principles and tools required for this analysisExplores the increasingly important relationship between physical and electronic risk in meaningful technical detailEvaluates technical security systems to illustrate specific risks using concrete examples

BIT WARS: Hacking Report: Top Hacks and Attacks of 2014 (Volume 1)

Rating: 
Amazon Price: $3.99 $3.99 (as of May 27, 2017 05:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In BIT WARS: Hacking Report: Top Hacks and Attacks of 2014, Thomas Hyslip presents the who, what, when, where, why, and how, of the top hacks of 2014. 2014 was a year to be remembered in hacking. Sony was attacked by North Korea, Six Chinese military officers were indicted for hacking US companies, and the Point of Sale Malware attacks continued to compromise million of credit and debit cards. With no end in sight, BIT WARS provides a concise overview of the years top hacks and attacks.

BIT WARS: Cyber Crime, Hacking & Information Warfare (Volume 2)

Rating: 
Amazon Price: $5.50 $5.50 (as of May 27, 2017 14:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Do you hear news everyday on the latest hacking attack, but just don't quite understand what it is all about? Well this is the book for you. In BIT WARS, Dr. Thomas Hyslip presents the history of cybercrime, hacking and information warfare that has lead us to where we are today. Espionage, Stuxnet, Cyber Terrorism, Anonymous, TOR, the Deep Web, they are included. Hacking started as a quest for knowledge and curiosity, but has become a worldwide problem with no end in sight. The Center for Strategic and International Studies estimated the annual cost of cybercrime at more than $445 billion annually. Furthermore, the number and sophistication of attacks has steadily increased. In 2014, Target and Home Depot were victims of large scale point of sale attacks, and millions of credit and debit cards were stolen. Ebay lost the account information of over 233 million users, and Sony was attacked by North Korea in retaliation for the movie, “The Interview.” Read about it all in BIT WARS: Cyber Crime, Hacking and Information Warfare, and understand why you should be concerned.

Holistic InfoSec For Web Developers: Physical and People (Fascicle 0)

Amazon Price: N/A (as of May 27, 2017 11:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book begins by taking the reader to the 30,000' view, so you can start to see the entire security landscape. I then attempt to explain a very simple threat modelling approach that I believe Bruce Schneier created, called the Sensible Security Model (SSM). We take the learnings from the first chapter and apply them to lower levels. I detail how to setup a security focussed distribution with all the tools and configuration options required for working through the book. We then walk through the Process and Practises that the attacker often execute, and we take the learnings from that and train the defenders on how they can bring the finding of defects from the most expensive place to the cheapest place, within your Sprint cycles.

The rest of the book focusses on the specific area on the cover of this book.
Continue reading “Holistic InfoSec For Web Developers: Physical and People (Fascicle 0)”

DNS Security: In-depth Vulnerability Analysis and Mitigation Solutions

Rating: 
Amazon Price: N/A (as of May 27, 2017 15:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Domain Name System (DNS) is arguably one of the most important network infrastructure services. As the enabler of almost every web, email, instant messaging, and e-commerce transaction, it is the central nervous system of the Internet. DNS is also a critical component for new and emerging applications such as Voice over LTE (VoLTE) in cellular networks, Voice over IP (VoIP) Telephony, Radio Frequency IDs (RFID), and Content Distribution Networks (CDN).

Now in IEEE ComSoc's Best Readings, this book gives the reader an in-depth understanding of how DNS works, its security vulnerabilities, how to monitor and detect security related events and how to prevent and mitigate attacks. After reading the book, the reader will be able to recognize and explain the major issues around DNS security, and know the best practices to setup, operate, and protect DNS service.
Continue reading “DNS Security: In-depth Vulnerability Analysis and Mitigation Solutions”