Amazon Price: N/A (as of November 25, 2017 07:44 –
The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.
Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:
Continue reading “Handbook of SCADA/Control Systems Security”
Amazon Price: N/A (as of November 25, 2017 06:42 –
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Benoît Gomis responds to the problem of overreaction with guidelines that address terrorism as a problem to be managed rather than as an existential threat that can be eradicated. He proposes a more realistic assessment of the threat from terrorism, domestic or international, by relating terrorism to broader security, social, and political contexts.
The book examines current issues in counterterrorism, including the opportunity costs of counterterrorism policies, their psychological impact, the role of the media and experts, and the risks associated with oversimplifying the challenges posed by terrorism. It also explores less prominent areas of terrorism studies such as right-wing extremism, links between terrorism and organized crime, and citizen privacy.
Continue reading “Counterterrorism: Reassessing the Policy Response”
Amazon Price: N/A (as of November 25, 2017 02:17 –
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks.
In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens.
Continue reading “Global Information Warfare: The New Digital Battlefield, Second Edition”
Amazon Price: N/A (as of November 24, 2017 17:00 –
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
Get the Fundamentals of Internet Architecture and the Protocol Layers
Continue reading “Introduction to Computer Networks and Cybersecurity”
Amazon Price: N/A (as of November 24, 2017 13:41 –
Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain.
The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace to the American way of life and global prosperity. Examining the truths and myths behind recent headline-grabbing malicious cyber activity, the book spells out the challenges involved with establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders. The desire is to create a domain that functions as a trusted and resilient environment that fosters cooperation, collaboration, and commerce. Additionally, the book:
Continue reading “Conflict and Cooperation in Cyberspace: The Challenge to National Security”