A cogent overview of the threat spectrum of cyberspace attacks and cyber weapons, this book introduces the arsenal of cyber tools and sophisticated attacks targeting our national security and our critical infrastructure sectors. Topics include the history of cyber security and the computer industry, cyber intelligence, and recent conflicts and warfare. From a strategic viewpoint, the book also explores legal and international issues in cyberspace, economic costs, the threat landscape, and future trends.
Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors.
For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students once they are on the job. Review questions, discussion questions, and summaries are also included in each chapter to reinforce learning. The book is presented in four parts:
Continue reading “Information Systems: What Every Business Student Needs to Know (Chapman & Hall/CRC Textbooks in Computing)”
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security Examiners
Continue reading “Smart Grid Security: An End-to-End View of Security in the New Electrical Grid”
The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.
Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:
Continue reading “Handbook of SCADA/Control Systems Security”
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics. The book also discusses practical implementations and the current state of research.