Critical Infrastructure Protection II

Critical Infrastructure Protection II (IFIP International Federation for Information Processing) (IFIP Advances in Information and Communication Technology) (v. 2)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:

– Themes and Issues

– Infrastructure Security

– Control Systems Security

– Security Strategies

– Infrastructure Interdependencies

– Infrastructure Modeling and Simulation

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Critical Infrastructure Protection II is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Mauricio Papa is an Associate Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $199.00

Click here to buy from Amazon

Nuclear Infrastructure Protection and Homeland Security

Nuclear Infrastructure Protection and Homeland SecurityExperts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.

Price: $85.00

Click here to buy from Amazon

Enhanced by Zemanta

The Cyber Commander’s eHandbook Version 3

CYBER WARFARE: The Cyber Commander's eHandbook Version 3 (The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3 - 296 Page eBook covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.)

The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3, covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.

Cyber warfare, cyber terrorism, cyber espionage and cyber crime are all growing threats. The 2012 Version 3 of the Cyber Commander's eHandbook provides the insight needed to understand the new world of cyber warfare, as well as defines the tools and techniques for offensive and defensive cyber action, and provide cyber intelligence needed to understand the strategies behind building a dynamic and relevant cyber warfare capability.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Setting the Stage
Chapter 3 – Cyber Espionage
Chapter 4 – Cyber Terrorism
Chapter 5 – Cyber Intelligence
Chapter 6 – Cyber Weapons
Chapter 7 – EMP Devices
Chapter 8 – Attack Process
Chapter 9 – Critical Infrastructure
Chapter 10 – Cyber Doctrine
Chapter 11 – Cyber Infrastructure
Chapter 12 – New Cyber Warfare Models
Chapter 13 – Conclusion

Portions of this book have been republished in 36 different countries with over 100,000 readers.

Our cyber warfare distance learning program is a great companion product!

Course Information: http://www.amazon.com/gp/product/B003HD06ZG/ref=nosim/cybe0f8-20

Price:

Click here to buy from Amazon

Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical InfrastructureThe worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Price: $99.95

Click here to buy from Amazon

Networks and States: The Global Politics of Internet Governance

Networks and States: The Global Politics of Internet Governance (Information Revolution and Global Politics)When the prevailing system of governing divides the planet into mutually exclusive territorial monopolies of force, what institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering-censorship by states and concerns over national cyber-security, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states. In Networks and States, Milton Mueller counters this, showing how Internet governance poses novel and fascinating governance issues that give rise to a global politics and new transnational institutions. Drawing on theories of networked governance, Mueller provides a broad overview of Internet governance from the formation of ICANN to the clash at the World Summit on the Information Society (WSIS), the formation of the Internet Governance Forum, the global assault on peer-to-peer file sharing and the rise of national-level Internet control and security concerns.

Mueller identifies four areas of conflict and coordination that are generating a global politics of Internet governance: intellectual property, cyber-security, content regulation, and the control of critical Internet resources (domain names and IP addresses). He investigates how recent theories about networked governance and peer production can be applied to the Internet, offers case studies that illustrate the Internet's unique governance problems, and charts the historical evolution of global Internet governance institutions, including the formation of a transnational policy network around the WSIS.

Internet governance has become a source of conflict in international relations. Networks and States explores the important role that emerging transnational institutions could play in fostering global governance of communication-information policy.

Price: $35.00

Click here to buy from Amazon