Secrets and Lies: Digital Security in a Networked World

Secrets and Lies: Digital Security in a Networked WorldBestselling author Bruce Schneier offers his expert guidance on achieving security on a network.
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
* Walks the reader through the real choices they have now for digital security and how to pick and choose the right one to meet their business needs
* Explains what cryptography can and can't do in achieving digital security

Price: $17.95

Click here to buy from Amazon

Techno Security’s Guide to Securing SCADA: Protecting Critical Infrastructure

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical InfrastructureAround the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.

This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a “sit-down” with the leaders in the field

Price: $72.95

Click here to buy from Amazon

The Cyber Commander’s eHandbook Version 3

CYBER WARFARE: The Cyber Commander's eHandbook Version 3 (The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3 - 296 Page eBook covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.)

The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3, covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.

Cyber warfare, cyber terrorism, cyber espionage and cyber crime are all growing threats. The 2012 Version 3 of the Cyber Commander's eHandbook provides the insight needed to understand the new world of cyber warfare, as well as defines the tools and techniques for offensive and defensive cyber action, and provide cyber intelligence needed to understand the strategies behind building a dynamic and relevant cyber warfare capability.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Setting the Stage
Chapter 3 – Cyber Espionage
Chapter 4 – Cyber Terrorism
Chapter 5 – Cyber Intelligence
Chapter 6 – Cyber Weapons
Chapter 7 – EMP Devices
Chapter 8 – Attack Process
Chapter 9 – Critical Infrastructure
Chapter 10 – Cyber Doctrine
Chapter 11 – Cyber Infrastructure
Chapter 12 – New Cyber Warfare Models
Chapter 13 – Conclusion

Portions of this book have been republished in 36 different countries with over 100,000 readers.

Our cyber warfare distance learning program is a great companion product!

Course Information: http://www.amazon.com/gp/product/B003HD06ZG/ref=nosim/cybe0f8-20

Price:

Click here to buy from Amazon

Cyberwar: Die Zukunft der Kriegsführung per Computer (German Edition)

Cyberwar: Die Zukunft der Kriegsführung per Computer (German Edition)Experten sind sich sicher, dass der nächste Krieg über das weltweite Datennetz stattfinden wird: Der Zugriff auf die Zentralbank, die Manipulation der Börse, ein bundesweiter Stromausfall, die Ausschaltung wichtiger Satelliten oder die Irreführung von ferngesteuerten Waffen wären Szenarien, wie ein zukünftiger Cyberwar aussehen könnte. Deshalb rüsten sämtliche Staaten weltweit für die informationstechnologische Kriegführung der Zukunft auf. Dieses Buch liefert einen Überblick über den Begriff Cyberwar, Methoden, Schutzmaßnahmen und wie sich Deutschland darauf vorbereitet.

Price: $48.00

Click here to buy from Amazon

Hacking: The Next Generation (Animal Guide)

Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.

 

  • Learn how “inside out” techniques can poke holes into protected networks
  • Understand the new wave of “blended threats” that take advantage of multiple application vulnerabilities to steal corporate data
  • Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
  • Prevent attacks against the mobile workforce and their devices containing valuable data
  • Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
  • Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations

Price: $39.99

Click here to buy from Amazon