Amazon Price: N/A (as of February 18, 2018 03:17 –
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.
Amazon Price: N/A (as of February 17, 2018 19:48 –
The Art of War is the Swiss army knife of military theory–pop out a different tool for any situation. Folded into this small package are compact views on resourcefulness, momentum, cunning, the profit motive, flexibility, integrity, secrecy, speed, positioning, surprise, deception, manipulation, responsibility, and practicality. Thomas Cleary's translation keeps the package tight, with crisp language and short sections. Commentaries from the Chinese tradition trail Sun-tzu's words, elaborating and picking up on puzzling lines. Take the solitary passage: "Do not eat food for their soldiers." Elsewhere, Sun-tzu has told us to plunder the enemy's stores, but now we're not supposed to eat the food? The Tang dynasty commentator Du Mu solves the puzzle nicely, "If the enemy suddenly abandons their food supplies, they should be tested first before eating, lest they be poisoned." Most passages, however, are the pinnacle of succinct clarity: "Lure them in with the prospect of gain, take them by confusion" or "Invincibility is in oneself, vulnerability is in the opponent." Sun-tzu's maxims are widely applicable beyond the military because they speak directly to the exigencies of survival. Your new tools will serve you well, but don't flaunt them. Remember Sun-tzu's advice: "Though effective, appear to be ineffective." –Brian Bruya
Amazon Price: N/A (as of February 18, 2018 08:28 –
With the hospital and health sectors attack surface wide open it’s surprising that more isn’t being done to educate staff on proper cybersecurity hygiene. The attack surface is compounded by the exponential expansion of the IoT and lack of up to date BYOD protocols. HIPAA and patient record privacy are a moot point when unpatched vulnerabilities in applications are exploited by bad actors. The healthcare industry as a whole needs to move toward a more cybersecurity-centric culture as the physical and cyber environments continue to merge.
The point of this easy to intellectually digest book series is to introduce basic cybersecurity with nursing informatics, hospital information technology, HIPAA compliance and health IT. When health sector staff can more easily identify spear phishing, spoofed browsers and other malicious enticements by hackers, each organization will be less prone to breaches. Bad actors are becoming more targeted, stealthy and creative with their exploit kits and zero days. Ransomware, RATs, Droppers and drive-by downloads are just the tip of the iceberg when it comes to the adversaries attack arsenal for invading the healthcare division of our Nation’s critical infrastructure.
Continue reading “Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume – 5”
Amazon Price: N/A (as of February 18, 2018 08:29 –
This sparkling Handbook offers an unrivalled resource for those engaged in the cutting edge field of social network analysis. Systematically, it introduces readers to the key concepts, substantive topics, central methods and prime debates. Among the specific areas covered are: o Network theory . o Interdisciplinary applications. o Online networks. o Corporate networks. o Lobbying networks. o Deviant networks. o Measuring devices. o Key Methodologies. o Software applications. The result is a peerless resource for teachers and students which offers a critical survey of the origins, basic issues and major debates. The Handbook provides a one-stop guide that will be used by readers for decades to come.
Amazon Price: N/A (as of February 17, 2018 17:30 –
A terrifying new breed of predator evolves…
Darknet is a prophetic and all-too-real thriller set in present-day New York, the story of one man's quest to overcome a malignant computer virus infecting Wall Street, and his incredible gamble to risk everything to save his family.
Continue reading “Darknet”