Amazon Price: N/A (as of December 11, 2017 00:09 –
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security Examiners
Continue reading “Smart Grid Security: An End-to-End View of Security in the New Electrical Grid”
Amazon Price: N/A (as of December 11, 2017 02:02 –
Programming is now parallel programming. Much as structured programming revolutionized traditional serial programming decades ago, a new kind of structured programming, based on patterns, is relevant to parallel programming today. Parallel computing experts and industry insiders Michael McCool, Arch Robison, and James Reinders describe how to design and implement maintainable and efficient parallel algorithms using a pattern-based approach. They present both theory and practice, and give detailed concrete examples using multiple programming models. Examples are primarily given using two of the most popular and cutting edge programming models for parallel programming: Threading Building Blocks, and Cilk Plus. These architecture-independent models enable easy integration into existing applications, preserve investments in existing code, and speed the development of parallel applications. Examples from realistic contexts illustrate patterns and themes in parallel algorithm design that are widely applicable regardless of implementation technology.
The patterns-based approach offers structure and insight that developers can apply to a variety of parallel programming modelsDevelops a composable, structured, scalable, and machine-independent approach to parallel computingIncludes detailed examples in both Cilk Plus and the latest Threading Building Blocks, which support a wide variety of computers
Amazon Price: N/A (as of December 10, 2017 23:11 –
Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation’s sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture, and transportation. Used separately or together, these two volumes are an excellent foundational resource, and will enable cybersecurity practitioners, students, and employers to gain ground-level insight from experienced professionals, and to develop top-of-mind awareness in the areas most directly impacting the future of our nation’s security.
Contributors include: Philip W. Burnett, Christina Cooper, Kyle Foley, Anne Kohnke, William M. Martin, Kevin McLaughlin, George B. Murphy, Denise Pheils, Dan Shoemaker, Randall Sylvertooth, and Kin F. Wong.
Amazon Price: N/A (as of December 11, 2017 05:09 –
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.
Continue reading “Kali Linux – Assuring Security by Penetration Testing”
Amazon Price: N/A (as of December 11, 2017 03:53 –
This book examines cyberspace superiority in nation-state conflict from both a theoretical and a practical perspective.
This volume analyses superiority concepts from the domains of land, maritime, and air to build a model that can be applied to cyberspace. Eight different cyberspace conflicts between nation states are examined and the resulting analysis is combined with theoretical concepts to present the reader with a conclusion. Case studies include the conflict between Russia and Estonia (2007), North Korea and the US and South Korea (2009) and Saudi Arabia and Iran in the Aramco attack (2012). The book uses these case studies to examine cyberspace superiority as an analytical framework to understand conflict in this domain between nation-states. Furthermore, the book makes the important distinction between local and universal domain superiority, and presents a unique model to relate this superiority in all domains, as well as a more detailed model of local superiority in cyberspace. Through examining the eight case studies, the book develops a rigorous system to measure the amount of cyberspace superiority achieved by a combatant in a conflict, and seeks to reveal if cyberspace superiority proves to be a significant advantage for military operations at the tactical, operational, and strategic levels.
Continue reading “International Conflict and Cyberspace Superiority: Theory and Practice (Routledge Studies in Conflict, Security and Technology)”