Amazon Price: N/A (as of May 26, 2018 23:46 –
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented.
This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Continue reading “Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure”
Amazon Price: N/A (as of May 26, 2018 12:39 –
This guide is for:
1) beginners and
2) anyone wishing to maximize RTL dongle performance.
Chapters cover all you need to know for the best reception with $10 RTL-SDR dongles. Wideband and specialist antennas, modding and noise reduction tips aided with images and diagrams.
My blog at http://rtlsdr4everyone.blogspot.com is only a fraction of the know-how in this book – if you want to take performance to the next level, or simply have no time to waste searching for information on the Internet, then this book is for you.
Readable on all platforms: Windows and Mac, Android and iPad, iPhone and Ipod touch.
Amazon Price: N/A (as of September 25, 2016 00:33 –
The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation’s Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure and their importance was reinforced during the massive power outage that occurred in August 2003. Growing reliance upon the Internet has emphasized the vulnerability of SCADA system communications to cyber attack. Only through diligent and continuous vulnerability assessment and certification and accreditation of these systems will the United States be able to mitigate some of the vulnerabilities of these systems. A case study presented here has validated the need for continued focus in this area. This thesis consolidates some of the research that has already been done in the area of SCADA vulnerability assessment and applies it by developing an initial vulnerability assessment checklist for Department of the Navy systems. This checklist can and should also be used in the certification and accreditation of DoN SCADA systems. A promising technology was also discovered during this research that should be explored further to secure SCADA communications. This will be touched on briefly.
Amazon Price: N/A (as of May 26, 2018 00:29 –
The rise of sophisticated cyber threats means that the task of managing cyber risks, once the near-exclusive realm of IT professionals, is now also borne by attorneys, senior executives, and directors. Cybersecurity: A Practical Guide to the Law of Cyber Risk provides the practical steps that can be taken to help your clients understand and mitigate today’s cyber risk and to build the most resilient response capabilities possible.
Cybersecurity: A Practical Guide to the Law of Cyber Risk provides a comprehensive discussion of the complex quilt of federal and state statutes, Executive Orders, regulations, contractual norms, and ambiguous tort duties that can apply to this crucial new area of the law. For example, it describes in detail:The leading regulatory role the Federal Trade Commission has played, acting on its authority to regulate unfair or deceptive trade practices;The guidance issued by the SEC interpreting existing disclosure rules to require registrants to disclose cybersecurity risks under certain circumstances;The varying roles of other regulators in sector-specific regulation, such as healthcare, energy, and transportation; andThe impact of preexisting statutes, such as the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, on current cybersecurity issues.
Continue reading “Cybersecurity: A Practical Guide to the Law of Cyber Risk: 1”
Amazon Price: N/A (as of May 26, 2018 00:24 –
No Place to Hide is a groundbreaking look at the NSA surveillance scandal, from the reporter who broke the story
Investigative reporter for The Guardian and bestselling author Glenn Greenwald, provides an in-depth look into the NSA scandal that has triggered a national debate over national security and information privacy. With further revelations from documents entrusted to Glenn Greenwald by Edward Snowden himself, this book explores the extraordinary cooperation between private industry and the NSA, and the far-reaching consequences of the government’s surveillance program, both domestically and abroad.