Amazon Price: $49.99 $49.99 (as of February 25, 2018 10:26 –
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks.
Practical Information Security Management provides a wealth of practical advice for anyone responsible for information security management in the workplace, focusing on the ‘how’ rather than the ‘what’. Together we’ll cut through the policies, regulations, and standards to expose the real inner workings of what makes a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governance frameworks, and operational security.
Continue reading “Practical Information Security Management: A Complete Guide to Planning and Implementation”
Amazon Price: $49.99 $30.76 You save: $19.23 (38%). (as of February 25, 2018 17:58 –
The upcoming IoT age will blur the line between our physical and online lives. Attacks targeting our online spaces will put our physical security at risk. Traditionally, the attack vectors to our fundamental luxuries have required physical tampering, mostly because access to the infrastructure has been limited from the Internet. This is about to change with the upcoming disruption caused by a future with billions of "things" connected to the Internet.
This book takes a fascinating look into abusing the most popular IoT-based devices already available in the market. You'll learn how a simple attack can cause a perpetual blackout targeting LED lightbulbs, how bad security decisions have grossly violated the physical safety and privacy of families, and how the insecurity of powerful electric vehicles can put your life at risk.
Continue reading “Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts”
Amazon Price: $22.95 $16.11 You save: $6.84 (30%). (as of February 25, 2018 19:22 –
The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and security
Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?
Continue reading “Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security”
Amazon Price: $60.00 $36.90 You save: $23.10 (38%). (as of February 26, 2018 00:03 –
Operational, tested information security and privacy practices for the healthcare environment
Written by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considerations and their implications within the business of patient care. The book begins with an overview of the organization, financing, and delivery of healthcare and discusses technology, terminology, and data management principles. The topic coverage continues across all aspects of information security and privacy, with a special emphasis on real-life scenarios in clinical practices and business operations in healthcare.
Continue reading “Healthcare Information Security and Privacy”
Amazon Price: N/A (as of February 25, 2018 02:09 –
Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities.
Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts.
Continue reading “Botnets (SpringerBriefs in Cybersecurity)”