Energy Infrastructure Protection and Homeland Security

Energy Infrastructure Protection and Homeland SecurityIn the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sector along with its cascading effects_is very real. Energy Infrastructure Protection and Homeland Security is a reference for those involved with our energy infrastructure who want quick answers to complicated questions. It is intended to help employers and employees handle security threats they must be prepared to meet on a daily basis. This book focuses on the three interrelated energy infrastructure segments: electricity, petroleum, and natural gas. It presents common-sense methodologies in a straightforward manner and is accessible to those who have no experience with energy infrastructure or homeland security. Readers gain an understanding of the challenge of domestic preparedness_that is, an immediate need for a heightened state of awareness of the present threat facing the energy infrastructure industrial sector as a potential terrorist target_as well as knowledge of security principles and measures that can be implemented, adding a critical component not only to one’s professional knowledge but also giving one the tools needed to combat terrorism.

Price: $85.00

Click here to buy from Amazon

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, ... in Information and Communication Technology)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection IV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, and Risk Management. This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at the National Defense University, Washington, DC, USA in the spring of 2010. Critical Infrastructure Protection IV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Tyler Moore is a Postdoctoral Fellow at the Center for Research on Computation and Society, Harvard University, Cambridge, Massachusetts, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $109.00

Click here to buy from Amazon

Homeland Security and Private Sector Business: Corporations’ Role in Critical Infrastructure Protection

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure ProtectionThe challenge in combating terrorism is not that any of us could die tomorrow in an attack, but that we cannot seem to perform the basic functions of diagnosing and treating the problem so that it is manageable. Given this, and because public and private sector partnerships are critical to the success of this management, Homeland Security and Private Sector Business: Corporations’ Role in Critical Infrastructure Protection identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats.

Organized to take into consideration differing leadership and management styles, organizational cultural change barriers, and team dynamics, the information is structured to appeal to most adult learning styles, ensuring effective communication of critical messages. Using helpful case studies and exercises, the author presents invaluable instruction on how to establish, implement, and reinforce terrorism awareness and regulatory compliance with national critical infrastructure interests. Comprehensive in scope, the book reviews threat factors, risk mitigation, readiness plans, prevention approaches, human factors, and training methods. It concludes with insights into the limitations businesses must respect as they adjust to this new paradigm.

A recognized expert in terrorism deterrence and counterintelligence methods, Elsa Lee brings her 28 years of experience in counterterrorism, counterintelligence, and counterespionage investigations to inform the discussion. Organizations which integrate her recommendations into their internal corporate strategies will not only contribute to Homeland Security efforts, but will also ultimately improve business continuity, resiliency, and operational and financial security for the corporation.

Price: $85.95

Click here to buy from Amazon

Techno Security’s Guide to Securing SCADA: Protecting Critical Infrastructure

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical InfrastructureAround the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure–everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.

This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.

* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a “sit-down” with the leaders in the field

Price: $72.95

Click here to buy from Amazon

National Defense Strategy – United States of America

National Defense Strategy - United States of AmericaThe United States, our allies, and our partners face a spectrum of challenges, including violent transnational extremist networks, hostile states armed with weapons of mass destruction, rising regional powers, emerging space and cyber threats, natural and pandemic disasters, and a growing competition for resources. The Department of Defense must respond to these challenges while anticipating and preparing for those of tomorrow. We must balance strategic risk across our responses, making the best use of the tools at hand within the U.S. Government and among our international partners. To succeed, we must harness and integrate all aspects of national power and work closely with a wide range of allies, friends and partners. We cannot prevail if we act alone.

As noted in the 2006 QDR, state actors no longer have a monopoly over the catastrophic use of violence. Small groups or individuals can harness chemical, biological, or even crude radiological or nuclear devices to cause extensive damage and harm. Similarly, they can attack vulnerable points in cyberspace and disrupt commerce and daily life in the United States, causing economic damage, compromising sensitive information and materials, and interrupting critical services such as power and information networks. National security and domestic resources may be at risk, and the Department must help respond to protect lives and national assets. The Department will continue to be both bulwark and active protector in these areas. Yet, in the long run the Department of Defense is neither the best source of resources and capabilities nor the appropriate authority to shoulder these tasks. The comparative advantage, and applicable authorities, for action reside elsewhere in the U.S. Government, at other levels of government, in the private sector, and with partner nations. DoD should expect and plan to play a key supporting role in an interagency effort to combat these threats, and to help develop new capacities and capabilities, while protecting its own vulnerabilities.

In the contemporary strategic environment, the challenge is one of deterring or dissuading a range of potential adversaries from taking a variety of actions against the U.S. and our allies and interests. These adversaries could be states or non-state actors; they could use nuclear, conventional, or unconventional weapons; and they could exploit terrorism, electronic, cyber and other forms of warfare. Economic interdependence and the growth of global communications further complicate the situation. Not only do they blur the types of threats, they also exacerbate sensitivity to the effects of attacks and in some cases make it more difficult to attribute or trace them. Finally, the number of potential adversaries, the breadth of their capabilities, and the need to design approaches to deterrence for each, create new challenges.

An underlying assumption in our understanding of the strategic environment is that the predominant near-term challenges to the United States will come from state and non-state actors using irregular and catastrophic capabilities. Although our advanced space and cyber-space assets give us unparalleled advantages on the traditional battlefield, they also entail vulnerabilities.

China is developing technologies to disrupt our traditional advantages. Examples include development of anti-satellite capabilities and cyber warfare. Other actors, particularly non-state actors, are developing asymmetric tactics, techniques, and procedures that seek to avoid situations where our advantages come into play.

Download National Defense Strategy – United States of America