CyberWar

Si Vis Pacem, Para Bellum

By

Practical Modern SCADA Protocols: DNP3 and Related Systems (IDC Technology)

Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)SCADA (Supervisory Control and Data Acquisition) systems are at the heart of the modern industrial enterprise ranging from mining plants, water and electrical utility installations to oil and gas plants. In a market that is crowded with high-level monographs and reference guides, more practical information for professional engineers is required. This book covers the essentials of SCADA communication systems focussing on DNP3, the IEC 60870.5 standard and other new developments in this area. It commences with a brief review of the fundamentals of SCADA systems’ hardware, software and the communications systems (such as RS-232, RS-485, Ethernet and TCP/IP) that connect the SCADA Modules together. A solid review is then done on the DNP3 and IEC 60870.5 protocols where its features, message structure, practical benefits and applications are discussed. This book provides you with the knowledge to design your next SCADA system more effectively with a focus on using the latest communications technologies available.

* Covers the essentials of SCADA communication systems and other new developments in this area
* Covers a wide range of specialist networking topics and other topics ideal for practicing engineers and technicians looking to further and develop their knowledge of the subject
* Extremely timely subject as the industry has made a strong movement towards standard protocols in modern SCADA communications systems

Price: $63.95

Click here to buy from Amazon

By

The Master Switch: The Rise and Fall of Information Empires

The Master Switch: The Rise and Fall of Information Empires (Borzoi Books)In this age of an open Internet, it is easy to forget that every American information industry, beginning with the telephone, has eventually been taken captive by some ruthless monopoly or cartel. With all our media now traveling a single network, an unprecedented potential is building for centralized control over what Americans see and hear. Could history repeat itself with the next industrial consolidation? Could the Internet—the entire flow of American information—come to be ruled by one corporate leviathan in possession of “the master switch”? That is the big question of Tim Wu’s pathbreaking book.

As Wu’s sweeping history shows, each of the new media of the twentieth century—radio, telephone, television, and film—was born free and open. Each invited unrestricted use and enterprising experiment until some would-be mogul battled his way to total domination. Here are stories of an uncommon will to power, the power over information: Adolph Zukor, who took a technology once used as commonly as YouTube is today and made it the exclusive prerogative of a kingdom called Hollywood . . . NBC’s founder, David Sarnoff, who, to save his broadcast empire from disruptive visionaries, bullied one inventor (of electronic television) into alcoholic despair and another (this one of FM radio, and his boyhood friend) into suicide . . . And foremost, Theodore Vail, founder of the Bell System, the greatest information empire of all time, and a capitalist whose faith in Soviet-style central planning set the course of every information industry thereafter.

Explaining how invention begets industry and industry begets empire—a progress often blessed by government, typically with stifling consequences for free expression and technical innovation alike—Wu identifies a time-honored pattern in the maneuvers of today’s great information powers: Apple, Google, and an eerily resurgent AT&T. A battle royal looms for the Internet’s future, and with almost every aspect of our lives now dependent on that network, this is one war we dare not tune out.

Part industrial exposé, part meditation on what freedom requires in the information age, The Master Switch is a stirring illumination of a drama that has played out over decades in the shadows of our national life and now culminates with terrifying implications for our future.

Price: $27.95

Click here to buy from Amazon

By

Networks and Netwars: The Future of Terror, Crime, and Militancy

Networks and Netwars: The Future of Terror, Crime, and MilitancyNetwar-like cyberwar-describes a new spectrum of conflict that is emerging in the wake of the information revolution. Netwar includes conflicts waged, on the one hand, by terrorists, criminals, gangs, and ethnic extremists; and by civil-society activists (such as cyber activists or WTO protestors) on the other. What distinguishes netwar is the networked organizational structure of its practitioners-with many groups actually being leaderless-and their quickness in coming together in swarming attacks. To confront this new type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves.




Price: $25.00

Click here to buy from Amazon

By

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)The information infrastructure–comprising computers, embedded devices, networks and software systems–is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.





Price: $149.00

Click here to buy from Amazon

By

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.

Price: $2.99

Click here to buy from Amazon

/* */