Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)

Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.

An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections:

 

  • Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field
  • National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government
  • Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends

 

Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.

Price: $59.95

Click here to buy from Amazon

Cyber Commander’s Handbook

Cyber Commander's HandbookThe global reliance on computers, networks and systems continues to grow. As our dependency grows so do the threats that target our military s Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) systems as well as the operational components and electronic controls for our critical infrastructure. Over the past decade we have experienced a substantial rise in the complexity and sophistication of cyber attacks as well as a frightening increase in the impact of some of the attacks. Every computer is a potential cyber weapon waiting to be loaded and used by extremists, criminals, terrorists and rogue nation states. As the world becomes more and more dependent on computers and information technology, the greater the risk of cyber attacks. Government and military leaders now face this fact and our critical systems and infrastructure remain at great risk! This risk has made the ability to defend these critical systems and direct cyber attacks core capabilities required for the modern military. In the age of cyber conflict, leaders need to understand the weapons and strategies used to wage this rapidly evolving type of warfare. This handbook will provide the background needed to understand the new world of cyber warfare, define the tools and techniques for offensive and defensive action, and provide insight into the strategies behind building a dynamic and relevant cyber warfare capability.

Price: $29.95

Nuclear Infrastructure Protection and Homeland Security

Nuclear Infrastructure Protection and Homeland SecurityExperts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.

Price: $85.00

Click here to buy from Amazon

Enhanced by Zemanta

Mobile Malware Attacks and Defense

Mobile Malware Attacks and DefenseMalware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.

* Visual Payloads
View attacks as visible to the end user, including notation of variants.

* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.

* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.

* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.

* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.

* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.

* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.

* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.

* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.

* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.

* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks

* Analyze Mobile Device/Platform Vulnerabilities and Exploits

* Mitigate Current and Future Mobile Malware Threats

Price: $59.95

Click here to buy from Amazon

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector ThreatsCybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats” or ‘SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

  • Includes detailed analysis and examples of the threats in addition to related anecdotal information
  • Authors' combined backgrounds of security, military, and intelligence, give you distinct and timely insights
  • Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them

Price: $59.95

Click here to buy from Amazon