Amazon Price: N/A (as of August 20, 2019 23:01 –
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regional or national power grids. It is essential that security measures are put in place to ensure that the Smart Grid does not succumb to these threats and to safeguard this critical infrastructure at all times.
Dr. Florian Skopik is one of the leading researchers in Smart Grid security, having organized and led research consortia and panel discussions in this field. Smart Grid Security will provide the first truly holistic view of leading edge Smart Grid security research. This book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of Smart Grid security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of Smart Grid technology.
Continue reading “Smart Grid Security: Innovative Solutions for a Modernized Grid”
Amazon Price: $40.00 $20.09 You save: $19.91 (50%). (as of August 21, 2019 08:18 –
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.
COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM DOMAINS:
Continue reading “CSSLP Certification All-in-One Exam Guide”
Amazon Price: $5.75 $5.75 (as of August 20, 2019 20:56 –
Small Gifts for Music Lovers – Softback Password Journal [$5.50 / £3.59].
IF LOOK INSIDE ISN'T LOADING, SCROLL DOWN TO SEE IN CUSTOMER REVIEWS.
A discrete password journal with our popular Music Carnival design on the cover; it's got sensible sized print, spacious log boxes, and a few added extras, including password setting advice, at the back. We've put a lot of thought in to this book, it's perfect for a small, simple gift:
Dimensions: 20.3 x 12.7 cm / 5 x 8 inches. (A touch smaller than A5 but much bigger than A6. It's small enough to tuck away easily in a bag, drawer or shelf, but it's not tiny, it's much bigger than most pockets.)
-95 pages of good quality white paper to minimize ink bleed-through.
-Just under 400 log boxes, including a few extra at the back for the storage of online purchase reference numbers.
-An advice section on how to set strong, safe passwords is easily accessible at the back.
-Plenty of space. We've allowed the whole page width for writing internet addresses & usernames, and extra space to write your own notes with each record; particularly useful for extra security details such as memorable words. There's also a general notes space at the back for recording modem details or wifi codes for example. So no more cramming!
-A date record box. To prevent confusion if you change a password you can easily keep track of which one is the latest by using the entry date prompt in each log.
-Easy to read with font size 12 or larger throughout.
Cover: Tough matte paperback. Properly bound, so pages won't fall out with use.
Matching Products: Our Music Carnival design is also available on smART bookx notebooks in a variety of sizes, so if you're shopping for gifts you could consider buying a matching set. Search 'music' and 'bookx' on Amazon (don't forget the 'x').
Similar Products: We publish several password journals with the same interior as this one but with other popular cover designs. Search 'password' and 'bookx' on Amazon.
Continue reading “Password Journal: Password Keeper / Music Gifts ( Internet Address Logbook / Diary / Notebook ) (Password Journals – Music (Carnvial))”
Amazon Price: $60.00 $35.49 You save: $24.51 (41%). (as of August 20, 2019 22:08 –
Secure your ICS and SCADA systems the battle-tested Hacking Exposed™ way
This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating―and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using “ICS safe” methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.
Continue reading “Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions”
Amazon Price: $49.95 $35.50 You save: $14.45 (29%). (as of August 19, 2019 16:57 –
Network security is not simply about building impenetrable walls—determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks—no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.
Continue reading “The Practice of Network Security Monitoring: Understanding Incident Detection and Response”