Networks, Security And Complexity: The Role of Public Policy in Critical Infrastructure Protection

Networks, Security And Complexity: The Role of Public Policy in Critical Infrastructure ProtectionThe end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.

Price: $95.00

Click here to buy from Amazon

Cyber Adversary Characterization: Auditing the Hacker Mind

Cyber Adversary Characterization: Auditing the Hacker MindThe wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? “Inside the Mind of a Criminal Hacker” sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind – necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly “know thy enemy” in order to prepare the best defense.

* . The breadth of material in “Inside the Criminal Mind” will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Price: $51.95

Click here to buy from Amazon

Metasploit Toolkit for Penetration Test, Exploit Devel, Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability ResearchThis is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.
By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.

· A November 2004 survey conducted by “CSO Magazine” stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations

· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books

· The book's companion Web site offers all of the working code and exploits contained within the book

Price: $62.95

Click here to buy from Amazon

Security Assessment of SCADA Protocols – A Taxonomy Based Methodology for the Identification of Security Vulnerabilities in SCADA Protocols

Security Assessment of SCADA Protocols - A Taxonomy Based Methodology for the Identification of Security Vulnerabilities in SCADA ProtocolsModern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.

Price: $64.00

Click here to buy from Amazon

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionFully updated expanded to cover the latest devious hacking methods

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.

Gray Hat Hacking, Third Edition features eight new chapters, covering:

  • Social engineering
  • Physical attacks
  • Insider attacks
  • VoIP attacks
  • SCADA attacks
  • Dradis framework and information sharing
  • Client content-based attacks
  • Web server attacks

Detailed, authoritative coverage Introduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware

Price: $60.00

Click here to buy from Amazon