Skip to main content

Books in Electronic security

Effective Physical Security

  • 5th Edition
  • November 14, 2016
  • Lawrence J. Fennelly
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 6 2 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 9 5 - 7
Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This book contains important coverage of environmental design, security surveys, locks, lighting, and CCTV, the latest ISO standards for risk assessment and risk management, physical security planning, network systems infrastructure, and environmental design.

Lossless Information Hiding in Images

  • 1st Edition
  • November 11, 2016
  • Zhe-Ming Lu + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 2 0 0 6 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 2 1 6 6 - 5
Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that enables images to be authenticated and then restored to their original forms by removing the watermark and replacing overridden images. This book focuses on the lossless information hiding in our most popular media, images, classifying them in three categories, i.e., spatial domain based, transform domain based, and compressed domain based. Furthermore, the compressed domain based methods are classified into VQ based, BTC based, and JPEG/JPEG2000 based.

Physical Security: 150 Things You Should Know

  • 2nd Edition
  • October 27, 2016
  • Lawrence J. Fennelly + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 4 8 7 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 5 1 0 - 2
Physical Security: 150 Things You Should Know, Second Edition is a useful reference for those at any stage of their security career. This practical guide covers the latest technological trends for managing the physical security needs of buildings and campuses of all sizes. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on physical security available. Security practitioners of all levels will find this book easy to use as they look for practical tips to understand and manage the latest physical security technologies, such as biometrics, IP video, video analytics, and mass notification, as well as the latest principles in access control, command and control, perimeter protection, and visitor management.

Handbook of System Safety and Security

  • 1st Edition
  • October 2, 2016
  • Edward Griffor
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 7 7 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 3 8 - 3
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences. Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance.

Audio Content Security

  • 1st Edition
  • July 16, 2016
  • Sogand Ghorbani + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 8 4 - 4
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Insider Threat

  • 1st Edition
  • May 26, 2016
  • Michael G. Gelles
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 4 1 0 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 2 2 - 9
Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former employees. This book outlines a step-by-step path for developing an insider threat program within any organization, focusing on management and employee engagement, as well as ethical, legal, and privacy concerns. In addition, it includes tactics on how to collect, correlate, and visualize potential risk indicators into a seamless system for protecting an organization’s critical assets from malicious, complacent, and ignorant insiders. Insider Threat presents robust mitigation strategies that will interrupt the forward motion of a potential insider who intends to do harm to a company or its employees, as well as an understanding of supply chain risk and cyber security, as they relate to insider threat.

Essential Skills for Hackers

  • 1st Edition
  • December 9, 2015
  • Kevin Cardwell + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 1 1 - 5
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Theoretical and Experimental Methods for Defending Against DDoS Attacks

  • 1st Edition
  • November 10, 2015
  • Iraj Sadegh Amiri + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 9 9 - 7
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

A Study of Black Hole Attack Solutions

  • 1st Edition
  • November 3, 2015
  • Iraj Sadegh Amiri + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 7 9 - 9
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Cyber-Physical Attacks

  • 1st Edition
  • May 21, 2015
  • George Loukas
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 9 0 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 4 6 3 - 9
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.