Skip to main content

Books in Security

111-120 of 613 results in All results

Industrial Network Security

  • 2nd Edition
  • December 9, 2014
  • Eric D. Knapp + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 1 4 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 4 - 2
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.

Augmented Reality Law, Privacy, and Ethics

  • 1st Edition
  • December 9, 2014
  • Brian Wassom
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 0 8 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 5 2 4 - 8
Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position themselves. Another application is Google Glass, which enables users to see AR graphics and information about their location and surroundings on the lenses of their "digital eyewear", changing in real-time as they move about. Augmented Reality Law, Privacy, and Ethics is the first book to examine the social, legal, and ethical issues surrounding AR technology. Digital eyewear products have very recently thrust this rapidly-expanding field into the mainstream, but the technology is so much more than those devices. Industry analysts have dubbed AR the "eighth mass medium" of communications. Science fiction movies have shown us the promise of this technology for decades, and now our capabilities are finally catching up to that vision. Augmented Reality will influence society as fundamentally as the Internet itself has done, and such a powerful medium cannot help but radically affect the laws and norms that govern society. No author is as uniquely qualified to provide a big-picture forecast and guidebook for these developments as Brian Wassom. A practicing attorney, he has been writing on AR law since 2007 and has established himself as the world's foremost thought leader on the intersection of law, ethics, privacy, and AR. Augmented Reality professionals around the world follow his Augmented Legality® blog. This book collects and expands upon the best ideas expressed in that blog, and sets them in the context of a big-picture forecast of how AR is shaping all aspects of society.

Google Earth Forensics

  • 1st Edition
  • December 9, 2014
  • Michael Harrington + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 1 6 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 5 0 4 - 0
Google Earth Forensics is the first book to explain how to use Google Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows how to extract location-based data that can be used to display evidence in compelling audiovisual manners that explain and inform the data in contextual, meaningful, and easy-to-understand ways. As mobile computing devices become more and more prevalent and powerful, they are becoming more and more useful in the field of law enforcement investigations and forensics. Of all the widely used mobile applications, none have more potential for helping solve crimes than those with geo-location tools. Written for investigators and forensic practitioners, Google Earth Forensics is written by an investigator and trainer with more than 13 years of experience in law enforcement who will show you how to use this valuable tool anywhere at the crime scene, in the lab, or in the courtroom.

The Basics of Digital Forensics

  • 2nd Edition
  • December 9, 2014
  • John Sammons
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 6 3 5 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 8 9 2 - 7
The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides the reader with real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness.

Building an Intelligence-Led Security Program

  • 1st Edition
  • December 5, 2014
  • Allan Liska
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 1 4 5 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 7 0 - 9
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.

Introduction to US Cybersecurity Careers

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 2 2 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 4 3 - 1
Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Define and Build an Effective Cyber Threat Intelligence Capability

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • Eric Olson + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 3 0 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 2 - 3
Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

How to Defeat Advanced Malware

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • Simon Crosby
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 3 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 3 - 0
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

How to Attack and Defend Your Website

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • Alejandro Caceres
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 3 2 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 4 - 7
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

A Machine-Learning Approach to Phishing Detection and Defense

  • 1st Edition
  • December 5, 2014
  • O.A. Akanbi + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 9 4 6 - 6
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.