Skip to main content

Books in Security

71-80 of 613 results in All results

Automating Open Source Intelligence

  • 1st Edition
  • December 3, 2015
  • Robert Layton + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 9 1 6 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 9 1 7 - 6
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.

Operating System Forensics

  • 1st Edition
  • November 12, 2015
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 9 4 9 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 6 3 - 4
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Practical Deployment of Cisco Identity Services Engine (ISE)

  • 1st Edition
  • November 12, 2015
  • Andy Richter + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 5 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 5 0 4 - 6
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

Theoretical and Experimental Methods for Defending Against DDoS Attacks

  • 1st Edition
  • November 10, 2015
  • Iraj Sadegh Amiri + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 9 9 - 7
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks.

A Study of Black Hole Attack Solutions

  • 1st Edition
  • November 3, 2015
  • Iraj Sadegh Amiri + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 7 9 - 9
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Traffic Anomaly Detection

  • 1st Edition
  • October 30, 2015
  • Antonio Cuadra-Sánchez + 1 more
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 0 1 2 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 8 0 7 - 2
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".

Thor's OS Xodus

  • 1st Edition
  • October 28, 2015
  • Timothy "Thor" Mullen
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 6 3 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 5 0 6 - 5
Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.

Threat Assessment and Risk Analysis

  • 1st Edition
  • October 27, 2015
  • Gregory Allen + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 4 9 3 - 5
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.

Workplace Safety

  • 1st Edition
  • October 23, 2015
  • Randall W. Ferris + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 7 5 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 9 - 9
Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program. The book offers real-life cases studies on how violence was successfully avoided using the book’s program, and also shows how to recognize and report precursor behaviors that precede violence. In addition, the book demonstrates proven methods for properly, and effectively, responding to violence should it occur, and tactfully managing the aftermath.

Becoming a Global Chief Security Executive Officer

  • 1st Edition
  • October 13, 2015
  • Roland Cloutier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 2 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 1 - 3
Becoming a Global Chief Security Executive Officer provides tangible, proven, and practical approaches to optimizing the security leader’s ability to lead both today’s, and tomorrow’s, multidisciplined security, risk, and privacy function. The need for well-trained and effective executives who focus on business security, risk, and privacy has exponentially increased as the critical underpinnings of today’s businesses rely more and more on their ability to ensure the effective operation and availability of business processes and technology. Cyberattacks, e-crime, intellectual property theft, and operating globally requires sustainable security programs and operations led by executives who cannot only adapt to today’s requirements, but also focus on the future. The book provides foundational and practical methods for creating teams, organizations, services, and operations for today’s—and tomorrow’s—physical and information converged security program, also teaching the principles for alignment to the business, risk management and mitigation strategies, and how to create momentum in business operations protection.