Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.
Автор: Eric D. Knapp Название: Applied Cyber Security and the Smart Grid, ISBN: 1597499986 ISBN-13(EAN): 9781597499989 Издательство: Elsevier Science Рейтинг: Цена: 3866 р. 4296.00-10% Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Описание: Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets.
Описание: Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.Data Warehousing and Data Mining Techniques for Cyber Security contributes to the discipline of security informatics. The author discusses topics that intersect cyber security and data mining, while providing techniques for improving cyber security. Since the cost of information processing and internet accessibility is dropping, an increasing number of organizations are becoming vulnerable to cyber attacks. This volume introduces techniques for applications in the area of retail, finance, and bioinformatics, to name a few.Data Warehousing and Data Mining Techniques for Cyber Security is designed for practitioners and researchers in industry. This book is also suitable for upper-undergraduate and graduate-level students in computer science.
Автор: Mark Talabis Название: Information Security Risk Assessment Toolkit, ISBN: 1597497355 ISBN-13(EAN): 9781597497350 Издательство: Elsevier Science Рейтинг: Цена: 3577 р. 3974.00-10% Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkitgives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.
Автор: John Rittinghouse, PhD, C Название: Wireless Operational Security, ISBN: 1555583172 ISBN-13(EAN): 9781555583170 Издательство: Elsevier Science Рейтинг: Цена: 7008 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless
networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This
includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks.
An even worse scenario is one
where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are
approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which
address them in a practical, operationally-oriented and comprehensive way. "Wireless Operational Security" bridges this gap.
It presents a new 'WISDOM' model for Wireless
Security Infrastructures. It acts as a critical guide to implementing 'Converged Networks' wired/wireless with all necessary security considerations. Rittinghouse's "Cybersecurity
Operations Handbook" is the only se
urity book recommended by the FCC.
Автор: Viega, Jon Messier, Matt Chandra, Pravir Название: Network security with openssl ISBN: 059600270X ISBN-13(EAN): 9780596002701 Издательство: Wiley Рейтинг: Цена: 3343 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume is designed to enable developers to use The OpenSSL library more effectively. It offers guidance on avoiding pitfalls, while taking advantage of the library`s advanced features and provides the information necessary to use OpenSSL safely and effectively.
Описание: Cyber vandalism and identity theft represent enormous threats in a computer-driven world. This timely work focuses on security issues with the intent of increasing the public's awareness of the magnitude of cyber vandalism, the weaknesses and loopholes inherent in the cyberspace infrastructure, and the ways to protect ourselves and our society. The nature and motives behind cyber attacks are investigated, as well as how they are committed and what efforts are being undertaken to prevent further acts from occurring.This edition explores security issues also in the world of social networks. General security protocols and best practices have been updated to reflect changes in the cyber world, and the changing business information security landscape is analysed in detail.
Автор: Xiao Название: Security and Privacy in Smart Grids ISBN: 1439877831 ISBN-13(EAN): 9781439877838 Издательство: Taylor&Francis Рейтинг: Цена: 7105 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areas—making it an ideal reference for students, researchers, and engineers in these fields.The book explains grid security development and deployment and introduces novel approaches for securing today’s smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The book’s chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presents actionable suggestions you can put to use immediately to prevent such attacks.
Описание: Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully explains how to plan for a social engineering test, perform reconnaissance, implement the test, and accurately report the results.
Автор: Misra Название: Android Security ISBN: 1439896461 ISBN-13(EAN): 9781439896464 Издательство: Taylor&Francis Рейтинг: Цена: 5119 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler.The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system, including import directories and files, so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www.androidinsecurity.com. It explains how to crack SecureApp.apk discussed in the text and also makes the application available on its site.The book includes coverage of advanced topics such as reverse engineering and forensics, mobile device pen-testing methodology, malware analysis, secure coding, and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes.The book’s site includes a resource section where readers can access downloads for applications, tools created by users, and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text, wherever needed. Visit www.androidinsecurity.com for more information.
Описание: For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru