You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for cri...
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer. - Discover the potential of the Smart Grid - Learn in depth about its systems - See its vulnerabilities and how best to protect it
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im
Your one-step guide to understanding industrial cyber security, its control systems, and its operations. About This Book Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices Filled with practical examples to help you secure critical infrastructure systems efficiently A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems Who This Book Is For If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or w...
From three partners at Google Ventures, this is a unique and easy-to-follow five-day process for solving tough business problems and testing new ideas - proven at more than 100 companies. Sprint is a New York Times and Wall Street Journal bestseller. 'Sprint offers a transformative formula for testing ideas that works whether you're at a startup or a large organization' - Eric Ries, author of The Lean Startup 'The genius of Jake Knapp's Sprint is its step-by-step breakdown of what it takes to solve big problems and do work that matters with speed and urgency' - Beth Comstock, Vice Chair of GE 'Game changer' - ***** Reader review 'Amazing book which yielded great practical results' - ***** Re...
In fifty years of prosecuting and defending criminal cases in New York City and elsewhere,Michael F. Armstrong has often dealt with cops. For a single two-year span, as chief counsel to the Knapp Commission, he was charged with investigating them. Based on Armstrong's vivid recollections of this watershed moment in law enforcement accountability—prompted by the New York Times's report on whistleblower cop Frank Serpico—They Wished They Were Honest recreates the dramatic struggles and significance of the Commission and explores the factors that led to its success and the restoration of the NYPD's public image. Serpico's charges against the NYPD encouraged Mayor John Lindsay to appoint pro...
A bold reassessment of what caused the Late Bronze Age collapse In 1177 B.C., marauding groups known only as the "Sea Peoples" invaded Egypt. The pharaoh's army and navy managed to defeat them, but the victory so weakened Egypt that it soon slid into decline, as did most of the surrounding civilizations. After centuries of brilliance, the civilized world of the Bronze Age came to an abrupt and cataclysmic end. Kingdoms fell like dominoes over the course of just a few decades. No more Minoans or Mycenaeans. No more Trojans, Hittites, or Babylonians. The thriving economy and cultures of the late second millennium B.C., which had stretched from Greece to Egypt and Mesopotamia, suddenly ceased t...
View our feature on James Knapp’s State of Decay.Just because you're dead doesn't mean you're useless... A thrilling debut novel of a dystopian future populated by a new breed of zombie They call them revivors-technologically reanimated corpses-and away from the public eye they do humanity's dirtiest work. But FBI agent Nico Wachalowski has stumbled upon a conspiracy involving revivors being custom made to kill-and a startling truth about the existence of these undead slaves.
Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In ""SCADA Security"" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and difficult. We can and should defend our SCADA systems so thoroughly that even our most resourceful enemies tear their hair out and curse the names of our SCADA systems' designers.
A second edition filled with new and improved content, taking your ICS cybersecurity journey to the next level Key Features Architect, design, and build ICS networks with security in mind Perform a variety of security assessments, checks, and verifications Ensure that your security processes are effective, complete, and relevant Book DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. ...