Computer security Books
Taylor & Francis Female Offenders and Reentry
Book SynopsisOften, research concerning the female offender is scarce. This book adds to the criminological literature on the topic of reentry for women, focusing on the barriers women face as they return to society and adjust to life after incarceration. Each chapter addresses specific issues, challenges, and obstacles affiliated with the hindrance of successful reentry processes associated with female offenders, as well as data-driven empirical studies.While corrections has often misunderstood or overlooked the needs of returning offenders, the shortcomings of the institutions have a greater impact on women than on their male counterparts, particularly regarding the occurrence of social and medical problems, especially those related to mental health and substance abuse. Female Offenders and Reentry helps criminal justice students and practitioners see the full picture when considering the challenges faced by female offenders reintegrating into society. Trade ReviewFinally—a comprehensive text that covers all aspects of the challenges faced by female offenders in their reentry journeys. Featuring evidence-based research, current demographic and trend data, policy and best practices analyses, and in-depth case studies, this monograph provides insightful examinations of critical gender barriers to societal reintegration—transportation, housing, employment, issues of chronic illness and reproductive health, mental health and substance abuse disorders, and child reunification. —Rosemary Gido, Indiana University of PennsylvaniaThe editors have put together a well-balanced collection of chapters that discuss in depth the multiple problems female ex-offenders face when returning to their communities. This text provides an excellent forum for discussion on the topic of female offenders and reentry that will leave students as well as policy makers and educators thinking about how they can effect change. —Danielle McDonald, Northern Kentucky UniversityIn Female Offenders and Reentry, Carter and Marcum have expertly conveyed the challenges facing women as they work towards reestablishing a life outside of prison. This compelling and comprehensive text is essential to understanding the contemporary female reentry experience. —Ashley G. Blackburn, University of Houston–DowntownTable of ContentsChapter 1: IntroductionCatherine D. Marcum and Lisa M. CarterChapter 2: Transportation IssuesMiriam Northcutt BohmertChapter 3: Physical Health Needs and Treatment for Female Offenders Returning to SocietyValerie R. Anderson and Shabnam JavdaniChapter 4: Mental Health Needs and TreatmentKyle C. Ward and Mary K. EvansCase Study 4A: Female Offenders, Mental Illness, and Recidivism: An Examination of Mental Illness and Substance Use Disorders Among a Sample of Female Parolees Released to the City of Philadelphia Kimberly Houser and Eric S. McCordChapter 5: Women With Substance Use Disorders Reentering the CommunityWendy P. Guastaferro and Laura LutgenCase Study 5A: Women Offenders and Drug Courts: Does Gender Matter?Kimberly Houser and Christine SaumChapter 6: Reproductive Health Needs and TreatmentJennifer Mooney and Aalap BommarajuChapter 7: Educational and Vocational Attainment During ReintegrationLinda Keena and Ashley HluskaChapter 8: Having to Check Yes: The Stigma of a Criminal Record and Other Challenges to Obtaining Meaningful Employment for Released Female OffendersKerry RichmondChapter 9: Centering Women’s Reentry With Safe, Secure, and Affordable HousingFaith Lutze and Jenny LauChapter 10: Reunification With Family and Children During the Reentry ProcessSuzanne M. GodboldtChapter 11: Female Sex Offenders and ReintegrationJennifer Klein and Danielle CooperChapter 12: Making It on the Outside: Reintegration Challenges of Girls and Women of ColorVera Lopez and Lisa PaskoChapter 13: Wrongful ConvictionsKaitlyn Clarke and Philip D. McCormackChapter 14: Future Directions/Best PracticesLindsey VigesaaCase Study 14A: Desistance from Crime During ReintegrationKecia R. Johnson and Dave C. May
£37.99
Springer-Verlag New York Inc. Machine Learning in Cyber Trust
Book SynopsisCyber System.- Cyber-Physical Systems: A New Frontier.- Security.- Misleading Learners: Co-opting Your Spam Filter.- Survey of Machine Learning Methods for Database Security.- Identifying Threats Using Graph-based Anomaly Detection.- On the Performance of Online Learning Methods for Detecting Malicious Executables.- Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems.- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.- Image Encryption and Chaotic Cellular Neural Network.- Privacy.- From Data Privacy to Location Privacy.- Privacy Preserving Nearest Neighbor Search.- Reliability.- High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques.- Model, Properties, and Applications of Context-Aware Web Services.Trade ReviewFrom the reviews: "This is a useful book on machine learning for cyber security applications. It will be helpful to researchers and graduate students who are looking for an introduction to a specific topic in the field. All of the topics covered are well researched. The book consists of 12 chapters, grouped into four parts." (Imad H. Elhajj, ACM Computing Reviews, October, 2009)Table of ContentsCyber System.- Cyber-Physical Systems: A New Frontier.- Security.- Misleading Learners: Co-opting Your Spam Filter.- Survey of Machine Learning Methods for Database Security.- Identifying Threats Using Graph-based Anomaly Detection.- On the Performance of Online Learning Methods for Detecting Malicious Executables.- Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems.- A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.- Image Encryption and Chaotic Cellular Neural Network.- Privacy.- From Data Privacy to Location Privacy.- Privacy Preserving Nearest Neighbor Search.- Reliability.- High-Confidence Compositional Reliability Assessment of SOA-Based Systems Using Machine Learning Techniques.- Model, Properties, and Applications of Context-Aware Web Services.
£125.99
WW Norton & Co Crack99
Book SynopsisThe inside story of the largest digital piracy sting to date.Trade Review"A super-charged, electrifying story. CRACK99 reads like a bestselling thriller!" -- Brad Thor, #1 New York Times bestselling author of Code of Conduct "A gripping and sobering account of the hemorrhage of high-end American computer programs into the Chinese internet black market...A riveting story." -- Dennis Blair, former director of national intelligence and co-chairman, Intellectual Property Commission "A rollicking true tale of high-level undercover cyber espionage in which Hall puts every bit of his extensive experience and investigative skills into catching a cyber-pirate. His stories of teaming with Homeland Security agents to double-cross a Chinese cyber criminal are, in a word, sensational." -- Retired FBI Special Agent Robert K. Wittman, author of Priceless: How I Went Undercover to Rescue the World's Stolen Treasures
£18.99
WW Norton & Co CRACK99
Book SynopsisThe inside story of the largest digital piracy sting to date.Trade Review"A crackling good tale, well-told in Hall's confiding, thoughtful, and humorous tone." -- Eloise Kinney - Booklist "A quirky tale of international pursuit through a legal labyrinth with unsettling implications regarding proliferation of ominous technologies." -- Kirkus Reviews "A super-charged, electrifying story. CRACK99 reads like a bestselling thriller!" -- Brad Thor, #1 New York Times bestselling author of Code of Conduct "A gripping and sobering account of the hemorrhage of high-end American computer programs into the Chinese internet black market...A riveting story." -- Dennis Blair, former director of national intelligence and co-chairman, Intellectual Property Commission "A rollicking true tale of high-level undercover cyber espionage in which Hall puts every bit of his extensive experience and investigative skills into catching a cyber-pirate. His stories of teaming with Homeland Security agents to double-cross a Chinese cyber criminal are, in a word, sensational." -- Retired FBI Special Agent Robert K. Wittman, author of Priceless: How I Went Undercover to Rescue the World's Stolen Treasures
£12.34
WW Norton & Co A Hackers Mind
Book SynopsisIt's not just computers—hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world.Trade Review"A Hacker's Mind… sheds vital light on the beginnings of our journey into an increasingly complex world." -- Becky Hogge - Financial Times"Schneier sees everything from tax avoidance to electoral gerrymandering as hacking and suggests that the hackers we should worry about are not teenagers in hooded sweatshirts, but accountants, lawyers and lobbyists in suits. " -- Ethan Zuckerman - Prospect"An essential new perspective on hacking: the bad and the ugly, but also a surprisingly optimistic way of using a hacker mentality to solve society’s complex problems." -- Marietje Schaake, international policy director at Stanford University Cyber Policy Centre and member of European Parliament, 2009–2019"A Hacker’s Mind brilliantly explains how our society and democracy are being shaped by people taking the ‘hacking’ mentality into realms that weren’t designed to be hacked. Bruce Schneier shows how hacking, the tool of the rebel and the outsider, can also be used by the rich and powerful to win in business and politics, at great cost to the civic commitment needed for our free society. A great read and an important book!" -- Timothy H. Edgar, author of Beyond Snowden"They say that rules are made to be broken, but more often rules are gamed, finessed, worked around, or subverted—in short, hacked. No one is better equipped than Bruce Schneier to explain how this often-perverse use of human ingenuity can undermine the institutions that civilized life depends on. A Hacker’s Mind is an important source of new insights on the forces that can sap the vigor and integrity of modern society." -- Steven Pinker, Johnstone Family Professor of Psychology, Harvard University, and author of Rationality
£21.59
Wiley Information Security Governance
Book SynopsisThis book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance.Table of ContentsINTRODUCTION. CHAPTER 1: GOVERNANCE OVERVIEW. 1.1 What Is It? 1.2 Back to Basics. 1.3 Origins of Governance. 1.4 Governance Definition. 1.5 Information Security Governance. 1.6 Six Outcomes of Effective Security Governance. 1.7 Defining Information, Data, Knowledge. 1.8 Value of Information. CHAPTER 2: WHY GOVERNANCE? 2.1 Benefits of Good Governance. 2.1.1 Aligning Security with Business Objectives. 2.1.2 Providing the structure and framework to optimize allocations of limited resources. 2.1.3 Providing assurance that critical decisions are not based on faulty information. 2.1.4 Ensuring accountability for safeguarding critical assets. 2.1.5 Increasing trust of customers and stakeholders. 2.1.6 Increasing the company’s worth. 2.1.7 Reducing liability for information inaccuracy or lack of due care in protection. 2.1.8 Increasing predictability and reducing uncertainty of business operations. 2.2 A Management Problem. CHAPTER 3: LEGAL AND REGULATORY REQUIREMENTS. 3.1 Security Governance and Regulation. CHAPTER 4: ROLES & RESPONSIBILITIES. 4.1 The Board of Directors. 4.2 Executive Management. 4.3 Security Steering Committee. 4.4 The CISCO. CHAPTER: STRATEGIC METRICS. 5.1 Governance Objectives. 5.1.1 Strategic Direction. 5.1.2 Ensuring Objectives are Achieved. 5.1.3. Risks Managed Appropriately. 5.1.4 Verifying Resources are Used Responsibly. CHAPTER 6: INFORMATION SECURITY OUTCOMES. 6.1 Defining Outcomes. 6.1.1 Strategic alignment. 6.1.2 Risk Management. 6.1.3 Business process assurance / convergence. 6.1.4 Value delivery. 6.1.5 Resource management. 6.1.6 Performance measurement. CHAPTER 7: SECURITY GOVERNANCE OBJECTIVES. 7.1 Security Architecture. 7.1.1 Managing Complexity. 7.1.2 Providing a Framework & Road Map. 7.1.3 Simplicity & Clarity through Layering & Modularisation. 7.1.4 Business Focus beyond the Technical Domain. 7.1.5 Objectives of Information Security Architectures. 7.1.6 SABSA Framework for Security Service Management. 7.1.7 SABSA Development Process. 7.1.8 SABSA Lifecycle. 7.1.9 SABSA Attributes. 7.2 COBIT. 7.3 Capability Maturity Model. 7.4 ISO/IEC 27001/ 27002. 7.4.1 ISO 27001. 7.4.2 ISO 27002. 7.5 Other Approaches. 7.5.1 National Cybersecurity Task Force. CHAPTER 8: RISK MANAGEMENT OBJECTIVES. Risk Management Responsibilities. Managing Risk Appropriately. 8.1 Determining Risk Management Objectives. 8.1.1 Recovery Time Objectives. CHAPTER 9: CURRENT STATE. 9.1 Current State of Security. 9.2 Current State of Risk Management. 9.3 Gap Analysis - Unmitigated Risk. 9.3.1 SABSA. 9.3.2 CMM. CHAPTER 10: DEVELOPING A SECURITY STRATEGY. 10.1 Failures of Strategy. 10.2 Attributes of A Good Security Strategy. 10.3 Strategy Resources. 10.3.1 Utilizing Architecture for Strategy Development. 10.3.2 Using Cobit for Strategy Development. 10.3.3 Using CMM for Strategy Development. 10.4 STRATEGY CONSTRAINTS. 10.4.1 Contextual constraints. 10.4.2 Operational constraints. CHAPTER 11: SAMPLE STRATEGY DEVELOPMENT. 11.1 The Process. CHAPTER 12: IMPLEMENTING STRATEGY. Action Plan Intermediate Goals. Action Plan Metrics. Re-engineering. Inadequate Performance. 12.1 Elements Of Strategy. 12.1.1 Policy Development. Attributes of Good Policies. Sample Policy Development. Other Policies. 12.1.2 Standards. Attributes of Good Standards. Sample Standards. Classifications. Standard Statement. CHAPTER 13: SECURITY PROGRAM DEVELOPMENT METRICS. 13.1 Information Security Program Development Metrics. 13.2 Program Development Operational Metrics. CHAPTER 14: INFORMATION SECURITY MANAGEMENT METRICS. 14.1 Management Metrics. 14.2 Security Management Decision Support Metrics. 14.4 CISO Decisions. 14.2.1 Strategic alignment. 14.2.2 Risk Management. 14.2.3 Metrics for Risk Management. 14.2.4 Assurance Process Integration. 14.2.5 Value Delivery. 14.2.6 Resource Management. 14.2.7 Performance Measurement. 14.7 Information Security Operational Metrics. 14.3.1 IT and Information Security Management. 14.3.2 Compliance Metrics. CHAPTER 15: INCIDENT MANAGEMENT AND RESPONSE METRICS. 15.1 Incident Management Decision Support Metrics. Conclusion. Appendix A. SABSA Business Attributes & Metrics. Appendix B. Cultural Worldviews. Heirarchists. Egalitarians. Individualists. Fatalists.
£77.36
John Wiley & Sons Inc eDiscovery for Dummies
Book SynopsisDiscover the process of e-discovery and put good practices in place. Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information.Table of ContentsIntroduction 1 Who Should Read This Book? 1 About This Book 2 What You’re Not to Read 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: Examining e-Discovery and ESI Essentials 3 Part II: Guidelines for e-Discovery and Professional Competence 3 Part III: Identifying, Preserving, and Collecting ESI 4 Part IV: Processing, Protecting, and Producing ESI 4 Part V: Getting Litigation Ready 4 Part VI: Strategizing for e-Discovery Success 5 Part VII: The Part of Tens 5 Glossary 5 Icons Used in This Book 5 Where to Go from Here 6 Part I: Examining e-Discovery and ESI Essentials 7 Chapter 1: Knowing Why e-Discovery Is a Burning Issue 9 Getting Thrust into the Biggest Change in the Litigation 10 New rules put electronic documents under a microscope 11 New rules and case law expand professional responsibilities 12 Distinguishing Electronic Documents from Paper Documents 14 ESI has more volume 15 ESI is more complex 15 ESI is more fragile 16 ESI is harder to delete 17 ESI is more software and hardware dependent 18 Viewing the Litigation Process from 1,000 Feet 18 Examining e-Discovery Processes 20 Creating and retaining electronic records 20 Identifying, preserving, and collecting data relevant to a legal matter 21 Processing and filtering to remove the excess 22 Reviewing and analyzing for privilege 22 Producing what’s required 23 Clawing back what sneaked out 23 Presenting at trial 24 Chapter 2: Taking a Close Look at Electronically Stored Information (ESI) 25 Spotting the ESI in the Game Plan 26 Viewing the Life of Electronic Information 27 Accounting for age 27 Tracking the rise and fall of an e-mail 29 Understanding Zubulake I 30 Taking the two-tier test 34 Preserving the Digital Landscape 36 Facing Sticker Shock: What ESI Costs 37 Estimating hard and hidden costs 39 Looking at the costs of being surprised by a request 40 Chapter 3: Building e-Discovery Best Practices into Your Company 43 Setting Up a Reasonable Defensive Strategy 44 Heeding judicial advice 45 Keeping ESI intact and in-reach 46 Braking for Litigation Holds 48 Insuring a stronghold 48 Getting others to buy-in 49 Holding on tight to your ESI 50 Putting Best Practices into Place 51 Forming Response Teams 54 Putting Project Management into Practice 55 Tackling the triple constraints 56 Managing the critical path 57 Maintaining Ethical Conduct and Credibility 57 Part II: Guidelines for e-Discovery and Professional Competence 59 Chapter 4: The Playbook: Federal Rules and Advisory Guidelines 61 Knowing the Rules You Must Play By 62 Deciphering the FRCP 63 FRCP 1 63 FRCP 16 63 FRCP 26 65 FRCP 33 and 34 66 Applying the Rules to Criminal Cases 66 F.R. Crim. P. Rule 41 71 F. R. Crim. P. Rule 16 71 F. R. Crim. P. Rule 17 and 17.1 71 Learning about Admissibility 71 Lessening the Need for Judicial Intervention by Cooperation 73 Limiting e-Discovery 74 Finding Out About Sanctions 75 Rulings on Metadata 77 Getting Guidance but Not Authority from Sedona Think Tanks 79 Collecting the Wisdom of the Chief Justices and National Law Conference 79 Minding the e-Discovery Reference Model 80 Following the Federal Rules Advisory Committee 81 Chapter 5: Judging Professional Competence and Conduct 83 Making Sure Your Attorney Gives a Diligent Effort 84 Looking at what constitutes a diligent effort 84 Searching for evidence 85 Producing ESI 86 Providing a certification 86 Avoiding Being Sanctioned 87 FRCP sanctions 87 Inherent power sanctions 89 Knowing the Risks Introduced by Legal Counsel 91 Acting bad: Attorney e-discovery misconduct 91 Relying on the American Bar Association and state rules of professional conduct 93 Learning from Those Who Gambled Their Cases and Lost 94 Policing e-Discovery in Criminal Cases 96 Part III: Identifying, Preserving, and Collecting ESI 99 Chapter 6: Identifying Potentially Relevant ESI 101 Calling an e-Discovery Team into Action 102 Clarifying the Scope of e-Discovery 104 Reducing the Burden with the Proportionality Principle 107 Proportionality of scale 107 Negotiating with proportionality 108 Mapping the Information Architecture 108 Creating a data map 108 Overlooking ESI 111 Describing data retention policies and procedures 112 Proving the reasonable accessibility of ESI sources 113 Taking Lessons from the Mythical Member 113 Chapter 7: Complying with ESI Preservation and a Litigation Hold 115 Distinguishing Duty to Preserve from Preservation 116 Following The Sedona Conference 116 The Sedona Conference WG1 guidelines 117 Seeing the rules in the WG1 decision tree 119 Recognizing a Litigation Hold Order and Obligation 119 Knowing what triggers a litigation hold 120 Knowing when to issue a litigation hold 120 Knowing when a hold delay makes you eligible for sanctions 122 Accounting for downsizing and departing employees 122 Throwing a Wrench into Digital Recycling 123 Suspending destructive processes 123 Where do you put a terabyte? 124 Implementing the Litigation Hold 125 Documenting that custodians are in compliance 127 Rounding up what needs to be collected 127 Judging whether a forensics-level preservation is needed 130 Chapter 8: Managing e-Discovery Conferences and Protocols 133 Complying with the Meet-and-Confer Session 133 Preparing for the Meet-and-Confer Session 136 Preservation of evidence 136 Form of production 137 Privileged or protected ESI 138 Any other issues regarding ESI 139 Agreeing on a Timetable 139 Selecting a Rule 30(b)(6) Witness 140 Finding Out You and the Opposing Party May Have Mutual Interests 141 Part IV: Processing, Protecting, and Producing ESI 143 Chapter 9: Processing, Filtering, and Reviewing ESI 145 Planning, Tagging, and Bagging 146 Taking a finely tuned approach 147 Finding exactly what you need 147 Stop and identify yourself 149 Two wrongs and a right 150 Learning through Trial and Error 151 Doing Early Case Assessment 152 Vetting vendors 153 Breaking Out the ESI 154 Crafting the Hunt 156 Deciding on filters 156 Keyword or phrase searching 157 Deduping 157 Concept searching 158 Heeding the Grimm roadmap 158 Sampling to Validate 159 Testing the validity of the search 159 Documenting sampling efforts 160 Doing the Review 161 Choosing a review platform 161 How to perform a review 163 Chapter 10: Protecting Privilege, Privacy, and Work Product 165 Facing the Rising Tide of Electronic Information 166 Respecting the Rules of the e-Discovery Game 166 Targeting relevant information 167 Seeing where relevance and privilege intersect 168 Managing e-discovery of confidential information 170 Listening to the Masters 172 Getting or Avoiding a Waiver 172 Asserting a claim 173 Preparing a privilege log 173 Responding to ESI disclosure 175 Applying FRE 502 to disclosure 175 Leveling the Playing Field through Agreement 177 Checking out the types of agreements 177 Shoring up your agreements by court order 178 Chapter 11: Producing and Releasing Responsive ESI 181 Producing Data Sets 182 Packing bytes 183 Staging production 184 Being alert to native production motions 185 Redacting prior to disclosure 187 Providing Detailed Documentation 190 Showing an Unbroken Chain of Custody 192 Keeping Metadata Intact 193 Part V: Getting Litigation Ready 199 Chapter 12: Dealing with Evidentiary Issues and Challenges 201 Looking at the Roles of the Judge and Jury 202 Qualifying an Expert 202 Getting Through the Five Hurdles of Admissibility 204 Admitting Relevant ESI 204 Authenticating ESI 205 Self-authenticating ESI 206 Following the chain of custody 206 Authenticating specific types of ESI 207 Analyzing the Hearsay Rule 208 Providing the Best Evidence 210 Probing the Value of the ESI 210 Chapter 13: Bringing In Special Forces: Computer Forensics 211 Powering Up Computer Forensics 212 Knowing when to hire an expert 212 Knowing what to expect from an expert 214 Judging an expert like judges do 214 Doing a Scientific Forensic Search 215 Testing, Sampling, and Refining Searches for ESI 216 Applying C-Forensics to e-Discovery 218 Following procedure 219 Preparing for an investigation 220 Acquiring and preserving the image 222 Authenticating with hash 223 Recovering deleted ESI 224 Analyzing to broaden or limit 225 Expressing in Boolean 226 Producing and documenting in detail 228 Reinforcing E-Discovery 229 Fighting against forensic fishing attempts 229 Fighting with forensics on your team 230 Defending In-Depth 231 Part VI: Strategizing for e-Discovery Success 233 Chapter 14: Managing and Archiving Business Records 235 Ratcheting Up IT’s Role in Prelitigation 236 Laying the cornerstone of ERM 236 Pitching your tent before the storm 237 Telling Documents and Business Records Apart 238 Designing a Defensible ERM Program 240 Designing by committee 240 Starting with the basics 240 Getting management on board with your ERM program 242 Crafting a risk-reducing policy 244 Punching up your e-mail policy 245 Building an ERM Program 246 Kicking the keep-it-all habit 248 Doing what you say you are 248 Getting an A+ in Compliance 249 Chapter 15: Viewing e-Discovery Law from the Bench 251 Examining Unsettled and Unsettling Issues 252 Applying a reasonableness standard 252 Forcing cooperation 253 Looking at what’s reasonably accessible 254 Determining who committed misconduct 254 Exploring the Role of the Judge 258 Actively participating 258 Scheduling conferences 259 Appointing experts 259 Determining the scope of costs 262 Chapter 16: e-Discovery for Large-Scale and Complex Litigation 263 Preparing for Complex Litigation 263 Ensuring quality control 265 Getting a project management process in place 266 Proving the merits of a case by using ESI 266 Educating the Court about Your ESI 267 Using summary judgment and other tools 268 Employing an identification system 268 Form of production 269 Creating document depositories 269 Avoiding Judicial Resolution 270 Determining the Scope of Accessibility 271 Doing a good-cause inquiry 272 Cost-shifting 273 Getting Help 274 Partnering with vendors or service providers 274 Selecting experts or consulting companies 274 Chapter 17: e-Discovery for Small Cases 277 Defining Small Cases that Can Benefit from e-Discovery 278 Theft of proprietary data and breaches of contract 278 Marital matters 278 Defamation and Internet defamation 279 Characterizing Small Matters 280 Keeping ESI out of evidence 280 Shared characteristics with large cases 281 Unique characteristics and dynamics 282 Proceeding in Small Cases 283 Curbing e-Discovery with Proportionality 286 Sleuthing Personal Correspondence and Files 286 Part VII: The Part of Tens 289 Chapter 18: Ten Most Important e-Discovery Rules 291 FRCP 26(b)(2)(B) Specific Limitations on ESI 291 FRCP 26(b)(5)(B) Protecting Trial-Preparation Materials and Clawback 292 FRCP 26(a)(1)(C) Time for Pretrial Disclosures; Objections 293 FRCP 26(f) Conference of the Parties; Planning for Discovery 294 FRCP 26(g) Signing Disclosures and Discovery Requests, Responses, and Objections 294 FRCP 30(b)(6) Designation of a Witness 295 FRCP 34(b) Form of Production 296 FRCP 37(e) Safe Harbor from Sanctions for Loss of ESI 297 Federal Rules of Evidence 502(b) Inadvertent Disclosure 298 Federal Rule of Evidence 901 Requirement of Authentication or Identification 298 Chapter 19: Ten Ways to Keep an Edge on Your e-Discovery Expertise 301 The Sedona Conference and Working Group Series 302 Discovery Resources 303 Law Technology News 303 Electronic Discovery Law 304 E-Discovery Team Blog 304 LexisNexis Applied Discovery Online Law Library 305 American Bar Association Journal 305 Legal Technology’s Electronic Data Discovery 306 Supreme Court of the United States 306 Cornell Law School Legal Information Institute and Wex 307 Chapter 20: Ten e-Discovery Cases with Really Good Lessons 309 Zubulake v. UBS Warburg, 2003–2005; Employment Discrimination 309 Qualcomm v. Broadcom, 2008; Patent Dispute 310 Victor Stanley, Inc. v. Creative Pipe, Inc., 2008; Copyright Infringement 311 Doe v. Norwalk Community College, 2007; the Safe Harbor of FRCP Rule 37(e) 312 United States v. O’keefe, 2008; Criminal Case Involving e-discovery 313 Lorraine v. Markel American Insurance Co., 2007; Insurance Dispute 314 Mancia v. Mayflower Textile Services Co., et al., 2008; the Duty of Cooperate and FRCP Rule 26(g) 315 Mikron Industries Inc. v. Hurd Windows & Doors Inc., 2008; Duty to Confer 316 Gross Construction Associates, Inc., v. American Mfrs. Mutual Ins Co., 2009; Keyword Searches 317 Gutman v. Klein, 2008; Termination Sanction and Spoliation 318 Glossary 321 Index 333
£19.19
John Wiley & Sons Inc Computer Security
Book SynopsisA completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security.Table of ContentsPreface xvii CHAPTER 1 – History of Computer Security 1 1.1 The Dawn of Computer Security 2 1.2 1970s – Mainframes 3 1.3 1980s – Personal Computers 4 1.4 1990s – Internet 6 1.5 2000s – The Web 8 1.6 Conclusions – The Benefits of Hindsight 10 1.7 Exercises 11 CHAPTER 2 – Managing Security 13 2.1 Attacks and Attackers 14 2.2 Security Management 15 2.3 Risk and Threat Analysis 21 2.4 Further Reading 29 2.5 Exercises 29 CHAPTER 3 – Foundations of Computer Security 31 3.1 Definitions 32 3.2 The Fundamental Dilemma of Computer Security 40 3.3 Data vs Information 40 3.4 Principles of Computer Security 41 3.5 The Layer Below 45 3.6 The Layer Above 47 3.7 Further Reading 47 3.8 Exercises 48 CHAPTER 4 – Identification and Authentication 49 4.1 Username and Password 50 4.2 Bootstrapping Password Protection 51 4.3 Guessing Passwords 52 4.4 Phishing, Spoofing, and Social Engineering 54 4.5 Protecting the Password File 56 4.6 Single Sign-on 58 4.7 Alternative Approaches 59 4.8 Further Reading 63 4.9 Exercises 63 CHAPTER 5 – Access Control 65 5.1 Background 66 5.2 Authentication and Authorization 66 5.3 Access Operations 68 5.4 Access Control Structures 71 5.5 Ownership 73 5.6 Intermediate Controls 74 5.7 Policy Instantiation 79 5.8 Comparing Security Attributes 79 5.9 Further Reading 84 5.10 Exercises 84 CHAPTER 6 – Reference Monitors 87 6.1 Introduction 88 6.2 Operating System Integrity 90 6.3 Hardware Security Features 91 6.4 Protecting Memory 99 6.5 Further Reading 103 6.6 Exercises 104 CHAPTER 7 – Unix Security 107 7.1 Introduction 108 7.2 Principals 109 7.3 Subjects 111 7.4 Objects 113 7.5 Access Control 116 7.6 Instances of General Security Principles 119 7.7 Management Issues 125 7.8 Further Reading 128 7.9 Exercises 128 CHAPTER 8 – Windows Security 131 8.1 Introduction 132 8.2 Components of Access Control 135 8.3 Access Decisions 142 8.4 Managing Policies 145 8.5 Task-Dependent Access Rights 147 8.6 Administration 150 8.7 Further Reading 153 8.8 Exercises 153 CHAPTER 9 – Database Security 155 9.1 Introduction 156 9.2 Relational Databases 158 9.3 Access Control 162 9.4 Statistical Database Security 167 9.5 Integration with the Operating System 172 9.6 Privacy 173 9.7 Further Reading 175 9.8 Exercises 175 CHAPTER 10 – Software Security 177 10.1 Introduction 178 10.2 Characters and Numbers 179 10.3 Canonical Representations 183 10.4 Memory Management 184 10.5 Data and Code 191 10.6 Race Conditions 193 10.7 Defences 194 10.8 Further Reading 201 10.9 Exercises 202 CHAPTER 11 – Bell–LaPadula Model 205 11.1 State Machine Models 206 11.2 The Bell–LaPadula Model 206 11.3 The Multics Interpretation of BLP 212 11.4 Further Reading 216 11.5 Exercises 216 CHAPTER 12 – Security Models 219 12.1 The Biba Model 220 12.2 Chinese Wall Model 221 12.3 The Clark–Wilson Model 223 12.4 The Harrison–Ruzzo–Ullman Model 225 12.5 Information-Flow Models 228 12.6 Execution Monitors 230 12.7 Further Reading 232 12.8 Exercises 233 CHAPTER 13 – Security Evaluation 235 13.1 Introduction 236 13.2 The Orange Book 239 13.3 The Rainbow Series 241 13.4 Information Technology Security Evaluation Criteria 242 13.5 The Federal Criteria 243 13.6 The Common Criteria 243 13.7 Quality Standards 246 13.8 An Effort Well Spent? 247 13.9 Summary 248 13.10 Further Reading 248 13.11 Exercises 249 CHAPTER 14 – Cryptography 251 14.1 Introduction 252 14.2 Modular Arithmetic 256 14.3 Integrity Check Functions 257 14.4 Digital Signatures 260 14.5 Encryption 264 14.6 Strength of Mechanisms 270 14.7 Performance 271 14.8 Further Reading 272 14.9 Exercises 273 CHAPTER 15 – Key Establishment 275 15.1 Introduction 276 15.2 Key Establishment and Authentication 276 15.3 Key Establishment Protocols 279 15.4 Kerberos 283 15.5 Public-Key Infrastructures 288 15.6 Trusted Computing – Attestation 293 15.7 Further Reading 295 15.8 Exercises 295 CHAPTER 16 – Communications Security 297 16.1 Introduction 298 16.2 Protocol Design Principles 299 16.3 IP Security 301 16.4 IPsec and Network Address Translation 308 16.5 SSL/TLS 310 16.6 Extensible Authentication Protocol 314 16.7 Further Reading 316 16.8 Exercises 316 CHAPTER 17 – Network Security 319 17.1 Introduction 320 17.2 Domain Name System 322 17.3 Firewalls 328 17.4 Intrusion Detection 332 17.5 Further Reading 335 17.6 Exercises 336 CHAPTER 18 – Web Security 339 18.1 Introduction 340 18.2 Authenticated Sessions 342 18.3 Code Origin Policies 346 18.4 Cross-Site Scripting 347 18.5 Cross-Site Request Forgery 350 18.6 JavaScript Hijacking 352 18.7 Web Services Security 354 18.8 Further Reading 360 18.9 Exercises 361 CHAPTER 19 – Mobility 363 19.1 Introduction 364 19.2 GSM 364 19.3 UMTS 369 19.4 Mobile IPv6 Security 372 19.5 WLAN 377 19.6 Bluetooth 381 19.7 Further Reading 383 19.8 Exercises 383 CHAPTER 20 – New Access Control Paradigms 385 20.1 Introduction 386 20.2 SPKI 388 20.3 Trust Management 390 20.4 Code-Based Access Control 391 20.5 Java Security 395 20.6 .NET Security Framework 400 20.7 Digital Rights Management 405 20.8 Further Reading 406 20.9 Exercises 406 Bibliography 409 Index 423
£48.56
John Wiley & Sons Inc EnCase Computer Forensics The Official EnCE
Book SynopsisThe official, Guidance Software-approved book on the newest EnCE exam! The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software''s EnCase Forensic 7. The only official Guidance-endorsed study guide on the topic, this book prepares you for the exam with extensive coverage of all exam topics, real-world scenarios, hands-on exercises, up-to-date legal information, and sample evidence files, flashcards, and more. Guides readers through preparation for the newest EnCase Certified Examiner (EnCE) exam Prepares candidates for both Phase 1 and Phase 2 of the exam, as well as for practical use of the certification Covers identifying and searching hardware and files systems, handling evidence on the scene, and acquiring digital evidence using EnCase Forensic 7 Includes hands-on exercises, practice questions, and up-to-date legal informTable of ContentsIntroduction xxi Assessment Test xxvii Chapter 1 Computer Hardware 1 Computer Hardware Components 2 The Boot Process 14 Partitions 20 File Systems 25 Summary 27 Exam Essentials 27 Review Questions 28 Chapter 2 File Systems 33 FAT Basics 34 The Physical Layout of FAT 36 Viewing Directory Entries Using EnCase 52 The Function of FAT 58 NTFS Basics 73 CD File Systems 77 exFAT 79 Summary 83 Exam Essentials 84 Review Questions 85 Chapter 3 First Response 89 Planning and Preparation 90 The Physical Location 91 Personnel 91 Computer Systems 92 What to Take with You Before You Leave 94 Search Authority 97 Handling Evidence at the Scene 98 Securing the Scene 98 Recording and Photographing the Scene 99 Seizing Computer Evidence 99 Bagging and Tagging 110 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 4 Acquiring Digital Evidence 119 Creating EnCase Forensic Boot Disks 121 Booting a Computer Using the EnCase Boot Disk 124 Seeing Invisible HPA and DCO Data 125 Other Reasons for Using a DOS Boot 126 Steps for Using a DOS Boot 126 Drive-to-Drive DOS Acquisition 128 Steps for Drive-to-Drive DOS Acquisition 128 Supplemental Information About Drive-to-Drive DOS Acquisition 132 Network Acquisitions 135 Reasons to Use Network Acquisitions 135 Understanding Network Cables 136 Preparing an EnCase Network Boot Disk 137 Preparing an EnCase Network Boot CD 138 Steps for Network Acquisition 138 FastBloc/Tableau Acquisitions 151 Available FastBloc Models 151 FastBloc 2 Features 152 Steps for Tableau (FastBloc) Acquisition 154 FastBloc SE Acquisitions 163 About FastBloc SE 163 Steps for FastBloc SE Acquisitions 164 LinEn Acquisitions 168 Mounting a File System as Read-Only 168 Updating a Linux Boot CD with the Latest Version of LinEn 169 Running LinEn 171 Steps for LinEn Acquisition 173 Enterprise and FIM Acquisitions 176 EnCase Portable 180 Helpful Hints 188 Summary 189 Exam Essentials 192 Review Questions 194 Chapter 5 EnCase Concepts 199 EnCase Evidence File Format 200 CRC, MD5, and SHA-1 201 Evidence File Components and Function 202 New Evidence File Format 206 Evidence File Verification 207 Hashing Disks and Volumes 215 EnCase Case Files 217 EnCase Backup Utility 220 EnCase Configuration Files 227 Evidence Cache Folder 231 Summary 233 Exam Essentials 235 Review Questions 236 Chapter 6 EnCase Environment 241 Home Screen 242 EnCase Layout 246 Creating a Case 249 Tree Pane Navigation 255 Table Pane Navigation 266 Table View 266 Gallery View 275 Timeline View 277 Disk View 280 View Pane Navigation 284 Text View 284 Hex View 287 Picture View 288 Report View 289 Doc View 289 Transcript View 290 File Extents View 291 Permissions View 291 Decode View 292 Field View 294 Lock Option 294 Dixon Box 294 Navigation Data (GPS) 295 Find Feature 297 Other Views and Tools 298 Conditions and Filters 298 EnScript 299 Text Styles 299 Adjusting Panes 300 Other Views 306 Global Views and Settings 306 EnCase Options 310 Summary 318 Exam Essentials 320 Review Questions 321 Chapter 7 Understanding, Searching For, and Bookmarking Data 325 Understanding Data 327 Binary Numbers 327 Hexadecimal 333 Characters 336 ASCII 337 Unicode 338 EnCase Evidence Processor 340 Searching for Data 352 Creating Keywords 353 GREP Keywords 364 Starting a Search 373 Viewing Search Hits and Bookmarking Your Findings 376 Bookmarking 377 Summary 426 Exam Essentials 428 Review Questions 430 Chapter 8 File Signature Analysis and Hash Analysis 435 File Signature Analysis 436 Understanding Application Binding 437 Creating a New File Signature 438 Conducting a File Signature Analysis 442 Hash Analysis 449 MD5 Hash 449 Hash Sets and Hash Libraries 449 Hash Analysis 462 Summary 466 Exam Essentials 468 Review Questions 469 Chapter 9 Windows Operating System Artifacts 473 Dates and Times 475 Time Zones 475 Windows 64-Bit Time Stamp 476 Adjusting for Time Zone Offsets 481 Recycle Bin 487 Details of Recycle Bin Operation 488 The INFO2 File 488 Determining the Owner of Files in the Recycle Bin 493 Files Restored or Deleted from the Recycle Bin 494 Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files 496 Recycle Bin Bypass 498 Windows Vista/Windows 7 Recycle Bin 500 Link Files 504 Changing the Properties of a Shortcut 504 Forensic Importance of Link Files 505 Using the Link File Parser 509 Windows Folders 511 Recent Folder 515 Desktop Folder 516 My Documents/Documents 518 Send To Folder 518 Temp Folder 519 Favorites Folder 520 Windows Vista Low Folders 521 Cookies Folder 523 History Folder 526 Temporary Internet Files 532 Swap File 535 Hibernation File 536 Print Spooling 537 Legacy Operating System Artifacts 543 Windows Volume Shadow Copy 544 Windows Event Logs 549 Kinds of Information Available in Event Logs 549 Determining Levels of Auditing 552 Windows Vista/7 Event Logs 554 Using the Windows Event Log Parser 555 For More Information 558 Summary 559 Exam Essentials 564 Review Questions 566 Chapter 10 Advanced EnCase 571 Locating and Mounting Partitions 573 Mounting Files 588 Registry 595 Registry History 595 Registry Organization and Terminology 596 Using EnCase to Mount and View the Registry 601 Registry Research Techniques 605 EnScript and Filters 608 Running EnScripts 609 Filters and Conditions 611 Email 614 Base64 Encoding 619 EnCase Decryption Suite 622 Virtual File System (VFS) 629 Restoration 633 Physical Disk Emulator (PDE) 636 Putting It All Together 641 Summary 645 Exam Essentials 648 Review Questions 649 Appendix A Answers to Review Questions 653 Chapter 1: Computer Hardware 654 Chapter 2: File Systems 655 Chapter 3: First Response 657 Chapter 4: Acquiring Digital Evidence 658 Chapter 5: EnCase Concepts 659 Chapter 6: EnCase Environment 661 Chapter 7: Understanding, Searching For, and Bookmarking Data 662 Chapter 8: File Signature Analysis and Hash Analysis 663 Chapter 9: Windows Operating System Artifacts 664 Chapter 10: Advanced EnCase 665 Appendix B Creating Paperless Reports 667 Exporting the Web Page Report 669 Creating Your Container Report 671 Bookmarks and Hyperlinks 675 Burning the Report to CD or DVD 678 Appendix C About the Additional Study Tools 681 Additional Study Tools 682 Sybex Test Engine 682 Electronic Flashcards 682 PDF of Glossary of Terms 682 Adobe Reader 682 Additional Author Files 683 System Requirements 683 Using the Study Tools 683 Troubleshooting 683 Customer Care 684 Index 685
£41.25
University of California Press Pacifying the Homeland Intelligence Fusion and
Book SynopsisThe United States has poured over a billion dollars into a network of interagency intelligence centers called fusion centers. These centers were ostensibly set up to prevent terrorism, but politicians, the press, and policy advocates have criticized them for failing on this account. So why do these security systems persist? Pacifying the Homeland travels inside the secret world of intelligence fusion, looks beyond the apparent failure of fusion centers, and reveals a broader shift away from mass incarceration and toward a more surveillance- and police-intensive system of social regulation. Provided with unprecedented access to domestic intelligence centers, Brendan McQuade uncovers how the institutionalization of intelligence fusion enables decarceration without fully addressing the underlying social problems at the root of mass incarceration. The result is a startling analysis that contributes to the debates on surveillance, mass incarceration, and policing and challenges readers to see surveillance, policing, mass incarceration, and the security state in an entirely new light.Trade Review"Through comprehensive research, McQuade offers a substantial contribution to studies in policing, surveillance, historical sociology, and social justice. . . . As the book makes clear, “mass supervision, an outgrowth and extension of mass incarceration, helps maintain the stark—and starkly racialized—inequalities that characterize the United States." Understanding intelligence fusion and mass supervision is necessary to challenge such conditions, an effort Pacifying the Homeland contributes to greatly." * Journal of Criminal Justice Education *"Pacifying the Homeland is part of a wave of much needed critical policing studies that at once echo an earlier era in the study of radical criminology, while also heralding the arrival of a new interventionist, unapologetic structural analysis of policing." * Punishment & Society *"This is a vitally important book." * Religious Studies Review *Table of ContentsAcknowledgments Prologue: Policing Camden’s crisis 1. Connecting the dots beyond counterterrorism and seeing past organizational failure 2. The rise and present demise of the workfare-carceral state 3. The institutionalization of intelligence fusion 4. Policing decarceration 5. Beyond cointelpro 6. Pacifying poverty Conclusion: The Camden model and the Chicago challenge Appendix: Research and the World of Official Secrets Notes Works Cited Index
£21.25
Cambridge University Press Network Security
Book SynopsisApplies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive book provides a system-level theoretical understanding of network security.Trade Review'The great advantage of this book is that the authors [cover] exhaustively theoretical background related to decision and game theories with a lot of motivating examples. The work is written without unnecessary complexity, while the organization is clear and the contents is … readable. I can recommend … to researchers and graduate students as well as to engineers, mainly system administrators and security officers.' IEEE Communications MagazineTable of ContentsPreface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index.
£128.89
O'Reilly Media Hacking
Book SynopsisThe security world is changing as the advent of modern Web 2.0 sites and rich Internet applications has given rise to a generation of hacking techniques. This book offers information on hacks that attempt to exploit technical flaws. It explains how to assess attacks against technologies in Internet applications and social networking sites.
£23.99
Pearson Education (US) Information Security
Book SynopsisMark Merkow, CISSP, CISM, CSSLP, is a technical director for a Fortune 100 financial services firm, where he works on implementing and operating a software security practice for the enterprise. He has more than 35 years of IT experience, including 20 years in IT security. Mark has worked in a variety of roles, including applications development, systems analysis and design, security engineering, and security management. Mark holds a master's degree in decision and info systems from Arizona State University (ASU), a master's of education in Distance Learning from ASU, and a bachelor's degree in Computer Info Systems from ASU. Jim Breithaupt is a data integrity manager for a major bank, where he manages risk for a large data mart. He has more than 30 years of data processing experience and has co-authored several other books on information systems and information security, along with Mark Merkow.Table of ContentsPreface Chapter 1: Why Study Information Security? Introduction The Growing Importance of IT Security and New Career Opportunities An Increase in Demand by Government and Private Industry Becoming an Information Security Specialist Schools Are Responding to Demands The Importance of a Multidisciplinary Approach Contextualizing Information Security Information Security Careers Meet the Needs of Business Summary Chapter 2: Information Security Principles of Success Introduction Principle 1: There Is No Such Thing As Absolute Security Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability Integrity Models Availability Models Principle 3: Defense in Depth as Strategy Principle 4: When Left on Their Own, People Tend to Make the Worst Security Decisions Principle 5: Computer Security Depends on Two Types of Requirements: Functional and Assurance Principle 6: Security Through Obscurity Is Not an Answer Principle 7: Security = Risk Management Principle 8: The Three Types of Security Controls Are Preventative, Detective, and Responsive Principle 9: Complexity Is the Enemy of Security Principle 10: Fear, Uncertainty, and Doubt Do Not Work in Selling Security Principle 11: People, Process, and Technology Are All Needed to Adequately Secure a System or Facility Principle 12: Open Disclosure of Vulnerabilities Is Good for Security! Summary Chapter 3: Certification Programs and the Common Body of Knowledge Introduction Certification and Information Security International Information Systems Security Certifications Consortium (ISC)2 The Information Security Common Body of Knowledge Information Security Governance and Risk Management Security Architecture and Design Business Continuity and Disaster Recovery Planning Legal Regulations, Investigations, and Compliance Physical (Environmental) Security Operations Security Access Control Cryptography Telecommunications and Network Security Software Development Security Other Certificate Programs in the IT Security Industry Certified Information Systems Auditor Certified Information Security Manager Certified in Risk and Information Systems Control Global Information Assurance Certifications (ISC)2 Specialization Certificates CCFP: Certified Cyber Forensics Professional HCISPP: HealthCare Information Security and Privacy Practitioner Vendor-Specific and Other Certification Programs Summary Chapter 4: Governance and Risk Management Introduction Security Policies Set the Stage for Success Understanding the Four Types of Policies Programme-Level Policies Programme-Framework Policies Issue-Specific Policies System-Specific Policies Developing and Managing Security Policies Security Objectives Operational Security Policy Implementation Providing Policy Support Documents Regulations Standards and Baselines Guidelines Procedures Suggested Standards Taxonomy Asset and Data Classification Separation of Duties Employment Hiring Practices Risk Analysis and Management Education, Training, and Awareness Who Is Responsible for Security? Summary Chapter 5: Security Architecture and Design Introduction Defining the Trusted Computing Base Rings of Trust Protection Mechanisms in a TCB System Security Assurance Concepts Goals of Security Testing Formal Security Testing Models The Trusted Computer Security Evaluation Criteria Division D: Minimal Protection Division C: Discretionary Protection Division B: Mandatory Protection Division A: Verified Protection The Trusted Network Interpretation of the TCSEC The Information Technology Security Evaluation Criteria Comparing ITSEC to TCSEC ITSEC Assurance Classes The Canadian Trusted Computer Product Evaluation Criteria The Federal Criteria for Information Technology Security The Common Criteria Protection Profile Organization Security Functional Requirements Evaluation Assurance Levels The Common Evaluation Methodology Confidentiality and Integrity Models Bell-LaPadula Model Biba Integrity Model Advanced Models Summary Chapter 6: Business Continuity Planning and Disaster Recovery Planning Introduction Overview of the Business Continuity Plan and Disaster Recovery Plan Why the BCP Is So Important Types of Disruptive Events Defining the Scope of the BCP Creating the Business Impact Analysis Disaster Recovery Planning Identifying Recovery Strategies Understanding Shared-Site Agreements Using Alternate Sites Making Additional Arrangements Testing the DRP Summary Chapter 7: Law, Investigations, and Ethics Introduction Types of Computer Crime How Cybercriminals Commit Crimes The Computer and the Law Legislative Branch of the Legal System Administrative Branch of the Legal System Judicial Branch of the Legal System Intellectual Property Law Patent Law Trademarks Trade Secrets Privacy and the Law International Privacy Issues Privacy Laws in the United States Computer Forensics The Information Security Professional’s Code of Ethics Other Ethics Standards Computer Ethics Institute Internet Activities Board: Ethics and the Internet Code of Fair Information Practices Summary Chapter 8: Physical Security Control Introduction Understanding the Physical Security Domain Physical Security Threats Providing Physical Security Summary Chapter 9: Operations Security Introduction Operations Security Principles Operations Security Process Controls Operations Security Controls in Action Software Support Configuration and Change Management Backups Media Controls Documentation Maintenance Interdependencies Summary Chapter 10: Access Control Systems and Methodology Introduction Terms and Concepts Identification Authentication Least Privilege (Need to Know) Information Owner Discretionary Access Control Access Control Lists Mandatory Access Control Role-Based Access Control Principles of Authentication The Problems with Passwords Multifactor Authentication Biometrics Single Sign-On Kerberos Federated Identities Remote User Access and Authentication Remote Access Dial-In User Service Virtual Private Networks Summary Chapter 11: Cryptography Introduction Applying Cryptography to Information Systems Basic Terms and Concepts Strength of Cryptosystems Cryptosystems Answer the Needs of Today’s E-Commerce The Role of Keys in Cryptosystems Putting the Pieces to Work Digesting Data Digital Certificates Examining Digital Cryptography Hashing Functions Block Ciphers Implementations of PPK Cryptography Summary Chapter 12: Telecommunications, Network, and Internet Security Introduction An Overview of Network and Telecommunications Security Network Security in Context The Open Systems Interconnection Reference Model The Protocol Stack The OSI Reference Model and TCP/IP The OSI Model and Security Data Network Types Local Area Networks Wide Area Networks Internet Intranet Extranet Protecting TCP/IP Networks Basic Security Infrastructures Routers Firewalls Intrusion Detection Systems Intrusion Prevention Systems Virtual Private Networks IPSec Encapsulating Security Protocol Security Association Internet Security Association and Key Management Protocol Security Policies IPSec Key Management Applied VPNs Cloud Computing Summary Chapter 13: Software Development Security Introduction The Practice of Software Engineering Software Development Life Cycles Don’t Bolt Security On–Build It In Catch Problems Sooner Rather Than Later Requirements Gathering and Analysis Systems Design and Detailed Design Design Reviews Development (Coding) Phase Testing Deployment Security Training Measuring the Secure Development Program Open Software Assurance Maturity Model (OpenSAMM) Building Security in Maturity Model (BSIMM) Summary Chapter 14: Securing the Future Introduction Operation Eligible Receiver Carders, Account Takeover, and Identity Theft Some Definitions ZeuS Banking Trojan Phishing and Spear Phishing Other Trends in Internet (In)Security The Year (Decade?) of the Breach The Rosy Future for InfoSec Specialists Summary Appendix A: Common Body of Knowledge Access Control Telecommunications and Network Security Information Security Governance and Risk Management Software Development Security Cryptography Security Architecture and Design Operations Security Business Continuity and Disaster Recovery Planning Legal Regulations, Investigations, and Compliance Physical (Environmental) Security Appendix B: Security Policy and Standards Taxonomy Appendix C: Sample Policies Sample Computer Acceptable Use Policy 1.0.0 Acceptable Use Policy Sample Email Use Policy 1.0.0 Email Use Policy Sample Password Policy 1.0.0 Password Policy Sample Wireless (WiFi) Use Policy 1.0.0 Wireless Communication Policy Appendix D: HIPAA Security Rule Standards HIPAA Security Standards Administrative Procedures Physical Safeguards Technical Security Services Technical Security Mechanisms 9780789753250 TOC 5/7/2014
£60.32
Taylor & Francis Inc Bioterrorism in Medical and Healthcare
Book SynopsisBioterrorism in Medical and Healthcare Administration provides an efficient method to identify, manage, and control transformations in the provision of health services during elevated levels of bioterrorist threat - offering step-by-step procedures and templates to prepare and implement a coordinated response to high-alert situations. This reference proposes an efficient method to identify, manage, and control transformations in the provision of health services during elevated levels of bioterrorist threat - offering step-by-step procedures and templates to prepare and implement a coordinated response to high-alert situations.Table of ContentsPART I: HOW TO DEVELOP OR ADAPT EMERGENCY PLANS FOR BIOTERRORIST THREATS. Strategy and Bioterrorism. Strategic Intervention: Tactical Analysis and Countervailing Tactics for Bioterrorism and Its Consequences. Bioterrorism's Threat and Planned Response: Strategic Analysis and Design. Counteracting a Bioterrorist Strategy: Overcoming the Inevitable Obstacles to Change. A Coordinated Response to Bioterrorism: In-House Training and Planning for Staff, Professionals, and Managers. PART II: SEMI-FICTIONAL CASE STUDIES. A Hypothetical Bioterrorist Attack. A Hospital Plans for Bioterrorism. A State Deals with Terrorism. An International Organization, WABO, Deals with Bioterrorism. A Country Deals with Bioterrorism. An International Organization of States Deals with Bioterrorism. Conclusion. Appendix: Solutions to the Analysis of the Cases. Index.
£142.50
Taylor & Francis Information Security in Healthcare
Book SynopsisInformation Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment. Combining the experience and insights of top healthcare IT managers and information security professionals, this book offers detailed coverage of myriadTable of ContentsChapter 1: IT Security Governance Chapter 2: Risk Management and Strategic Planning Chapter 3: Data Management and Portability Chapter 4: Audit Logging Chapter 5: Identity and Access Management Chapter 6: Sharing Patient Information Chapter 7: Portable Devices Chapter 8: Medical Device Security Implications Chapter 9: Remote Access Chapter 10: Training the Workforce Chapter 11: The Importance of Incident Response Chapter 12: Disaster Recovery and Business Continuity Chapter 13: Developing an Effective Compliance Strategy Chapter 14: Managing Security with Outsourcing Partners Chapter 15: Physical Security Chapter 16: Effective Security Programs Enable Clinical and Business, Improvements, Chapter 17: The Foundations of Information Assurance Chapter 18: Personal Health Records
£77.89
Massey University Press Cyber Security and Policy
Book Synopsis
£24.79
Taylor & Francis Ltd Building in Security at Agile Speed
Today''s high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to
£42.74
Taylor & Francis Ltd EvidenceBased Cybersecurity
Book SynopsisThe prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals'' and organizations'' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies in the wild have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and privatTrade Review"This is a tremendous resource for every security professional and organization whose goal is to improve their cybersecurity posture. The evidence-based cybersecurity approach ties the criticality of understanding human behavior with the technical aspects of cyber-crime. A true data centric treasure trove of valuable knowledge."- Kausar Kenning, Executive Director, Cyber Security, Morgan Stanley"Despite its technical nature, the evidence base supporting cybersecurity as a field of practice remains flimsy, at best. Some have even compared cybersecurity to "medieval witchcraft". This timely and essential book provides a much needed and comprehensive overview of the available evidence and of the knowledge gaps that persist, also charting the path ahead for a more scientific approach to the design, implementation, and evaluation of cybersecurity measures."- Dr. Benoît Dupont, Professor of Criminology, University of Montreal, Canada, and Canada Research Chair in Cybersecurity."Dr. Pomerleau does a masterful job of deep diving into the realm of contemporary Cybersecurity. Beyond recounting the historical evolution of Cybersecurity, Pomerleau astutely weaves together a traditional IT risk management system approach with a multi-faceted humanistic approach (with ethical, sociological, psychological, and criminal elements) to present a comprehensive how-to guide for evidence-based Cybersecurity analysis."- Dr. David L. Lowery, Full Professor of Homeland Security & Public Administration, Northcentral UniversityTable of Contents1. The Case for an Evidence-Based Approach to Cybersecurity2. Computers, Computers Networks, the Internet, and Cybersecurity3. Human Behavior in Cyberspace4. Criminological, Sociological, Psychological, Ethical and Biological Models Relevant to Cybercrime and Cybercriminals5. Science and Cybersecurity 6. Network Security and Intrusion Detection Systems7. The Internet of Things (IoT), Data and Website Security8. Data Privacy, Training, and Awareness and Cybersecurity Frameworks9. Risk and Threat Intelligence: The Effectiveness of Online Threat Intelligence in Guiding Financial Institutions’ Incident Response to Online Banking Account Takeovers 10. The Future of Evidence-Based Cybersecurity
£59.84
Taylor & Francis Ltd Strategic Cyber Security Management
Book SynopsisThis textbook places cyber security management within an organizational and strategic framework, enabling students to develop their knowledge and skills for a future career. The reader will learn to: evaluate different types of cyber risk carry out a threat analysis and place cyber threats in order of severity formulate appropriate cyber security management policy establish an organization-specific intelligence framework and security culture devise and implement a cyber security awareness programme integrate cyber security within an organization's operating system Learning objectives, chapter summaries and further reading in each chapter provide structure and routes to further in-depth research. Firm theoretical grounding is coupled with short problem-based case studies reflecting a range of organizations and perspectives, illustrating how the theory translates to practice, with each case study followed by a set of quTable of ContentsContentsAbout the AuthorsPrefaceChapter 1 An Introduction to Strategic Cyber Security ManagementChapter 2 Strategic Cyber Security Management and the Stakeholder ApproachChapter 3 Bridging the Government, Industry and Society DivideChapter 4 Strategic Cyber Security Management and Strategic IntelligenceChapter 5 Threat Identification and Risk AssessmentChapter 6 Governance and Compliance Decision MakingChapter 7 Business Continuity ManagementChapter 8 Resilience Policy and PlanningChapter 9 Integrated Security and a Risk Management Communication StrategyChapter 10 Organizational Learning, Managing Change and Security CultureChapter 11 Cyber Security ManagementChapter 12 A Cyber Security Awareness Programme
£43.69
Taylor & Francis Ltd 5G Cyber Risks and Mitigation
Book Synopsis5G technology is the next step in the evolution of wireless communication. It offers faster speeds and more bandwidth than 4G. One of the biggest differences between 4G and 5G is that 5G will be used for a wider range of applications. This makes it ideal for applications such as autonomous vehicles, smart cities, and the Internet of Things (IoT). This means that there will be more devices connected to 5G networks, making them more vulnerable to cyber attacks. However, 5G also introduces new cyber risks that need to be addressed. In addition, 5G networks are expected to be much more complex, making them harder to secure. 5G networks will use new technologies that could make them more vulnerable to attacks. These technologies include massive multiple input, multiple output (MIMO), which uses more antennas than traditional cellular networks, and millimeter wave (mmWave), which uses higher frequencies than traditional cellular networks. These new technologies could make it easierTable of Contents1. Overview of 5G network, architecture, and Uses. 2. 5G use cases and application. 3. Security in the 5G Era. 4. Security standards and their role in 5G. 5. Differentiating 4G and 5G on a security Basis. 6. 5G, IoT, and cyber risk. 7. 5G security risk. 8. Security for 5G mobile wireless networks. 9. Security Risk Prevention and Control Deployment for 5G Private Industrial Networks. 10. 5G Threat Surface And Threat Mitigation Control. 11. Role of AI in mitigation of 5G attacks. 12. Road to future 6G and security challenges.
£94.99
Taylor & Francis Ltd Ransomware and Cybercrime
Book SynopsisIn May 2021, Jim Gosler, known as the Godfather and commander of US agenciesâ cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced.Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security.This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online.There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We needâno, we must demandâchange. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.Table of ContentsForeword. Preface. Chapter 1 Stuxnet to Sunburst and Ransomware Development. Chapter 2 Not Secure, F and 0… Chapter 3 Ransomware Lessons Being Learned… Chapter 4 Colonial Pipeline and CI Companies. Chapter 5 CNA Ransomware Attack and Cyber Insurance. Chapter 6 BA, easyJet, and the Travel Industry. Chapter 7 Destabilising the United States, Courts, Law Enforcement, and Way of Life. Chapter 8 Deterrence Theory and the Five Eyes Faux Pas. Chapter 9 Ensuring the Security of Insecurity. Chapter 10 Traditional Warfare, the Fat Man, Mistakes Made, and Lessons Still Being Learned and Ignored. Chapter 11 Survivorship Bias. Chapter 12 Air India Ransomware Faux Pas. Chapter 13 Most Common Website Vulnerabilities and Attacks. Chapter 14 The Old Lady of Threadneedle Street and the FCA. Chapter 15 MITRE CWE and Ransom Task Force. Chapter 16 Critical National Infrastructure: The Collapse of a Nation. Chapter 17 US State Attacks and the Continued Oversight of Security. Chapter 18 Conflicts of Interest. Chapter 19 Innovation and Disbelief. Chapter 20 Blackbaud, Cyberattacks, and Class Action Lawsuits. Chapter 21 The World’s Largest Global Economic Shift. Chapter 22 It Is Not Setting Goals Too High, but Setting Them Too Low and Achieving Them. Chapter 23 Avoiding the Apocalypse. Chapter 24 If a Clever Person Learns from Their Mistakes and a Wise Person Learns from the Mistakes of Others, What Is a Person Who Learns from Neither Known As? Index.
£28.49
Taylor & Francis Ltd Holistic Approach to Quantum Cryptography in
Book SynopsisThis new book discusses the concepts while also highlighting the challenges in thefield of quantum cryptography and also covering cryptographic techniques and cybersecurity techniques, in a single volume.It comprehensively covers important topics in the field of quantum cryptographywith applications, including quantum key distribution, position-based quantumcryptography, quantum teleportation, quantum e-commerce, quantum cloning, cybersecurity techniques' architectures and design, cyber security techniques management,software-defined networks, and cyber security techniques for 5G communication.The text also discusses the security of practical quantum key distribution systems,applications and algorithms developed for quantum cryptography, as well as cybersecurity through quantum computing and quantum cryptography.The text will be beneficial for graduate students, academic researchers, andprofeTable of Contents1. Towards Security in Software Defined Networks with Trust and Monitoring 2. Quantum key generation and distribution using Decoy state 3. Cyber Security Techniques, Architectures and Design 4. Secured Unmanned Aerial Vehicle based Fog Computing Network (UAV-FCN): A Review 5. Mars Surface Exploration via Unmanned Aerial Vehicles: Secured MarSE UAV Prototype 6. Quantum Cryptography in Cybersecurity: A Holistic Approach 7. Cyber Security Technique for Internet of Things using Machine Learning 8. Image Encryption and Decryption through Quantum Cryptography 9. Cyber Security Techniques Management 10. Quantum Cryptography And Quantum Key Distribution 11. Quantum Cryptography: Basics, Effects on Communication and Data Management 12. Quantum Number: An Error Correction Circuits and Methods 13. Risk Analysis Assessment of Inter-Dependency of Vulnerabilities In Cyber-Physical Systems
£114.00
CRC Press Internet of Things and Cyber Physical Systems
Book Synopsis
£42.74
Taylor & Francis Ltd A Deeper Perspective on the Fundamentals of
Book SynopsisThis book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This boTable of ContentsPart OneIntroduction to Analog & Digital Communication ProtocolsChapter 01 – Evolution of Communication ProtocolsChapter 02 – Introduction to Analog Communication ProtocolsChapter 03 – Introduction to Digital Communication ProtocolsPart TwoChapter 04 – Major Telephony ProtocolsChapter 05 – Important Data Communication ProtocolsChapter 06 – Wireless and Cellular Communication ProtocolsChapter 07 – Fiber Optic Data Transmission ProtocolsPart ThreeChapter 08 – Network Security ProtocolsChapter 09 – Wireless Security ProtocolsChapter 10 – Server Level Security SystemsChapter 11 – PrivacyBibliography
£42.74
Taylor & Francis Ltd Absolute Essentials of Ethereum
Book SynopsisAbsolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.Written by an experienced educator, each chapter is designed to progress potential students from class to class. Technical concepts are clearly explained for those new to the topic and readers are supported with definitions and summaries in each chapter. Real-life case studies situate the overviews in a contemporary context. Topics covered include the Ethereum Execution and Consensus layers, Ethereum governance and community, Decentralised Autonomous Organisations (DAOs), Decentralised Finance (DeFi), Non-Fungible Tokens (NFTs) and Layer 2.This book is the ideal text to support undergraduate and postgraduate courses on blockchain technologies, cryptocurrencies, Web3 and fintech, as well as for those who want to know how Ethereum really works.Trade Review“Over the last ten years, Ethereum has transformed from being a whitepaper describing a proposal for a more general-purpose blockchain into a highly diverse and complex ecosystem. Absolute Essentials of Ethereum does an excellent job describing the basics, both of the technology and of how people maintain and use it and where it’s going in the years to come.”—Vitalik Buterin, Founder of Ethereum“Since its origins as a world computer, Ethereum has gone on to become a world-wide phenomenon. Over that time, to those on the inside, it feels like decades have passed. Paul is one of the few people with the ability to simply and modestly merge those years of collective coordination into a meaningful history of what Ethereum is and more importantly why it matters. I’d highly recommend this book to anyone looking to get caught up and involved in the Ethereum ecosystem.”—Scott Moore, Co-founder of Gitcoin“This is the perfect text for anyone to get up to speed with Ethereum and its key concepts. Written in a highly personable and engaging style, this book will take both the technical and non-technical reader on a tour of the most important moments in Ethereum’s history and its most significant projects.”—Nick Almond (Dr), Founder of Factory DAO“A well-written, comprehensive introduction to the various component sectors of Ethereum. This book appeals to both readers completely new to Ethereum and those old hands trying to remember the historical developments leading to the current state of affairs.”—Laurence E. Day (Dr), Founder of Wildcat Finance and Advisor to Euler FinanceTable of Contents1. Introducing Ethereum 2. Ethereum: The Execution Layer (EL) 3. Ethereum: The Consensus Layer (CL) 4. Ethereum Governance and Culture 5. Decentralised Autonomous Organisations (DAOs) 6. Decentralised Finance (DeFi) 7. Non-Fungible Tokens (NFTs) 8. Ethereum Layer 2 and the Roadmap Appendix: Introduction to Bitcoin
£47.49
Taylor & Francis Ltd Cybersecurity for Decision Makers
This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in computer science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will f
£104.50
CRC Press Empowered or Left Behind
Book SynopsisFocused on the United States, this book summarizes the secondary impacts of COVID-19 due to the increased use of technology. Establishing the global response of social distancing, mandates for non-essential business, and working from home, the book centers on the disparate guidance provided domestically at the state and local levels. Marginalized populations are highlighted to identify areas where technology facilitated access and reach or contributed to difficulties catapulted by digital literacy or digital access issues. To explain how people may have been empowered or left behind due to a new and unique reliance on technology, this book is structured based on the social determinants of health domains. Specifically, this book explains how technology was an umbrella domain that impacted every aspect of life during the pandemic including access, use, adoption, digital literacy, and digital equity, as well as privacy and security concerns. Given this bookâs focus on the impacts to marginalized populations, there is a thread throughout the book related to the use of technology to perpetuate hate, discrimination, racism, and xenophobic behaviors that emerged as a twin pandemic during COVID-19. Part I explains the defining differences between primary and secondary impacts, as well as the unique guidelines adopted in each state. Part II of the book is focused on specific domains, where each chapter is dedicated to topics including economic stability through employment, education, healthcare, and the social/community context through access to services. Part III focuses on unique technological considerations related to COVID-19, such as mobile health-related apps and privacy or security issues that may have posed barriers to the adoption and use of technology. Finally, the book ends with a conclusion chapter, which explicitly explains the advantages and disadvantages of technology adoption during COVID-19. These exposed benefits and challenges will have implications for policies, disaster management practices, and interdisciplinary research.
£49.12
Taylor & Francis Ltd Digital Blood on Their Hands
Book SynopsisCyberattacks are nothing particularly new to the world and Ukraine had suffered many such attacks by Russia over recent years. Russia had knowingly been exploiting Ukraineâs digital vulnerabilities as a proving ground for nearly a decade. Malware such as Sandworm and BlackEnergy had caused untold damage to the Ukrainian population and government previously, which allowed Russia to perfect cyberattacks for further, more global events. Russia had been planting cyber sleeper digital cells for years, especially in the US and the UK.Then, coincidently, the week after the Chinese Winter Olympic games had finished, Russia launched an all-out cyber offensive against 70 Ukrainian government websites. Owing to these being poorlyâand insecurelyâmaintained, they toppled one by one, causing havoc and disruption to the Ukrainian government and to Ukraineâs critical infrastructure. As Q said in James Bond: âI can do more damage by breakfast sipping my Earl Grey tea with my keyboard than you ever can in the field.â Sadly, Q was right, as we witness daily. The keyboard and mouse have indeed become mightier than the sword.The barrage of cyberattacks against Ukraine constitutes the first cyberwar by one nation against another. This attack crossed a very thin red line. That line had the hallmarks of a nation state, but had until now been confined to cyber criminal activities, immaterial of whom the perpetrators were. This, however, was now war. The cyberwar was simply a precursor, the softening of a country that would precede a kinetic war in which tens of thousands of people would lose their lives. This war was the first war for nearly 80 years that rang out deathly klaxons across Europe and the world.Digital Blood on Their Hands addresses the issues that the digital world has created, covering the culpability, causal links and even liabilities that go towards these war crime atrocities, often too frightening to believe and also too compelling to dismiss. It tells a side to the worldâs first ever cyberwar that you would never otherwise see or possibly hear about.Table of ContentsPreface. Author. Part I History. Chapter 1 The History of War and Cyber Warfare. Chapter 2 The History of Cybersecurity. Part II Technology. Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT: Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III Examples of Previous Attacks and Insecurities. Chapter 8 US Government Security Failings. Chapter 9 UK Government Security Failings. Chapter 10 Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter 12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13 Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine. Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down. Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond. Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21 Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION. AFTERWORD. INDEX.
£25.64
Taylor & Francis Ltd Insider Risk and Personnel Security
Book SynopsisThis textbook analyses the origins and effects of insider risk, using multiple real-life case histories to illustrate the principles, and explains how to protect organisations against the risk.Some of the most problematic risks confronting businesses and organisations of all types stem from the actions of insiders individuals who betray trust by behaving in potentially harmful ways. Insiders cause material damage to their employers and society, and psychological harm to the colleagues and friends they betray. Even so, many organisations do not have a systematic understanding of the nature and origins of insider risk, and relatively few have a coherent and effective system of protective security measures to defend themselves against that risk. This book describes the environmental and psychological factors that predispose some individuals to become harmful insiders, and the most common pathways by which this happens. It considers how aspects of insider risk have been altTrade Review'Insider risk has become a big issue, particularly as we depend so much on digital networks. Paul Martin's clear, comprehensive and thoughtful book leads us through the subject with telling, real-world examples.'Jonathan Evans, former Director General of MI5'Few people understand the world of Insider Risk as well as Paul Martin. This deceptively simple book is rooted in serious professional expertise and his own academic study of behaviour and risk. It clearly explains the problem, and suggests effective approaches. There are home truths about lack of investment in personnel security at the expense of other types of risk, and, because this is about human behaviour, it encourages better understanding of what motivates people to become insiders. Each chapter ends with discussion points which enable deeper reflection and would be useful for any organisation to consider.'Suzanne Raine, Visiting Professor, King’s College London, UK'The book cleverly uses case studies as a way of reinforcing important points. The content is fully up to date and incorporates the most recent developments in this field. It challenges perception on insider motivations and the impact of different factors, and I found that some of its content has challenged my own thoughts on the matter. There are interesting insights into the psychology and personality traits behind insiders, and the author importantly provides potential solutions to the problem, as well as highlighting what the problem is itself. Trust and its relationship to Insider Risk makes interesting reading within the book. In Part 2, the author looks at potential solutions or mitigation responses to insider risk and the importance of adopting a systems approach. He also locates personnel security within a wider integrated approach to security, incorporating physical and cyber security. I particularly like the proactive approach he adopts when discussing how to address insider risk - 'Prevention is better than cure', rather than waiting for some form of insider activity to occur before responding to it. Importantly for Insider Risk practitioners, there is also a detailed chapter regarding detection and mitigation methods which can be applied, and models and metrics which can be used to assess insider risk. I found the book highly informative and extremely well researched. I would describe the author as a 'Simplifier', not a 'Complicator', as he has written the book in an easy to read and uncomplicated style, that makes it equally relevant for someone just coming into the field of Personnel Security and Insider Risk, as much as for the expert who has spent years working in this field of work.'David BaMaung, Chair Special Interest Group Insider Risk, The Security Institute'Insider Risk and Personnel Security by Paul Martin is excellent. It provides rigor and insights about the complexities involved in human nature, and will be useful as an antidote to war-story telling individuals who suggest that risk-related behavior and motivations fit neatly into well-bounded management tactics.'Eric L. Lang, psychological, scientist and insider threat expert'Paul Martin dives deep into ‘insider risk’, an often neglected area of security risk management, despite its prevalence as a critical key factor in many a case of espionage, cyber attack, fraud or thefts. At a time of rapid and unsettling changing, with war in Europe, ramping-up of geopolitical tensions, ever more sophisticated criminal acts and daily news of cyber attacks, I am sure we’ll keep seeing creative attempts to exploit human vulnerabilities at the heart of our organisations, systems and networks. [He/the author/Paul] neatly takes us on an ‘insiders’ journey, explaining who those people are (not just employees!), their behavioural traits and work/life contexts, what makes them tick, concepts of trust and betrayal, effective security responses, and everything you might trip over on the way. If ever there was a book that illustrates that security is a truly human challenge that needs more than technical solutions, this is it. The author brings a unique mix of academic rigour and practitioner realism to his writing, which is direct, clear and illustrated with frequent case studies. This book is an excellent source of insight and an easy, enjoyable read for leaders, practitioners, students and researchers alike. As a non-executive director on several boards, I recommend it to executive and non-executive Board colleagues. We need '‘insider risk'’ up there with cyber-risks in that reddest corner of the risk matrix!'Fiona Strens, Professor of Practice, Security & Resilience, University of Strathclyde, UKTable of ContentsIntroduction PART ONE – UNDERSTANDING INSIDER RISK 1. What is insider risk? 2. Why does it matter? 3. Who are the insiders? 4. Why do they do it? 5. Trust, deception, and betrayal PART TWO – PERSONNEL SECURITY 6. Personnel security principles 7. Pre-trust measures 8. In-trust measures 9. Foundations 10. Models and metrics 11. Barriers to success
£34.19
Taylor & Francis Ltd Cybertax
Book SynopsisCybersecurity risk is a top-of-the-house issue for all organizations. CybertaxManaging the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for noncybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C'Table of ContentsChapter 1. What Is Cybertax? Chapter 2. Cybertax Management Chapter 3. Cybertax Efficiency Chapter 4. Know Your Adversary Chapter 5. Governing Cybersecurity Risk Chapter 6. Solution—CYBERPHOS
£14.99
Taylor & Francis Ltd System Reliability and Security
Book SynopsisBecause of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems.System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distTable of Contents1. A GNN Approach for Software Reliability, 2. Software Reliability Prediction Using Neural Networks: A Non-parametric Approach, 3. Analysis and Modelling of Software Reliability Using Deep Learning Methods, 4. Fixed-Design Local Polynomial Approach for Estimation and Hypothesis Testing of Reliability Measures, 5. Reliability Analysis of Relation between Urbanization, Vegetation Health, and Heat Island Through Markov Chain Model, 6. Modeling and IoT (Internet of Things) Analysis for Smart Precision Agriculture, 7. Engineering Challenges in the Development of Artificial Intelligence and Machine Learning Software Systems, 8. Study and Analysis of Testing Effort Functions for Software Reliability Modeling, 9. Summary of NHPP-Based Software Reliability Modeling With Lindley-Type Distributions, 10. Artificial Intelligence and Machine Learning Problems and Challenges in Software Testing, 11. Software Quality Prediction by CatBoost: Feed-Forward Neural Network in Software Engineering, 12. Software Security, 13. Definitive Guide to Software Security Metrics, 14. Real-Time Supervisory Control and Data Acquisition (SCADA) Model for Resourceful Distribution and Use of Public Water
£56.99
Taylor & Francis Ltd Cryptographic and Information Security Approaches
Book SynopsisThis book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including . Giving readers an in-depth introduction to different aspects of information security mechanisms and methods, it also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques. Table of ContentsPart 1: Information Security Basics. 1. Encryption Techniques. 2. Key Distribution Techniques. 3. Authentication and Integrity Techniques. Part 2: Image and Video Security Techniques. 4. Image and Video Encryption Techniques. 5. Image and Video Watermarking Techniques. 6. Image and Video Steganography Techniques. 7. Image and Video Forensics. Part 3: Applications. 8. Applications in Medical Imaging. 9. Applications in Industrial Automation. 10. Applications in Sports and Entertainment. 11. Applications in Privacy Preservation. 12. Applications in Copyrights and Ownership Rights of Video. 13. Applications in Cloud-Based Applications.
£126.00
Taylor & Francis Ltd Decentralized Music
Book SynopsisThis book offers a thorough exploration of the potential of blockchain and AI technologies to transform musical practices. Including contributions from leading researchers in music, arts, and technology, it addresses central notions of agency, authorship, ontology, provenance, and ownership in music.Together, the chapters of this book, often navigating the intersections of post-digital and posthumanist thought, challenge conventional centralized mechanisms of music creation and dissemination, advocating for new forms of musical expression.Stressing the need for the artistic community to engage with blockchain and AI, this volume is essential reading for artists, musicians, researchers, and policymakers curious to know more about the implications of these technologies for the future of music.
£42.74
CRC Press Applying Blockchain Technology
Book SynopsisBlockchain technology has the potential to revolutionize the way to conduct transactions and share information. It is having a significant impact on a wide range of industries Applying Blockchain Technology: Concepts and Trends is an in-depth guide exploring the world of blockchain technology. Beginning with an introduction to concepts related to blockchain and its application, the book delves into the benefits and challenges of using blockchain in various industries, including healthcare, finance, real estate, voting, and supply chain management. It discusses potential ethical considerations associated with blockchain technology and how to design and implement blockchain solutions ethically.The book covers practical applications of blockchain in different industries, as well as its potential for use with IoT, smart grids, and cloud computing. Moreover, the book provides an in-depth discussion on the implications of blockchain on the financial system, as well as
£58.89
CRC Press The Closing of the Auditorâs Mind
Book SynopsisIn The Closing of the Auditorâs Mind?, author David J. OâRegan describes internal auditing as an important binding agent of social cohesion, for the accountability of individuals and organizations and also at aggregated levels of social trust. However, OâRegan also reveals that internal auditing faces two severe challenges â an external challenge of adaptation and an internal challenge of fundamental reform.The adaptation challenge arises from ongoing, paradigmatic shifts in accountability and social trust. The command-and-control, vertical hierarchies of traditional bureaucracies are being replaced in importance by networked, flattened patterns of accountability. The most challenging assurance demands of the modern era are increasingly located in three institutional domains â in the inner workings of organizations; in intermediary spaces at organizational boundaries; and in extra-mural locations. Internal auditing continues to cling, barnacle-like, to the inner work
£42.74
CRC Press From Streetsmart to WebwiseÂ
Book SynopsisIn a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our childrenâs safety online has never been more crucial. From Streetâsmart to Webâwise : A Cyber Safety Training Program Built for Teachers and Designed for Children isnât just another book â itâs a passionate call to action for teachers and a roadmap to navigate the digital landscape safely, with confidence and care.Written by authors who are recognized experts in their respective fields, this accessible manual is a timely resource for educators. Dive into engaging content that illuminates the importance of cyber safety, not only in our classrooms but extending into the global community.Each chapter is filled with practical examples, stimulating discussion points, and readyâtoâuse lesson plans tailored for students in kindergarten through second grade. Regardless of your technology skill level, this book will provide you with the guidance and the tools you need t
£104.50
CRC Press From Streetsmart to WebwiseÂ
Book SynopsisIn a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our childrenâs safety online has never been more crucial. From Streetâsmart to Webâwise : A Cyber Safety Training Program Built for Teachers and Designed for Children isnât just another book â itâs a passionate call to action for teachers and a roadmap to navigate the digital landscape safely, with confidence and care.Written by authors who are recognized experts in their respective fields, this accessible manual is a timely resource for educators. Dive into engaging content that illuminates the importance of cyber safety, not only in our classrooms but extending into the global community.Each chapter is filled with practical examples, stimulating discussion points, and readyâtoâuse lesson plans tailored for students in kindergarten through second grade. Regardless of your technology skill level, this book will provide you with the guidance and the tools you need t
£42.74
CRC Press The Hack Is Back
Book SynopsisHave you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and provide examples of some of the nefarious techniques used by hackers and cover how attackers apply these methods in a practical manner.The Hack Is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks in computer systems and within networks. This book will benefit the offensive-minded hacker (red-teamers) as well as those who focus on defense (blue-teamers). This book provides real-world examples, hands-on exercises, and insider insights into the world of hacking, including: Hacking our own systems to learn security tools Evaluating web applications for weaknesses Identifying vulnerabilities and earning CVEs Escalating privileges on Linux, Windows, and within an Active Directory environment Deception by routing across the TOR network How to set up a realistic hacking lab Show how to find indicators of compromise Getting hired in cyber! This book will give readers the tools they need to become effective hackers while also providing information on how to detect hackers by examining system behavior and artifacts. By following the detailed and practical steps within these chapters, readers can gain invaluable experience that will make them better attackers and defenders. The authors, who have worked in the field, competed with and coached cyber teams, acted as mentors, have a number of certifications, and have tremendous passions for the field of cyber, will demonstrate various offensive and defensive techniques throughout the book.
£42.74
Taylor & Francis The Age of Decentralization
Book Synopsis
£42.74
CRC Press The Smart Life Revolution
Book SynopsisThis book explores the integration of Artificial Intelligence (AI) across areas such as IoT, Big Data, healthcare, business, economics, and security, and improving the quality of life (QoL) in smart cities today. By looking in depth at the different application areas of AI, the reader learns about the broad and impactful ways AI is transforming our world, its profound influence in enhancing service efficiency, personalization, accessibility, and fostering both scientific and social advancement. The editors consider the importance of bridging theory and practice by offering a practical understanding of how key AI technologies can be applied in real-world scenarios for QoL. By covering both foundational concepts and advanced applications with case studies and practical examples, this approach ensures the reader obtains a comprehensive understanding of the technologies and their impact. An innovation mindset is emphasized with discussion about the challenges, opportunities, fut
£42.74
CRC Press Guardians of Data
Book SynopsisGuardians of Data: A Comprehensive Guide to Digital Data Protection which helps to reduce risks of data loss by monitoring and controlling the flow of sensitive data via the network, email or web. This book also shows the guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory requirements.Guardians of Data means protecting data, networks, programs and other information from unauthorized or unattended access, destruction or change. In today's world, guardians of data are very important because of many security threats and cyber-attacks. For data protection, companies are developing cybersecurity software.The primary goal of data protection is not just to safeguard sensitive information but to ensure that it remains accessible and reliable, thus preserving trust and compliance in data-centric operations. While data protection law sets out what should be done to
£46.54
CRC Press Philosophy.exe
Book SynopsisWe live in an age of unprecedented complexity, where technology, cognitive biases, and societal systems shape our decisions in ways we barely notice. The world is changing faster than our ability to make sense of it. Philosophy.exe is designed to bridge this gap, offering a mental toolkit to help navigate uncertainty, rethink assumptions, and make better decisions in a tech-driven world.Blending classical philosophy, cognitive science, AI ethics, and behavioral psychology, this book provides an adaptive framework for understanding the world. It challenges over-simplified models and rigid ideologies, encouraging readers to embrace complexity as a strategic advantage rather than a threat.What This Book Explores Complexity Thinking â Why linear logic fails and how to develop a mindset that thrives in uncertainty. Cognitive Biases & Decision-Making â How hidden mental shortcuts shape our beliefs, and how to counteract them. Resilience & Mental Adaptability â Tools for maintaining clarity, focus, and critical thinking in a rapidly evolving landscape. Technology & Human Autonomy â The philosophical and ethical challenges of AI, digital identity, and algorithmic decision-making. Ethics Beyond Intentions â A pragmatic approach to decision-making that accounts for unintended consequences.Philosophy.exe is for those who seek to go beyond conventional wisdomâwhether philosophers, strategists, leaders, or curious minds who question the narratives shaping modern life. It provides the tools to think deeply, adapt quickly, and engage critically in an era dominated by complexity and rapid technological evolution.In a world of misinformation, automation, and uncertainty, this book isnât just about philosophyâitâs about survival.
£42.74
O'Reilly Media 97 Things Every Information Security Professional
Book SynopsisIn this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems.
£29.99
O'Reilly Media Security Chaos Engineering
Book SynopsisIn this pragmatic and comprehensive guide, authors Kelly Shortridge and Aaron Rinehart help you navigate the challenges of securing complex software systems. Using the principles and practices of security chaos engineering, software engineering teams will explore how to cultivate resilience across the software delivery lifecycle.
£39.74
O'Reilly Media Security as Code
Book SynopsisIn this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to secure any application and infrastructure you want to deploy. With Security as Code, you'll learn how to create a secure containerized application with Kubernetes using CI/CD tooling from AWS and open source providers.
£33.74
O'Reilly Media Certified Kubernetes Security Specialist CKS
Book SynopsisThis practical book helps you fully prepare for the certification exam by walking you through all of the topics covered.
£33.74
O'Reilly Media Software Supply Chain Security
Book Synopsis
£33.74
O'Reilly Media Building a Cyber Risk Management Program
Book SynopsisIdeal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
£35.99