Network security Books

582 products


  • The Art of Deception

    John Wiley & Sons Inc The Art of Deception

    10 in stock

    Book SynopsisFocusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.Trade Review“…a fascinating read…” (ForTean Times, June 2004) "...a lot of interesting cautionary tales..." (New Scientist, January 2004)Table of ContentsForeword. Preface. Introduction. Part 1: Behind the Scenes. Chapter 1: Security's Weakest Link. Part 2: The Art of the Attacker. Chapter 2: When Innocuous Information Isn't. Chapter 3: The Direct Attack: Just Asking for It. Chapter 4: Building Trust. Chapter 5: "Let Me Help You". Chapter 6: "Can You Help Me?". Chapter 7: Phony Sites and Dangerous Attachments. Chapter 8: Using Sympathy, Guilt, and Intimidation. Chapter 9: The Reverse Sting. Part 3: Intruder Alert. Chapter 10: Entering the Premises. Chapter 11: Combining Technology and Social Engineering. Chapter 12: Attacks on the Entry-Level Employee. Chapter 13: Clever Cons. Chapter 14: Industrial Espionage. Part 4: Raising the Bar. Chapter 15: Information Security Awareness and Training. Chapter 16: Recommended Corporate Information Security Policies. Security at a Glance. Sources. Acknowledgments. Index.

    10 in stock

    £9.50

  • Integrated Security Technologies and Solutions -

    Pearson Education (US) Integrated Security Technologies and Solutions -

    10 in stock

    Book SynopsisThe essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation Table of Contents Introduction xixPart I Knock, Knock! Who’s There? 1Chapter 1 Who and What: AAA Basics 3 Fundamentals of AAA 3 Understanding the Concept of Triple-A in the Real World 4 Compare and Select AAA Options 4 TACACS+ 7 RADIUS 12 Comparing RADIUS and TACACS+ 15 Summary 16Chapter 2 Basic Network Access Control 17 What Is Cisco ISE? 17 ISE Architecture for Network Access AAA 18 Configuring ISE for Single/Standalone and Multinode Deployments 23 ISE Configuration for Network Access 32 802.1X and Beyond 54 Configuring Wired Network Access with ISE 71 Configuring Wireless Network Access with ISE 115 Verifying Dot1X and MAB 140 Summary 148Chapter 3 Beyond Basic Network Access Control 149 Profiling with ISE 149 ISE Profiler and CoA 175 Profiles in Authorization Policies 178 Passive Identities and EasyConnect 180 Summary 191Chapter 4 Extending Network Access with ISE 193 Get Ready, Get Set, Prerequisites 194 BYOD Onboarding with ISE 197 MDM Onboarding and Enforcement with ISE 236 Posture Assessment and Remediation with ISE 244 Guest Access with ISE 265 TrustSec with ISE 287 Summary 306Chapter 5 Device Administration Control with ISE 307 The Case for Centralized AAA 307 RADIUS Versus TACACS+ for Device Administration 308 Using TACACS+ for Device Administration 309 Using RADIUS for Device Administration 343 Summary 352Part II Spread the Love! 353Chapter 6 Sharing the Context 355 The Many Integration Types of the Ecosystem 356 pxGrid in Depth 361 Summary 406Chapter 7 APIs in Cisco Security 407 APIs 101 407 Firepower Management Center APIs 413 Identity Services Engine APIs 424 Advanced Malware Protection APIs 428 Threat Grid APIs 433 Umbrella APIs 435 Summary 437 References 437Part III c2889775343d1ed91b 439Chapter 8 Security Connectivity 441 Hashing, Ciphers, Cryptography, and PKI 441 Virtual Private Networks 461 Layer 2 Encryption: IEEE 802.1AE/MACsec 470 Summary 474 References 474Chapter 9 Infrastructure VPN 477 IPsec with IKEv1 478 IPsec with IKEv2 484 EzVPN 492 DMVPN 500 FlexVPN 514 GETVPN 532 Summary 541 References 541Chapter 10 Remote Access VPN 543 Remote Access VPN Overview 543 Cisco AnyConnect Secure Mobility Client 546 Client-Based Remote Access VPN 554 Clientless Remote Access VPN 586 Summary 595 References 595Part IV The Red Pill 597Chapter 11 Security Virtualization and Automation 599 Cisco Virtual Solutions and Server Virtualization 599 Virtualization and Automation Solutions 602 Summary 613 References 61497815877147074, TOC, 2/28/19

    10 in stock

    £53.99

  • ISC2 CCSP Certified Cloud Security Professional

    John Wiley & Sons Inc ISC2 CCSP Certified Cloud Security Professional

    5 in stock

    Book Synopsis

    5 in stock

    £56.25

  • The Art Of Cyberwarfare: An Investigator's Guide

    No Starch Press,US The Art Of Cyberwarfare: An Investigator's Guide

    7 in stock

    Book SynopsisToday, companies find themselves targeted by sophisticated nation state cyber attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players, the techniques they use, and the process of analysing their advanced attacks. Whether you're an individual researcher or part of a team within a Security Operations Center (SoC), you'll learn to approach, track, and attribute attacks to these advanced actors. Jon DiMaggio demonstrates some of the techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among others.Trade Review"Encompasses useful knowledge from the past and modern advanced threats seen today. Regardless of your expertise level, this book is an insightful read . . .”—Brittany Day, Director of Communications, Guardian Digital“For those looking for a guide to help them understand the new world of cyberwar, The Art of Cyberwarfare provides readers with a good overview of this expanding threat and what they can do to avoid being victims.”—Ben Rothke, Senior Information Security Manager, Tapad"An informative and explanatory guide for cybersecurity experts and an enlightening read for novices. DiMaggio effectively details both the history of cybercrime and how it is seen today."—Justice Levine, Communications Manager and Cloud Email Security Expert, Guardian Digital"This book deserves to find a place on the shelf of everyone whose role involves protecting networks."—Ian Barker, BetaNews"A cross between an IBM presentation . . . and a Tom Clancy novel!"—The Shepherdess, Amazon Reviewer

    7 in stock

    £28.49

  • The Art of Intrusion

    John Wiley & Sons Inc The Art of Intrusion

    3 in stock

    Book SynopsisKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.Table of ContentsChapter 1 Hacking the Casinos for a Million Bucks 1 Chapter 2 When Terrorists Come Calling 23 Chapter 3 The Texas Prison Hack 49 Chapter 4 Cops and Robbers 69 Chapter 5 The Robin Hood Hacker 91 Chapter 6 The Wisdom and Folly of Penetration Testing 115 Chapter 7 Of Course Your Bank Is Secure — Right? 139 Chapter 8 Your Intellectual Property Isn’t Safe 153 Chapter 9 On the Continent 195 Chapter 10 Social Engineers — How They Work and How to Stop Them 221 Chapter 11 Short Takes 247 Index 261

    3 in stock

    £12.60

  • Security in Computing

    Pearson Education (US) Security in Computing

    3 in stock

    Book SynopsisCharles P. Pfleeger is an internationally known expert on computer and communications security. He spent 14 years as professor of computer science at the University of Tennessee, before moving on to computer research and consulting company, Trusted Information Systems, where he was director of European operations and senior consultant. He was also director of research, member of the staff, and chief security officer at Cable and Wireless. He has chaired the IEEE Computer Society Technical Committee on Security and Privacy and was on the editorial board of IEEE Security & Privacy magazine. Shari Lawrence Pfleeger is a widely known software engineering and computer security researcher. She served as president of Systems/Software and then as senior researcher with the Rand Corporation. As research director of the Institute for Information Infrastructure Protection, she oversaw large, high-impact computer security research projects for iTable of ContentsForeword xixPreface xxvAcknowledgments xxxiAbout the Authors xxxiii Chapter 1: Introduction 11.1 What Is Computer Security? 31.2 Threats 61.3 Harm 241.4 Vulnerabilities 301.5 Controls 301.6 Conclusion 331.7 What's Next? 341.8 Exercises 36 Chapter 2: Toolbox: Authentication, Access Control, and Cryptography 382.1 Authentication 402.2 Access Control 782.3 Cryptography 932.4 Conclusion 1372.5 Exercises 138 Chapter 3: Programs and Programming 1413.1 Unintentional (Nonmalicious) Programming Oversights 1433.2 Malicious Code--Malware 1783.3 Countermeasures 2113.4 Conclusion 2453.5 Exercises 245 Chapter 4: The Internet--User Side 2484.1 Browser Attacks 2514.2 Attacks Targeting Users 2654.3 Obtaining User or Website Data 2804.4 Mobile Apps 2894.5 Email and Message Attacks 3104.6 Conclusion 3204.7 Exercises 321 Chapter 5: Operating Systems 3235.1 Security in Operating Systems 3235.2 Security in the Design of Operating Systems 3515.3 Rootkits 3715.4 Conclusion 3825.5 Exercises 382 Chapter 6: Networks 3856.1 Network Concepts 386Part I--War on Networks: Network Security Attacks 3996.2 Threats to Network Communications 4006.3 Wireless Network Security 4216.4 Denial of Service 4436.5 Distributed Denial of Service 468Part II--Strategic Defenses: Security Countermeasures 4796.6 Cryptography in Network Security 4796.7 Firewalls 4976.8 Intrusion Detection and Prevention Systems 5226.9 Network Management 5366.10 Conclusion 5456.11 Exercises 545 Chapter 7: Data and Databases 5497.1 Introduction to Databases 5507.2 Security Requirements of Databases 5557.3 Reliability and Integrity 5617.4 Database Disclosure 5667.5 Data Mining and Big Data 5857.6 Conclusion 5997.7 Exercises 599 Chapter 8: New Territory 6018.1 Introduction 6018.2 Cloud Architectures and Their Security 6058.3 IoT and Embedded Devices 6278.4 Cloud, IoT, and Embedded Devices--The Smart Home 6388.5 Smart Cities, IoT, Embedded Devices, and Cloud 6438.6 Cloud, IoT, and Critical Services 6488.7 Conclusion 6578.8 Exercises 658 Chapter 9: Privacy 6599.1 Privacy Concepts 6609.2 Privacy Principles and Policies 6719.3 Authentication and Privacy 6889.4 Data Mining 6949.5 Privacy on the Internet 6989.6 Email and Message Security 7139.7 Privacy Impacts of Newer Technologies 7179.8 Conclusion 7249.9 Exercises 725 Chapter 10: Management and Incidents 72710.1 Security Planning 72710.2 Business Continuity Planning 73810.3 Handling Incidents 74210.4 Risk Analysis 74910.5 Physical Threats to Systems 76710.6 New Frontiers in Security Management 77610.7 Conclusion 77810.8 Exercises 779 Chapter 11: Legal Issues and Ethics 78111.1 Protecting Programs and Data 78311.2 Information and the Law 80011.3 Rights of Employees and Employers 80511.4 Redress for Software Failures 80811.5 Computer Crime 81411.6 Ethical Issues in Computer Security 82211.7 An Ethical Dive into Artificial Intelligence 82811.8 Incident Analyses with Ethics 83011.9 Conclusion 84611.10 Exercises 847 Chapter 12: Details of Cryptography 85012.1 Cryptology 85112.2 Symmetric Encryption Algorithms 86312.3 Asymmetric Encryption 87712.4 Message Digests 88312.5 Digital Signatures 88812.6 Quantum Key Distribution 88912.7 Conclusion 894 Chapter 13: Emerging Topics 89513.1 AI and Cybersecurity 89613.2 Blockchains and Cryptocurrencies 90813.3 Offensive Cyber and Cyberwarfare 92413.4 Quantum Computing and Computer Security 93613.5 Conclusion 937 Bibliography 939Index 963

    3 in stock

    £85.72

  • System Administration Ethics

    APress System Administration Ethics

    3 in stock

    Book SynopsisSuccessfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today''s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You''ll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You''ll also see hTable of ContentsSystem Administration EthicsChapter 1: In the BeginningChapter 2: Separate RolesChapter 3: Respect PrivacyChapter 4: Do Not Change DataChapter 5: Don't Steal (Intellectual Property)Chapter 6: Don't Steal (Computers)Chapter 7: Do Not Go Where You Are Not WantedChapter 8: Follow Procedures and Get OutChapter 9: Communicate ChangeChapter 10: Do No HarmChapter 11: Break Glass

    3 in stock

    £49.49

  • Computer Security Fundamentals

    Pearson Education (US) Computer Security Fundamentals

    2 in stock

    Book SynopsisDr. Chuck Easttom is the author of 37 books, including several on computer security, forensics, and cryptography. He has also authored scientific papers on digital forensics, cyber warfare, cryptography, and applied mathematics. He is an inventor with 25 computer science patents. He holds a doctor of science degree in cybersecurity (dissertation topic: a study of lattice-based algorithms for post quantum cryptography), a Ph.D. in Computer Science (dissertation topic: A Systematic Framework for Network Forensics Using Graph Theory), and a Ph.D. in Nanotechnology (dissertation topic: The Effects of Complexity on Carbon Nanotube Failures) and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He also holds more than 70 industry certifications (CISSP, CEH, etc.). He is a frequent speaker at cybersecurity, computer science, and engineering conferences. He is a Distinguished Speaker and senior member of the ACM and Table of ContentsIntroduction xxix Chapter 1: Introduction to Computer Security 2 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 How Seriously Should You Take Threats to Network Security?. . . . . . . . . . 4 Identifying Types of Threats.. . . . . . . . . . . . . . . . . . . . . . . . 7 Assessing the Likelihood of an Attack on Your Network.. . . . . . . . . . . . 17 Basic Security Terminology. . . . . . . . . . . . . . . . . . . . . . . . 18 Concepts and Approaches.. . . . . . . . . . . . . . . . . . . . . . . . 21 How Do Legal Issues Impact Network Security?.. . . . . . . . . . . . . . . 24 Online Security Resources.. . . . . . . . . . . . . . . . . . . . . . . . 25 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2: Networks and the Internet 34 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Network Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 How the Internet Works. . . . . . . . . . . . . . . . . . . . . . . . . 43 History of the Internet.. . . . . . . . . . . . . . . . . . . . . . . . . . 50 Basic Network Utilities.. . . . . . . . . . . . . . . . . . . . . . . . . 52 Other Network Devices.. . . . . . . . . . . . . . . . . . . . . . . . . 59 Advanced Network Communications Topics.. . . . . . . . . . . . . . . . 60 Cloud Computing. . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Chapter 3: Cyber Stalking, Fraud, and Abuse 74 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 How Internet Fraud Works.. . . . . . . . . . . . . . . . . . . . . . . . 75 Identity Theft.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Cyber Stalking.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Protecting Yourself Against Cybercrime.. . . . . . . . . . . . . . . . . . 91 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Chapter 4: Denial of Service Attacks 106 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 DoS Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Illustrating an Attack.. . . . . . . . . . . . . . . . . . . . . . . . . . 107 Common Tools Used for DoS Attacks.. . . . . . . . . . . . . . . . . . . 109 DoS Weaknesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Specific DoS Attacks. . . . . . . . . . . . . . . . . . . . . . . . . . 112 Real-World Examples of DoS Attacks.. . . . . . . . . . . . . . . . . . . 120 How to Defend Against DoS Attacks.. . . . . . . . . . . . . . . . . . . 121 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Chapter 5: Malware 130 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Viruses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Trojan Horses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 The Buffer-Overflow Attack. . . . . . . . . . . . . . . . . . . . . . . 145 Spyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Other Forms of Malware.. . . . . . . . . . . . . . . . . . . . . . . . 149 Detecting and Eliminating Viruses and Spyware. . . . . . . . . . . . . . . 153 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Chapter 6: Techniques Used by Hackers 166 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Basic Terminology.. . . . . . . . . . . . . . . . . . . . . . . . . . . 167 The Reconnaissance Phase.. . . . . . . . . . . . . . . . . . . . . . . 167 Actual Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Malware Creation. . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Penetration Testing.. . . . . . . . . . . . . . . . . . . . . . . . . . 187 The Dark Web. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Chapter 7: Industrial Espionage in Cyberspace 200 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 What Is Industrial Espionage?.. . . . . . . . . . . . . . . . . . . . . . 202 Information as an Asset. . . . . . . . . . . . . . . . . . . . . . . . . 203 Real-World Examples of Industrial Espionage.. . . . . . . . . . . . . . . 205 How Does Espionage Occur?. . . . . . . . . . . . . . . . . . . . . . 207 Protecting Against Industrial Espionage.. . . . . . . . . . . . . . . . . . 212 Trade Secrets.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 The Industrial Espionage Act.. . . . . . . . . . . . . . . . . . . . . . 218 Spear Phishing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Chapter 8: Encryption 226 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Cryptography Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 227 History of Encryption.. . . . . . . . . . . . . . . . . . . . . . . . . . 228 Modern Cryptography Methods.. . . . . . . . . . . . . . . . . . . . . 236 Public Key (Asymmetric) Encryption.. . . . . . . . . . . . . . . . . . . 245 PGP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Legitimate Versus Fraudulent Encryption Methods.. . . . . . . . . . . . . 251 Digital Signatures. . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Hashing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 MAC and HMAC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Cryptanalysis.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Cryptography Used on the Internet.. . . . . . . . . . . . . . . . . . . . 259 Quantum Computing Cryptography. . . . . . . . . . . . . . . . . . . . 259 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Chapter 9: Computer Security Technology 268 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Virus Scanners.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Antispyware.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 IDSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Digital Certificates.. . . . . . . . . . . . . . . . . . . . . . . . . . . 292 SSL/TLS.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Virtual Private Networks.. . . . . . . . . . . . . . . . . . . . . . . . 296 Wi-Fi Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Chapter 10: Security Policies 304 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 What Is a Policy?.. . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Important Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 305 Defining User Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 308 Defining System Administration Policies.. . . . . . . . . . . . . . . . . . 316 Security Breaches.. . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Defining Access Control.. . . . . . . . . . . . . . . . . . . . . . . . 321 Development Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 322 Standards, Guidelines, and Procedures.. . . . . . . . . . . . . . . . . . 323 Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Zero Trust.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Important Laws.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Chapter 11: Network Scanning and Vulnerability Scanning 336 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Basics of Assessing a System.. . . . . . . . . . . . . . . . . . . . . . 337 Securing Computer Systems.. . . . . . . . . . . . . . . . . . . . . . 346 Scanning Your Network. . . . . . . . . . . . . . . . . . . . . . . . . 352 Testing and Scanning Standards.. . . . . . . . . . . . . . . . . . . . . 363 Getting Professional Help.. . . . . . . . . . . . . . . . . . . . . . . . 366 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Chapter 12: Cyber Terrorism and Information Warfare 378 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 379 Weapons of Cyber Warfare.. . . . . . . . . . . . . . . . . . . . . . . 382 Economic Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Military Operations Attacks. . . . . . . . . . . . . . . . . . . . . . . 386 General Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Supervisory Control and Data Acquisitions (SCADA).. . . . . . . . . . . . . 387 Information Warfare.. . . . . . . . . . . . . . . . . . . . . . . . . . 388 Actual Cases of Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 391 Future Trends.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Defense Against Cyber Terrorism.. . . . . . . . . . . . . . . . . . . . . 399 Terrorist Recruiting and Communication.. . . . . . . . . . . . . . . . . . 399 TOR and the Dark Web.. . . . . . . . . . . . . . . . . . . . . . . . . 400 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Chapter 13: Cyber Detective 408 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 General Searches. . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Company Searches.. . . . . . . . . . . . . . . . . . . . . . . . . . 413 Court Records and Criminal Checks.. . . . . . . . . . . . . . . . . . . 413 Usenet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417 Google.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Maltego. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421 Chapter 14: Introduction to Forensics 426 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 General Guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Finding Evidence on a PC. . . . . . . . . . . . . . . . . . . . . . . . 440 Finding Evidence in System Logs.. . . . . . . . . . . . . . . . . . . . 441 Getting Back Deleted Files.. . . . . . . . . . . . . . . . . . . . . . . 442 Operating System Utilities. . . . . . . . . . . . . . . . . . . . . . . . 445 The Windows Registry. . . . . . . . . . . . . . . . . . . . . . . . . 447 Mobile Forensics: Cell Phone Concepts.. . . . . . . . . . . . . . . . . . 452 The Need for Forensic Certification.. . . . . . . . . . . . . . . . . . . . 457 Expert Witnesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 458 Additional Types of Forensics.. . . . . . . . . . . . . . . . . . . . . . 459 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 Chapter 15: Cybersecurity Engineering 466 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Defining Cybersecurity Engineering.. . . . . . . . . . . . . . . . . . . . 467 Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 SecML. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 Modeling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 Glossary 494 Appendix A: Resources 500 Appendix B: Answers to the Multiple Choice Questions 502 9780137984787, TOC, 12/6/2022

    2 in stock

    £60.29

  • IdentityNative Infrastructure Access Management

    O'Reilly Media IdentityNative Infrastructure Access Management

    10 in stock

    Book SynopsisIn this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity.

    10 in stock

    £27.74

  • The Web Application Hackers Handbook

    John Wiley & Sons Inc The Web Application Hackers Handbook

    1 in stock

    Book SynopsisThe highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users.Table of ContentsIntroduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 “This Site Is Secure” 7 The Core Security Problem: Users Can Submit Arbitrary Input 9 Key Problem Factors 10 The New Security Perimeter 12 The Future of Web Application Security 14 Summary 15 Chapter 2 Core Defense Mechanisms 17 Handling User Access 18 Authentication 18 Session Management 19 Access Control 20 Handling User Input 21 Varieties of Input 21 Approaches to Input Handling 23 Boundary Validation 25 Multistep Validation and Canonicalization 28 Handling Attackers 30 Handling Errors 30 Maintaining Audit Logs 31 Alerting Administrators 33 Reacting to Attacks 34 Managing the Application 35 Summary 36 Questions 36 Chapter 3 Web Application Technologies 39 The HTTP Protocol 39 HTTP Requests 40 HTTP Responses 41 HTTP Methods 42 URLs 44 Rest 44 HTTP Headers 45 Cookies 47 Status Codes 48 Https 49 HTTP Proxies 49 HTTP Authentication 50 Web Functionality 51 Server-Side Functionality 51 Client-Side Functionality 57 State and Sessions 66 Encoding Schemes 66 URL Encoding 67 Unicode Encoding 67 HTML Encoding 68 Base64 Encoding 69 Hex Encoding 69 Remoting and Serialization Frameworks 70 Next Steps 70 Questions 71 Chapter 4 Mapping the Application 73 Enumerating Content and Functionality 74 Web Spidering 74 User-Directed Spidering 77 Discovering Hidden Content 80 Application Pages Versus Functional Paths 93 Discovering Hidden Parameters 96 Analyzing the Application 97 Identifying Entry Points for User Input 98 Identifying Server-Side Technologies 101 Identifying Server-Side Functionality 107 Mapping the Attack Surface 111 Summary 114 Questions 114 Chapter 5 Bypassing Client-Side Controls 117 Transmitting Data Via the Client 118 Hidden Form Fields 118 HTTP Cookies 121 URL Parameters 121 The Referer Header 122 Opaque Data 123 The ASP.NET ViewState 124 Capturing User Data: HTML Forms 127 Length Limits 128 Script-Based Validation 129 Disabled Elements 131 Capturing User Data: Browser Extensions 133 Common Browser Extension Technologies 134 Approaches to Browser Extensions 135 Intercepting Traffic from Browser Extensions 135 Decompiling Browser Extensions 139 Attaching a Debugger 151 Native Client Components 153 Handling Client-Side Data Securely 154 Transmitting Data Via the Client 154 Validating Client-Generated Data 155 Logging and Alerting 156 Summary 156 Questions 157 Chapter 6 Attacking Authentication 159 Authentication Technologies 160 Design Flaws in Authentication Mechanisms 161 Bad Passwords 161 Brute-Forcible Login 162 Verbose Failure Messages 166 Vulnerable Transmission of Credentials 169 Password Change Functionality 171 Forgotten Password Functionality 173 “Remember Me” Functionality 176 User Impersonation Functionality 178 Incomplete Validation of Credentials 180 Nonunique Usernames 181 Predictable Usernames 182 Predictable Initial Passwords 183 Insecure Distribution of Credentials 184 Implementation Flaws in Authentication 185 Fail-Open Login Mechanisms 185 Defects in Multistage Login Mechanisms 186 Insecure Storage of Credentials 190 Securing Authentication 191 Use Strong Credentials 192 Handle Credentials Secretively 192 Validate Credentials Properly 193 Prevent Information Leakage 195 Prevent Brute-Force Attacks 196 Prevent Misuse of the Password Change Function 199 Prevent Misuse of the Account Recovery Function 199 Log, Monitor, and Notify 201 Summary 201 Questions 202 Chapter 7 Attacking Session Management 205 The Need for State 206 Alternatives to Sessions 208 Weaknesses in Token Generation 210 Meaningful Tokens 210 Predictable Tokens 213 Encrypted Tokens 223 Weaknesses in Session Token Handling 233 Disclosure of Tokens on the Network 234 Disclosure of Tokens in Logs 237 Vulnerable Mapping of Tokens to Sessions 240 Vulnerable Session Termination 241 Client Exposure to Token Hijacking 243 Liberal Cookie Scope 244 Securing Session Management 248 Generate Strong Tokens 248 Protect Tokens Throughout Their Life Cycle 250 Log, Monitor, and Alert 253 Summary 254 Questions 255 Chapter 8 Attacking Access Controls 257 Common Vulnerabilities 258 Completely Unprotected Functionality 259 Identifier-Based Functions 261 Multistage Functions 262 Static Files 263 Platform Misconfiguration 264 Insecure Access Control Methods 265 Attacking Access Controls 266 Testing with Different User Accounts 267 Testing Multistage Processes 271 Testing with Limited Access 273 Testing Direct Access to Methods 276 Testing Controls Over Static Resources 277 Testing Restrictions on HTTP Methods 278 Securing Access Controls 278 A Multilayered Privilege Model 280 Summary 284 Questions 284 Chapter 9 Attacking Data Stores 287 Injecting into Interpreted Contexts 288 Bypassing a Login 288 Injecting into SQL 291 Exploiting a Basic Vulnerability 292 Injecting into Different Statement Types 294 Finding SQL Injection Bugs 298 Fingerprinting the Database 303 The UNION Operator 304 Extracting Useful Data 308 Extracting Data with UNION 308 Bypassing Filters 311 Second-Order SQL Injection 313 Advanced Exploitation 314 Beyond SQL Injection: Escalating the Database Attack 325 Using SQL Exploitation Tools 328 SQL Syntax and Error Reference 332 Preventing SQL Injection 338 Injecting into NoSQL 342 Injecting into MongoDB 343 Injecting into XPath 344 Subverting Application Logic 345 Informed XPath Injection 346 Blind XPath Injection 347 Finding XPath Injection Flaws 348 Preventing XPath Injection 349 Injecting into LDAP 349 Exploiting LDAP Injection 351 Finding LDAP Injection Flaws 353 Preventing LDAP Injection 354 Summary 354 Questions 354 Chapter 10 Attacking Back-End Components 357 Injecting OS Commands 358 Example 1: Injecting Via Perl 358 Example 2: Injecting Via ASP 360 Injecting Through Dynamic Execution 362 Finding OS Command Injection Flaws 363 Finding Dynamic Execution Vulnerabilities 366 Preventing OS Command Injection 367 Preventing Script Injection Vulnerabilities 368 Manipulating File Paths 368 Path Traversal Vulnerabilities 368 File Inclusion Vulnerabilities 381 Injecting into XML Interpreters 383 Injecting XML External Entities 384 Injecting into SOAP Services 386 Finding and Exploiting SOAP Injection 389 Preventing SOAP Injection 390 Injecting into Back-end HTTP Requests 390 Server-side HTTP Redirection 390 HTTP Parameter Injection 393 Injecting into Mail Services 397 E-mail Header Manipulation 398 SMTP Command Injection 399 Finding SMTP Injection Flaws 400 Preventing SMTP Injection 402 Summary 402 Questions 403 Chapter 11 Attacking Application Logic 405 The Nature of Logic Flaws 406 Real-World Logic Flaws 406 Example 1: Asking the Oracle 407 Example 2: Fooling a Password Change Function 409 Example 3: Proceeding to Checkout 410 Example 4: Rolling Your Own Insurance 412 Example 5: Breaking the Bank 414 Example 6: Beating a Business Limit 416 Example 7: Cheating on Bulk Discounts 418 Example 8: Escaping from Escaping 419 Example 9: Invalidating Input Validation 420 Example 10: Abusing a Search Function 422 Example 11: Snarfing Debug Messages 424 Example 12: Racing Against the Login 426 Avoiding Logic Flaws 428 Summary 429 Questions 430 Chapter 12 Attacking Users: Cross-Site Scripting 431 Varieties of XSS 433 Reflected XSS Vulnerabilities 434 Stored XSS Vulnerabilities 438 DOM-Based XSS Vulnerabilities 440 XSS Attacks in Action 442 Real-World XSS Attacks 442 Payloads for XSS Attacks 443 Delivery Mechanisms for XSS Attacks 447 Finding and Exploiting XSS Vulnerabilities 451 Finding and Exploiting Reflected XSS Vulnerabilities 452 Finding and Exploiting Stored XSS Vulnerabilities 481 Finding and Exploiting DOM-Based XSS Vulnerabilities 487 Preventing XSS Attacks 492 Preventing Reflected and Stored XSS 492 Preventing DOM-Based XSS 496 Summary 498 Questions 498 Chapter 13 Attacking Users: Other Techniques 501 Inducing User Actions 501 Request Forgery 502 UI Redress 511 Capturing Data Cross-Domain 515 Capturing Data by Injecting HTML 516 Capturing Data by Injecting CSS 517 JavaScript Hijacking 519 The Same-Origin Policy Revisited 524 The Same-Origin Policy and Browser Extensions 525 The Same-Origin Policy and HTML 5 528 Crossing Domains with Proxy Service Applications 529 Other Client-Side Injection Attacks 531 HTTP Header Injection 531 Cookie Injection 536 Open Redirection Vulnerabilities 540 Client-Side SQL Injection 547 Client-Side HTTP Parameter Pollution 548 Local Privacy Attacks 550 Persistent Cookies 550 Cached Web Content 551 Browsing History 552 Autocomplete 552 Flash Local Shared Objects 553 Silverlight Isolated Storage 553 Internet Explorer userData 554 HTML5 Local Storage Mechanisms 554 Preventing Local Privacy Attacks 554 Attacking ActiveX Controls 555 Finding ActiveX Vulnerabilities 556 Preventing ActiveX Vulnerabilities 558 Attacking the Browser 559 Logging Keystrokes 560 Stealing Browser History and Search Queries 560 Enumerating Currently Used Applications 560 Port Scanning 561 Attacking Other Network Hosts 561 Exploiting Non-HTTP Services 562 Exploiting Browser Bugs 563 DNS Rebinding 563 Browser Exploitation Frameworks 564 Man-in-the-Middle Attacks 566 Summary 568 Questions 568 Chapter 14 Automating Customized Attacks 571 Uses for Customized Automation 572 Enumerating Valid Identifiers 573 The Basic Approach 574 Detecting Hits 574 Scripting the Attack 576 JAttack 577 Harvesting Useful Data 583 Fuzzing for Common Vulnerabilities 586 Putting It All Together: Burp Intruder 590 Barriers to Automation 602 Session-Handling Mechanisms 602 CAPTCHA Controls 610 Summary 613 Questions 613 Chapter 15 Exploiting Information Disclosure 615 Exploiting Error Messages 615 Script Error Messages 616 Stack Traces 617 Informative Debug Messages 618 Server and Database Messages 619 Using Public Information 623 Engineering Informative Error Messages 624 Gathering Published Information 625 Using Inference 626 Preventing Information Leakage 627 Use Generic Error Messages 628 Protect Sensitive Information 628 Minimize Client-Side Information Leakage 629 Summary 629 Questions 630 Chapter 16 Attacking Native Compiled Applications 633 Buffer Overflow Vulnerabilities 634 Stack Overflows 634 Heap Overflows 635 “Off-by-One” Vulnerabilities 636 Detecting Buffer Overflow Vulnerabilities 639 Integer Vulnerabilities 640 Integer Overflows 640 Signedness Errors 641 Detecting Integer Vulnerabilities 642 Format String Vulnerabilities 643 Detecting Format String Vulnerabilities 644 Summary 645 Questions 645 Chapter 17 Attacking Application Architecture 647 Tiered Architectures 647 Attacking Tiered Architectures 648 Securing Tiered Architectures 654 Shared Hosting and Application Service Providers 656 Virtual Hosting 657 Shared Application Services 657 Attacking Shared Environments 658 Securing Shared Environments 665 Summary 667 Questions 667 Chapter 18 Attacking the Application Server 669 Vulnerable Server Configuration 670 Default Credentials 670 Default Content 671 Directory Listings 677 WebDAV Methods 679 The Application Server as a Proxy 682 Misconfigured Virtual Hosting 683 Securing Web Server Configuration 684 Vulnerable Server Software 684 Application Framework Flaws 685 Memory Management Vulnerabilities 687 Encoding and Canonicalization 689 Finding Web Server Flaws 694 Securing Web Server Software 695 Web Application Firewalls 697 Summary 699 Questions 699 Chapter 19 Finding Vulnerabilities in Source Code 701 Approaches to Code Review 702 Black-Box Versus White-Box Testing 702 Code Review Methodology 703 Signatures of Common Vulnerabilities 704 Cross-Site Scripting 704 SQL Injection 705 Path Traversal 706 Arbitrary Redirection 707 OS Command Injection 708 Backdoor Passwords 708 Native Software Bugs 709 Source Code Comments 710 The Java Platform 711 Identifying User-Supplied Data 711 Session Interaction 712 Potentially Dangerous APIs 713 Configuring the Java Environment 716 ASP.NET 718 Identifying User-Supplied Data 718 Session Interaction 719 Potentially Dangerous APIs 720 Configuring the ASP.NET Environment 723 PHP 724 Identifying User-Supplied Data 724 Session Interaction 727 Potentially Dangerous APIs 727 Configuring the PHP Environment 732 Perl 735 Identifying User-Supplied Data 735 Session Interaction 736 Potentially Dangerous APIs 736 Configuring the Perl Environment 739 JavaScript 740 Database Code Components 741 SQL Injection 741 Calls to Dangerous Functions 742 Tools for Code Browsing 743 Summary 744 Questions 744 Chapter 20 A Web Application Hacker’s Toolkit 747 Web Browsers 748 Internet Explorer 748 Firefox 749 Chrome 750 Integrated Testing Suites 751 How the Tools Work 751 Testing Work Flow 769 Alternatives to the Intercepting Proxy 771 Standalone Vulnerability Scanners 773 Vulnerabilities Detected by Scanners 774 Inherent Limitations of Scanners 776 Technical Challenges Faced by Scanners 778 Current Products 781 Using a Vulnerability Scanner 783 Other Tools 785 Wikto/Nikto 785 Firebug 785 Hydra 785 Custom Scripts 786 Summary 789 Chapter 21 A Web Application Hacker’s Methodology 791 General Guidelines 793 1 Map the Application’s Content 795 2 Analyze the Application 798 3 Test Client-Side Controls 800 4 Test the Authentication Mechanism 805 5 Test the Session Management Mechanism 814 6 Test Access Controls 821 7 Test for Input-Based Vulnerabilities 824 8 Test for Function-Specific Input Vulnerabilities 836 9 Test for Logic Flaws 842 10 Test for Shared Hosting Vulnerabilities 845 11 Test for Application Server Vulnerabilities 846 12 Miscellaneous Checks 849 13 Follow Up Any Information Leakage 852 Index 853

    1 in stock

    £36.80

  • Securing Office 365

    APress Securing Office 365

    2 in stock

    Book Synopsis Understand common security pitfalls and discover weak points in your organization''s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines,  and distribution  of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today''s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365.  You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security  services in Office 365 to protect and manage your business. Table of Contents1. Why Security and Compliance 2. Azure and Office 365 Security 3. Office 365- Security Score 4. Office 365- Deploying Identity Management with EMS 5. Office 365- Mobile Device Management with EMS 6. Using Office 365 Compliance Center 7. Migration Step by Step 8. Managing Your Office 365

    2 in stock

    £48.74

  • Privileged Attack Vectors

    APress Privileged Attack Vectors

    2 in stock

    Book SynopsisSee how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today''s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding univerTable of Contents

    2 in stock

    £48.74

  • The Perfect Weapon: war, sabotage, and fear in

    Scribe Publications The Perfect Weapon: war, sabotage, and fear in

    2 in stock

    Book SynopsisFrom Russia’s tampering with the US election to the WannaCry hack that temporarily crippled the NHS, cyber has become the weapon of choice for democracies, dictators, and terrorists. Cheap to acquire, easily deniable, and used for a variety of malicious purposes — from crippling infrastructure to sowing discord and doubt — cyberweapons are re-writing the rules of warfare. In less than a decade, they have displaced terrorism and nuclear missiles as the biggest immediate threat to international security and to democracy. Here, New York Times correspondent David E. Sanger takes us from the White House Situation Room to the dens of Chinese government hackers and the boardrooms of Silicon Valley, piecing together a remarkable picture of a world now coming face-to-face with the most sophisticated — and arguably most dangerous — weapon ever invented. The Perfect Weapon is the dramatic story of a new era of constant sabotage, misinformation, and fear, in which everyone is a target. Trade Review‘This encyclopedic account by a Times correspondent traces the rapid rise of cyberwarfare capabilities and warns that ideas about how to control them are only beginning to emerge.’ * The New York Times Book Review (Editor’s Choice) *‘[Sanger] writes with persuasiveness and authority.’ * The Telegraph *‘In a chilling new book, The Perfect Weapon, David Sanger details how more than 30 nations have developed effective cyber forces.’ * Financial Times *‘An encyclopedic account of policy-relevant happenings in the cyberworld … the most comprehensive, readable source of information and insight about the policy quandaries that modern information technology and its destructive potential have spawned.’ -- Paul R. Pillar * The New York Times *‘[The Perfect Weapon is] an important – and deeply sobering – new book about cyberwarfare.’ -- Nicholas Kristof * The New York Times *‘A reader finishes this book fully understanding why cyberwar has moved rapidly to the top of America’s official list of national security threats.’ -- David von Drehle * The Washington Post *‘In his new book, The Perfect Weapon, Sanger offers a panoramic view of the rapidly evolving world of cyber-conflict. He covers incidents from the covert U.S. cyber-campaign to sabotage Iran’s nuclear program (a story we know about largely because of Sanger’s diligent reporting) to Edward Snowden’s epic heist of National Security Agency data. And yes, there’s also plenty of background on Russia’s active measures during the 2016 campaign. But there’s also a wealth of gripping material on stories that have probably been missed by the broader public … It all adds up to a persuasive argument for the truth of the book’s title.’ -- Christian Caryl * The Washington Post *‘Anyone who doubts cyber’s unintended consequences should read David Sanger’s new book The Perfect Weapon. Sanger, a reporter for The New York Times, has been a dogged and diligent observer of cybersecurity issues for years. His book is a readable account of what went wrong.’ -- Robert Samuelson * The Washington Post *‘Computer and cyber warfare is a burgeoning mode of conflict that poses serious threats to the United States, Pulitzer-winning New York Times correspondent Sanger (Confront and Conceal) argues in this perhaps overly worried investigation. Sanger gives a lucid account of national programs for digital espionage and warfare, but it’s not always clear that the various technologies described hold much danger; for example, he doesn’t make a strong case that Russian spoofing of social media accounts really undermines American democracy. Readers could use a more thorough exploration of the limitations of supposedly perfect digital weapons.’ * Publishers Weekly *‘You may not have realised it but we are at war. A world war. And it’s not clear who’s winning or who will ultimately win, but the battleground is vast — cyberspace … David E. Sanger sums up where we are and where we could be heading.’ -- Jon Wise * Weekend Sport *‘[A] sobering new book.’ -- John Naughton * The Guardian *‘The book’s greatest strength is in how Sanger captures the complexities of cyber weapons and cyber operations to illustrate the internal dynamics of the Obama administration as it grappled with these emerging capabilities … Where he falls a bit short is on the other side of the equation, where those principles fell somewhat short. Apple for all of its stances on privacy and protecting consumer information bent over backwards to accommodate the Chinese government … It is well reported, well sourced, and his access provides insights into what many of the key players were thinking at the time and in the years since their tenure ended … For lay readers, The Perfect Weapon is a great one-volume precis on recent cyber war.’ * Joshua Huminski, The Diplomatic Courier *‘The Perfect Weapon may be one of the most important, if chilling, books you’ll read this year.’ * The Saturday Age *‘Sanger, The New York Times’ security correspondent, has catalogued the recent history of cyber warfare, how it needs to be confronted and the intensely complex policy issues that arise. This is the last word in the modern world of cyber warfare – until artificial intelligence takes over.’ * Mercury *‘Sanger, The New York Times’ security correspondent, has catalogued the recent history of how cyber warfare has developed, how it needs to be confronted, and the intensely complex policy issues that arise.’ * Courier Mail *‘The greatest virtue of Sanger’s writing is that it is clear-headed and morally grounded, not in any way breathless or apocalyptic.’ -- Paul Monk * Weekend Australian *‘For the rest of the lay public, this very accessible book by New York Times journalist David Sanger is an outstanding volume to fill in the gaps.’ -- Anthony Smith * NZ International Review *Praise for The Inheritance:‘[Sanger is] a shrewd and insightful strategic thinker.’ -- Gary J. Bass * The New York Times *

    2 in stock

    £13.49

  • Modern Security Operations Center The

    Pearson Education (US) Modern Security Operations Center The

    1 in stock

    Book SynopsisJoseph Muniz is an architect and security researcher in the Cisco Security Sales and Engineering Organization. He is driven by making the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architectures as a trusted advisor for top Fortune 500 corporations and the U.S. government. Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. Joseph runs The Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles ranging from security best practices to exploitation tactics. When Joseph is not using technology, you can find himTable of ContentsPreface Chapter 1: Introducing Security Operations and the SOC Introducing the SOCFactors Leading to a Dysfunctional SOCCyberthreatsInvesting in SecurityThe Impact of a BreachEstablishing a Baseline The Impact of ChangeFundamental Security Capabilities Signature Detection Behavior Detection Anomaly Detection Best of Breed vs. Defense in DepthStandards, Guidelines, and Frameworks NIST Cybersecurity Framework ISO 3100:2018 FIRST Service Frameworks Applying FrameworksIndustry Threat Models The Cyber Kill Chain Model The Diamond Model MITRE ATT&CK Model Choosing a Threat ModelVulnerabilities and Risk Endless VulnerabilitiesBusiness ChallengesIn-House vs. Outsourcing Services Advantages Services Disadvantages Hybrid ServicesSOC ServicesSOC Maturity Models SOC Maturity Assessment SOC Program MaturitySOC Goals Assessment Defining Goals SOC Goals Ranking Threats Ranking SOC Goals Assessment SummarizedSOC Capabilities Assessment Capability Maps SOC Capabilities Gaps Analysis Capability Map Next StepsSOC Development MilestonesSummaryReferencesChapter 2: Developing a Security Operations Center Mission Statement and Scope Statement Developing Mission and Scope Statements SOC Scope StatementDeveloping a SOCSOC Procedures Designing ProceduresSecurity Tools Evaluating Vulnerabilities Preventive Technologies Detection Technologies Mobile Device Security ConcernsPlanning a SOC Capacity Planning Developing a Capacity PlanDesigning a SOC Facility Physical SOC vs. Virtual SOC SOC Location SOC Interior SOC Rooms SOC Computer Rooms SOC LayoutsNetwork Considerations Segmentation Logical Segmentation Choosing Segmentation Client/Server Segmentation Active Directory Segmentation Throughput Connectivity and RedundancyDisaster RecoverySecurity Considerations Policy and Compliance Network Access Control EncryptionInternal Security Tools Intrusion Detection and Prevention Network Flow and Capturing Packets Change Management Host SystemsGuidelines and Recommendations for Securing Your SOC Network Tool CollaborationSOC Tools Reporting and Dashboards Throughput and Storage Centralized Data ManagementSummaryReferencesChapter 3: SOC Services Fundamental SOC Services SOC ChallengesThe Three Pillars of Foundational SOC Support Services Pillar 1: Work Environment Pillar 2: People Pillar 3: Technology Evaluating the Three Pillars of Foundational SOC Support ServicesSOC Service Areas FIRST’s CSIRT Developing SOC Service Areas In-House Services vs. External Services Contracted vs. Employee Job RolesSOC Service Job Goals Resource PlanningService Maturity: If You Build It, They Will ComeSOC Service 1: Risk Management Four Responses to Risk Reducing Risk Addressing RiskSOC Service 2: Vulnerability Management Vulnerability Management Best Practice Vulnerability Scanning Tools Penetration TestingSOC Service 3: Compliance Meeting Compliance with AuditsSOC Service 4: Incident Management NIST Special Publication 800-61 Revision 2 Incident Response Planning Incident Impact PlaybooksSOC Service 5: Analysis Static Analysis Dynamic AnalysisSOC Service 6: Digital ForensicsSOC Service 7: Situational and Security Awareness User TrainingSOC Service 8: Research and DevelopmentSummaryReferencesChapter 4: People and Process Career vs. JobDeveloping Job Roles General Schedule Pay Scale IT Industry Job Roles Common IT Job RolesSOC Job Roles Security Analyst Penetration Tester Assessment Officer Incident Responder Systems Analyst Security Administrator Security Engineer Security Trainer Security Architect Cryptographer/Cryptologist Forensic Engineer Chief Information Security OfficerNICE Cybersecurity Workforce Framework Nice Framework ComponentsRole TiersSOC Services and Associated Job Roles Risk Management Service Vulnerability Management Service Incident Management Service Analysis Service Compliance Service Digital Forensics Service Situational and Security Awareness Service Research and Development ServiceSoft Skills Evaluating Soft Skills SOC Soft SkillsSecurity Clearance RequirementsPre-InterviewingInterviewing Interview Prompter Post InterviewOnboarding Employees Onboarding RequirementsManaging PeopleJob RetentionTraining Training MethodsCertificationsCompany CultureSummaryReferencesChapter 5: Centralizing Data Data in the SOC Strategic and Tactical Data Data Structure Data Types Data ContextData-Focused Assessment Data Assessment Example: Antivirus Threat Mapping Data Applying Data Assessments to SOC ServicesLogs Log Types Log FormatsSecurity Information and Event Management SIEM Data Processing Data Correlation Data Enrichment SIEM Solution Planning SIEM TuningTroubleshooting SIEM Logging SIEM Troubleshooting Part 1: Data Input SIEM Troubleshooting Part 2: Data Processing and Validation SIEM Troubleshooting Examples Additional SIEM FeaturesAPIs Leveraging APIs API Architectures API ExamplesBig Data Hadoop Big Data Threat FeedsMachine Learning Machine Learning in Cybersecurity Artificial Intelligence Machine Learning ModelsSummaryReferencesChapter 6: Reducing Risk and Exceeding ComplianceWhy Exceeding CompliancePolicies Policy Overview Policy Purpose Policy Scope Policy Statement Policy Compliance Related Standards, Policies, Guidelines, and Processes Definitions and Terms HistoryLaunching a New Policy Steps for Launching a New PolicyPolicy Enforcement Certification and AccreditationProcedures Procedure DocumentTabletop Exercise Tabletop Exercise Options Tabletop Exercise Execution Tabletop Exercise Format Tabletop Exercise Template ExampleStandards, Guidelines, and Frameworks NIST Cybersecurity Framework ISO/IEC 27005 CIS Controls ISACA COBIT 2019 FIRST CSIRT Services Framework Exceeding ComplianceAudits Audit Example Internal Audits External Auditors Audit ToolsAssessments Assessment Types Assessment Results Assessment Template Vulnerability Scanners Assessment Program WeaknessesPenetration Test NIST Special Publication 800-115 Additional NIST SP 800-115 Guidance Penetration Testing Types Penetration Testing PlanningIndustry Compliance Compliance RequirementsSummaryReferencesChapter 7: Threat Intelligence Threat Intelligence Overview Threat DataThreat Intelligence Categories Strategic Threat Intelligence Tactical Threat Intelligence Operational Threat Intelligence Technical Threat IntelligenceThreat Intelligence Context Threat ContextEvaluating Threat Intelligence Threat Intelligence Checklist Content Quality Testing Threat IntelligencePlanning a Threat Intelligence Project Data Expectations for Strategic Threat Intelligence Data Expectations for Tactical Threat Intelligence Data Expectations for Operational Threat Intelligence Data Expectations for Technical Threat IntelligenceCollecting and Processing Intelligence Processing Nontechnical Data Operational Data and Web Processing Technical Processing Technical Threat Intelligence Resources Actionable Intelligence Security Tools and Threat IntelligenceFeedbackSummaryReferencesChapter 8: Threat Hunting and Incident Response Security IncidentsIncident Response LifecyclePhase 1: Preparation Assigning Tasks with Playbooks Communication Third-Party Interaction Law Enforcement Law Enforcement Risk Ticketing Systems Other Incident Response Planning Templates Phase 1: Preparation SummaryPhase 2: Detection and Analysis Incident Detection Core Security Capabilities Threat Analysis Detecting Malware Behavior Infected Systems Analyzing Artifacts Identifying Artifact Types Packing Files Basic Static Analysis Advanced Static Analysis Dynamic Analysis Phase 2: Detection and Analysis SummaryPhase 3: Containment, Eradication, and Recovery Containment Responding to Malware Threat Hunting Techniques Eradicate RecoveryDigital Forensics Digital Forensic Process First Responder Chain of Custody Working with Evidence Duplicating Evidence Hashes Forensic Static Analysis Recovering Data Forensic Dynamic Analysis Digital Forensics Summary Phase 3: Containment, Eradication, and Recovery SummaryPhase 4: Post-Incident Activity Post-Incident Response Process Phase 4: Post-Incident Response SummaryIncident Response Guidelines FIRST Services FrameworksSummaryReferencesChapter 9: Vulnerability Management Vulnerability Management Phase 1: Asset Inventory Phase 2: Information Management Phase 3: Risk Assessment Phase 4: Vulnerability Assessment Phase 5: Report and Remediate Phase 6: Respond and RepeatMeasuring Vulnerabilities Common Vulnerabilities and Exposures Common Vulnerability Scoring System CVSS StandardsVulnerability Technology Vulnerability Scanners Currency and Coverage Tuning Vulnerability Scanners Exploitation Tools Asset Management and Compliance Tools Network Scanners and Network Access Control Threat Detection ToolsVulnerability Management Service Scanning Services Vulnerability Management Service Roles Vulnerability Evaluation ProceduresVulnerability Response Vulnerability Accuracy Responding to Vulnerabilities Cyber Insurance Patching Systems Residual Risk Remediation Approval Reporting ExceptionsVulnerability Management Process SummarizedSummaryReferencesChapter 10: Data Orchestration Introduction to Data Orchestration Comparing SIEM and SOAR The Rise of XDRSecurity Orchestration, Automation, and Response SOAR Example: PhantomEndpoint Detection and Response EDR Example: CrowdStrikePlaybooks Playbook Components Constructing Playbooks Incident Response Consortium Playbook Examples: Malware OutbreakAutomation Automating Playbooks Common Targets for Automation Automation Pitfalls Playbook WorkflowDevOps Programming Data Management Text-File Formats Common Data Formats Data ModelingDevOps Tools DevOps Targets Manual DevOps Automated DevOps DevOps Lab Using Ansible Ansible PlaybooksBlueprinting with Osquery Running OsqueryNetwork Programmability Learning NetDevOps APIs NetDevOps ExampleCloud Programmability Orchestration in the Cloud Amazon DevOps SaaS DevOpsSummaryReferencesChapter 11: Future of the SOC All Eyes on SD-WAN and SASE VoIP Adoption As Prologue to SD-WAN Adoption Introduction of SD-WAN Challenges with the Traditional WAN SD-WAN to the Rescue SASE Solves SD-WAN Problems SASE Defined Future of SASEIT Services Provided by the SOC IT Operations Defined Hacking IT Services IT Services Evolving Future of IT ServicesFuture of Training Training Challenges Training Today Case Study: Training I Use Today Free Training Gamifying Learning On-Demand and Personalized Learning Future of TrainingFull Automation with Machine Learning Machine Learning Machine Learning Hurdles Machine Learning Applied Training Machine Learning Future of Machine LearningFuture of Your SOC: Bringing It All Together Your Future Facilities and Capabilities Group Tags Your Future SOC Staff Audits, Assessments, and Penetration Testing Future Impact to Your Services Hunting for Tomorrow’s ThreatsSummaryReferences9780135619858 TOC 3/24/2021

    1 in stock

    £35.99

  • Developing Cybersecurity Programs and Policies in

    Pearson Education Developing Cybersecurity Programs and Policies in

    2 in stock

    Book SynopsisOmar Santos is a Distinguished Engineer at Cisco, focusing on artificial intelligence (AI) security, cybersecurity research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the co-founder of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee.   Omar is the author of more than 25 books, 21 video courses, and more than 50 academic research papers. He is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. He employs his deep understanding of these disciplines to help orga

    2 in stock

    £60.29

  • Cybersecurity Blue Team Toolkit

    John Wiley & Sons Inc Cybersecurity Blue Team Toolkit

    2 in stock

    Book SynopsisA practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security asTable of ContentsForeword xxi Introduction xxiii Chapter 1 Fundamental Networking and Security Tools 1 Ping 1 IPConfig 4 NSLookup 7 Tracert 9 NetStat 10 PuTTY 14 Chapter 2 Troubleshooting Microsoft Windows 17 RELI 18 PSR 19 PathPing 21 MTR 23 Sysinternals 24 The Legendary God Mode 28 Chapter 3 Nmap—The Network Mapper 31 Network Mapping 32 Port Scanning 34 Services Running 36 Operating Systems 38 Zenmap 39 Chapter 4 Vulnerability Management 43 Managing Vulnerabilities 43 OpenVAS 46 Nexpose Community 50 Chapter 5 Monitoring with OSSEC 57 Log-Based Intrusion Detection Systems 57 Agents 61 Adding an Agent 63 Extracting the Key for an Agent 64 Removing an Agent 64 Log Analysis 65 Chapter 6 Protecting Wireless Communication 67 802.11 67 inSSIDer 70 Wireless Network Watcher 71 Hamachi 72 Tor 78 Chapter 7 Wireshark 83 Wireshark 83 OSI Model 86 Capture 89 Filters and Colors 92 Inspection 93 Chapter 8 Access Management 97 AAA 98 Least Privilege 99 Single Sign-On 101 JumpCloud 103 Chapter 9 Managing Logs 109 Windows Event Viewer 110 Windows PowerShell 112 BareTail 116 Syslog 117 SolarWinds Kiwi 120 Chapter 10 Metasploit 125 Reconnaissance 127 Installation 128 Gaining Access 135 Metasploitable2 139 Vulnerable Web Services 144 Meterpreter 146 Chapter 11 Web Application Security 147 Web Development 148 Information Gathering 151 DNS 153 Defense in Depth 155 Burp Suite 156 Chapter 12 Patch and Configuration Management 165 Patch Management 166 Configuration Management 173 Clonezilla Live 179 Chapter 13 Securing OSI Layer 8 187 Human Nature 188 Human Attacks 192 Education 193 The Social Engineer Toolkit 195 Chapter 14 Kali Linux 205 Virtualization 206 Optimizing Kali Linux 219 Using Kali Linux Tools 221 Maltego 222 Recon-ng 223 Sparta 225 MacChanger 225 Nikto 226 Kismet 227 WiFite 228 John the Ripper 229 Hashcat 230 Chapter 15 CISv7 Controls and Best Practices 235 CIS Basic Controls—The Top Six 236 Inventory and Control of Hardware Assets 236 Inventory and Control of Software Assets 238 Continuous Vulnerability Management 239 Controlled Use of Administrative Privileges 240 Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 241 Maintenance, Monitoring, and Analysis of Audit Logs 246 In Conclusion 248 Index 249

    2 in stock

    £26.40

  • Serverless Security

    APress Serverless Security

    2 in stock

    Book SynopsisApply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.At a time when there are many news stories on cybersecurity breaches, it is crucial to think about security in your applications. It is tempting to believe that having a third-party host the entire computing platform will increase security. This book shows you why cybersecurity is the responsibility of everyone working on the project.What You Will Learn Gain a deeper understanding of cybersecurity in serverless computing Know how to use free and open sourceTable of ContentsIntroduction Part I: The Need for Security Chapter 1: Determining Scope Understanding the Application Scoping Chapter 2: Performing a Risk Assessment Understanding the Threat Landscape Threat Modeling Preparing the Risk Assessment Part II: Securing the Application Chapter 3: Securing the Code Assessing Dependencies Using Static Code Analysis Tools Writing Unit Tests Chapter 4: Securing the Interfaces Identifying the Interfaces Determining the Interface Inputs Reducing the Attack Surface Chapter 5: Securing the Code Repository Using a Code Repository Limiting Saved Content Part III: Securing the Infrastructure Chapter 5: Restricting Permissions Understanding Permissions Identifying the Services Updating the Permissions Chapter 6: Account Management Understanding Account Access Restricting Account Access Implementing Multi-Factor Authentication Using Secrets Part IV: Monitoring and Alerting Chapter 7: Monitoring Logs Understanding Logging Methods Reviewing Logs Chapter 8: Monitoring Metrics Understanding Metrics Reviewing Metrics Chapter 9: Monitoring Billing Understanding Billing Reviewing Billing Chapter 10: Monitoring Security Events Understanding Security Events Reviewing Security Event Chapter 10: Alerting Understanding Alerting Implementing Alerting Chapter 11: Auditing Understanding Auditing Implementing Auditing Part V: Security Assessment and Report Chapter 12: Finalizing the Risk Assessment Scoring the Identified Risks Defining the Mitigation Steps Assessing the Business Impact Determining the Overall Security Risk Level

    2 in stock

    £41.24

  • Privacy and Identity Management. Fairness,

    Springer Nature Switzerland AG Privacy and Identity Management. Fairness,

    2 in stock

    Book SynopsisThis book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological. Table of ContentsA Causal Bayesian Networks Viewpoint on Fairness.- Sharing is caring, a boundary object approach to mapping and discussing personal data processing.- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice.- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report.- Towards Empowering the Human for Privacy Online.- Trust and Distrust: On Sense and Nonsense in Big Data.- GDPR transparency requirements and data privacy vocabularies.- Glycos: the basis for a peer-to-peer, private online social network.- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved.- Privacy Patterns for Pseudonymity.- Implementing GDPR in the Charity Sector: A Case Study.- Me and My Robot! Sharing Information with a New Friend.- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change.- Is Privacy Controllable?.- Assessing Theories for Research on Personal Data Transparency.- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised?.- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency?

    2 in stock

    £62.99

  • Industrial Control Systems Security and

    Springer Nature Switzerland AG Industrial Control Systems Security and

    2 in stock

    Book SynopsisThis book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems.This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.Table of Contents1. Current and New Practice.- 2. Cyber-Modeling, Detection, and Forensics.- 3. Proactive Defense Mechanism Design.- 4. Human System Interface.- 5. Metrics For Resilience.

    2 in stock

    £113.99

  • Open Source Intelligence and Cyber Crime: Social

    Springer Nature Switzerland AG Open Source Intelligence and Cyber Crime: Social

    2 in stock

    Book SynopsisThis book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics. Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Table of ContentsChapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns.- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation.- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web.- Chapter4. Protecting the Web from Misinformation.- Chapter5. Social Media for Mental Health: Data, Methods, and Findings.- Chapter6. Twitter Bots and the Swedish Election.- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study.- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter.- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums.

    2 in stock

    £89.99

  • Computer  Performance Engineering: 18th European Workshop, EPEW 2022, Santa Pola, Spain, September 21–23, 2022, Proceedings

    Springer International Publishing AG Computer Performance Engineering: 18th European Workshop, EPEW 2022, Santa Pola, Spain, September 21–23, 2022, Proceedings

    2 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 18th European Workshop on Computer Performance Engineering, EPEW 2022, held in Santa Pola, Spain, in September 2022.The 14 papers presented in this volume together with one invited talk were carefully reviewed and selected from 14 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering. The sessions covered a wide range of topics including robustness analysis, machine learning, edge and cloud computing, as well as more traditional topics on stochastic modelling, techniques and tools.Table of ContentsRobustness analysis.- Applications.- Stochastic modelling.- Machine learning.- Edge-cloud computing.- Modelling paradigms and tools.

    2 in stock

    £47.49

  • Emerging ICT Technologies and Cybersecurity: From

    Springer International Publishing AG Emerging ICT Technologies and Cybersecurity: From

    2 in stock

    Book SynopsisThis book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity.This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.Table of ContentsChapter 01 – An Overview of ICT Technology Advancement ..................................................................... 16Introduction ............................................................................................................................................ 17An Overview of ICT Advanced Technologies ........................................................................................... 18Main Areas of ICT Technologies .............................................................................................................. 19Hardware Technologies .......................................................................................................................... 20Data Processing Hardware .................................................................................................................. 20Data Input Hardware .......................................................................................................................... 22Data Output Hardware ....................................................................................................................... 23Data Transmission Hardware .............................................................................................................. 23Data storage hardware ....................................................................................................................... 24Software Technologies ............................................................................................................................ 25Firmware 25Operating Systems (OSs) ..................................................................................................................... 26IT Protocols ......................................................................................................................................... 28Programming Languages ..................................................................................................................... 29Software Development Methodologies .............................................................................................. 30Evolution of Information Technology ..................................................................................................... 31Computer Generations ........................................................................................................................... 32Zero Generation (1642 – 1945) ........................................................................................................... 32First Generation (1945 – 1954) ........................................................................................................... 33Second Generation (1954 – 1963) ...................................................................................................... 33Third Generation (1963 – 1973) .......................................................................................................... 33Fourth Generation (1973 – 1985) ....................................................................................................... 33Fifth Generation (1985 – Present) ...................................................................................................... 33Operating System Generations ............................................................................................................... 34First Generation (1940 – 1950) ........................................................................................................... 34Second Generation (1955 – 1965) ...................................................................................................... 34Third Generation (1965 – 1980) .......................................................................................................... 35Fourth Generation (1980 – Present) ................................................................................................... 35Application Software Generations .......................................................................................................... 35First Generation .................................................................................................................................. 36Second Generation ............................................................................................................................. 36Third Generation ................................................................................................................................. 36Fourth Generation .............................................................................................................................. 37Fifth Generation .................................................................................................................................. 37Programming Language Generations ..................................................................................................... 37First Generation .................................................................................................................................. 38Second Generation ............................................................................................................................. 38Third Generation ................................................................................................................................. 38Fourth Generation .............................................................................................................................. 39Fifth Generation .................................................................................................................................. 39Wireless/Cellular Technology Generations............................................................................................. 39Zero Generation .................................................................................................................................. 40First Generation .................................................................................................................................. 40Second Generation ............................................................................................................................. 40Third Generation ................................................................................................................................. 41Fourth Generation .............................................................................................................................. 41Fifth Generation .................................................................................................................................. 41WWW Generations ................................................................................................................................. 42Web 1.0 42Web 2.0 42Web 3.0 43Web 4.0 43Evolution of Storage Technologies ......................................................................................................... 44Initial Storage Technologies ................................................................................................................ 44Magnetic Tape-Based Technologies ................................................................................................... 44Magnetic Disk-Based Technologies ..................................................................................................... 45Semiconductor-Based Storage Technologies ...................................................................................... 46Optical-Based Storage Technologies ................................................................................................... 48Advanced Storage Technologies ............................................................................................................. 48Direct Attached Storage (DAS) ............................................................................................................ 48Network Attached Storage (NAS) ....................................................................................................... 49Storage Area Network (SAN) ............................................................................................................... 49Futuristic Storage Technologies .............................................................................................................. 49Software Defined Storage (SDS) ......................................................................................................... 50Storage Virtualization ......................................................................................................................... 50Software Development Generations ...................................................................................................... 50Conventional Era – (1960-1970) ......................................................................................................... 51Transition Era – (1980 – 1990) ............................................................................................................ 51Modern Era – (2000 – Present) ........................................................................................................... 51Types of ICT Services ............................................................................................................................... 52Software Development ....................................................................................................................... 52Computer Networking ........................................................................................................................ 52IT Infrastructure Management ........................................................................................................... 52Telecommunication ............................................................................................................................ 53Data Storage Service ........................................................................................................................... 53Storage Transfer Service (STS) ............................................................................................................ 53Database Management ....................................................................................................................... 53Process Automation & Monitoring ..................................................................................................... 54Data Analytics ..................................................................................................................................... 54Cloud Computing Service .................................................................................................................... 55Application Programming Interface (API) Service ............................................................................... 55Cybersecurity Service .......................................................................................................................... 56Digital Entertainment Services ............................................................................................................ 56Content Delivery Network (CDN) ........................................................................................................ 57A Peep into Next Generation Technologies ............................................................................................ 58Chapter 02 – Artificial Intelligence Technology .......................................................................................... 61Introduction ............................................................................................................................................ 62What Is Artificial Intelligence (AI)?.......................................................................................................... 62What Is Neural Network?........................................................................................................................ 63Major Approaches Used in Artificial Intelligence Research .................................................................... 64Symbolic Approach ............................................................................................................................. 64Connectionist Approach ...................................................................................................................... 65Objectives of Artificial Intelligence ......................................................................................................... 66Reasoning ............................................................................................................................................ 67Problem Solving .................................................................................................................................. 67Natural Language Processing .............................................................................................................. 68Learning 68Planning 69Knowledge Representation ................................................................................................................. 69Motion and Manipulation ................................................................................................................... 69Artificial General Intelligence .............................................................................................................. 70Social Intelligence ............................................................................................................................... 70Business Intelligence ........................................................................................................................... 70Machine Perception ............................................................................................................................ 70An Overview of the History of AI ............................................................................................................ 71Main Areas of AI Application .................................................................................................................. 72Natural Language Processing .............................................................................................................. 73Computer Vision ................................................................................................................................. 76Expert Systems .................................................................................................................................... 77Speech Recognition ............................................................................................................................. 78Robotics 79Text Recognition ................................................................................................................................. 80Voice Recognition ............................................................................................................................... 80Voice-to-Text & Text-to-Voice Conversion ......................................................................................... 81Chatbot 82Types of Artificial Intelligence ................................................................................................................. 83Reactive Machines .............................................................................................................................. 84Limited Memory .................................................................................................................................. 84Theory of Mind.................................................................................................................................... 85Self-Awareness .................................................................................................................................... 85Artificial Narrow Intelligence (ANI) ..................................................................................................... 86Artificial General Intelligence (AGI) .................................................................................................... 86Artificial Super Intelligence (ASI)......................................................................................................... 87Intelligent Agent and Environment ......................................................................................................... 87Intelligent (or, Intelligence) Agent (IA) ............................................................................................... 88Artificial Intelligence Environments .................................................................................................... 90Future of Artificial Intelligence ............................................................................................................... 92Chapter 03 – Machine Learning Technology .............................................................................................. 98Introduction to Machine Learning .......................................................................................................... 99Importance of Machine Learning in Modern World ............................................................................. 100How Does Machine Learning Work? ..................................................................................................... 102Types of Machine Learning ................................................................................................................... 103Supervised Machine Learning ............................................................................................................... 103Unsupervised Machine Learning........................................................................................................... 104Semi-Supervised Machine Learning ...................................................................................................... 106Reinforcement Machine Learning ........................................................................................................ 107What Is Deep Machine Learning? ......................................................................................................... 110Artificial Neural Network .................................................................................................................. 110Major Methods/Techniques of Machine Learning ............................................................................... 110Regression Model ............................................................................................................................. 111Decision Trees ................................................................................................................................... 111Clustering .......................................................................................................................................... 111Classification ..................................................................................................................................... 111Anomaly Detection ........................................................................................................................... 111Neural Network Method ................................................................................................................... 112Dimensionality Reduction ................................................................................................................. 112Ensemble Methods ........................................................................................................................... 113Transfer Learning .............................................................................................................................. 113Natural Language Processing (NLP) ...................................................................................................... 113Word Embedding .............................................................................................................................. 115What Is a Machine Learning Algorithm? ............................................................................................... 116Common Categories of Machine Learning Algorithms ......................................................................... 116Classification Algorithms ....................................................................................................................... 117Naïve Bayes ....................................................................................................................................... 117Decision Tree ..................................................................................................................................... 118Random Forest .................................................................................................................................. 119Support Vector Machines ................................................................................................................. 119K Nearest Neighbors ......................................................................................................................... 121Clustering Algorithms ............................................................................................................................ 123K-Means Clustering ........................................................................................................................... 124Expectation Maximization (EM) Algorithm ....................................................................................... 124Agglomerative Hierarchical Clustering .............................................................................................. 124Fuzzy C-Means Algorithm ................................................................................................................. 124Regression Algorithms .......................................................................................................................... 125Linear Regression .............................................................................................................................. 125Multiple linear Regression ................................................................................................................ 126Multivariate Regression .................................................................................................................... 126Logistic Regression ............................................................................................................................ 127Lasso Regression ............................................................................................................................... 127Other Regression algorithms ............................................................................................................ 127What Is AI Training Data? ..................................................................................................................... 128Types of Training Data .......................................................................................................................... 129Text Training Data ............................................................................................................................. 129Audio Training Data .......................................................................................................................... 129Video Training Data ........................................................................................................................... 129Image Training Data .......................................................................................................................... 130Sensory Training Data ....................................................................................................................... 130What Is AI Training Dataset? ................................................................................................................. 130Major Processes Used in Building Training Datasets for AI Training .................................................... 130Data Collection .................................................................................................................................. 131Data Cleaning .................................................................................................................................... 131Data Classification ............................................................................................................................. 131Data Categorization .......................................................................................................................... 131Data Annotation & Labeling .............................................................................................................. 131What are the Major Categories of Data Annotation? ........................................................................... 132Image Data Annotation ......................................................................................................................... 132Bounding Box Annotation ................................................................................................................. 1323D Cuboids Annotation ..................................................................................................................... 133Polygon Annotation .......................................................................................................................... 133Lines & Splines .................................................................................................................................. 134Semantic Segmentation .................................................................................................................... 134Text Data Annotation ............................................................................................................................ 134Entity Annotation .............................................................................................................................. 134Entity Linking ..................................................................................................................................... 134Sentiment Annotation....................................................................................................................... 135Text Classification ............................................................................................................................. 135Audio Data Annotation ......................................................................................................................... 135Sound Labeling .................................................................................................................................. 135Event Tracking ................................................................................................................................... 135Speech to Text Transcription ............................................................................................................ 135Audio Classification ........................................................................................................................... 136Multi-labeling .................................................................................................................................... 136Video Data Annotation ......................................................................................................................... 136Key Points Annotation/Landmarks ................................................................................................... 137Object localization............................................................................................................................. 137Object Tracking ................................................................................................................................. 137Gradient Boosting ............................................................................................................................. 137Top Uses of Machine Learning in Today’s World.................................................................................. 138Big Data 139Data Analytics ................................................................................................................................... 139Cybersecurity .................................................................................................................................... 139Digital Marketing............................................................................................................................... 140Business Intelligence ......................................................................................................................... 140Process Automation .......................................................................................................................... 141Automobiles ...................................................................................................................................... 141e-Commerce ...................................................................................................................................... 142Impact of Machine Learning on Cybersecurity ..................................................................................... 142Positive Impact .................................................................................................................................. 142Negative Impact ................................................................................................................................ 143Chapter 04 – Blockchain Technology ........................................................................................................ 145Introduction to Blockchain Technology ................................................................................................ 146Top Features of Blockchain Technology ........................................................................................... 147History of Blockchain Technology ......................................................................................................... 149Major Terms Used in Blockchain Technology ....................................................................................... 150Cryptographic Hash ........................................................................................................................... 150Transaction ........................................................................................................................................ 151Proof of Work .................................................................................................................................... 151Block 152Mining 152Timestamp ........................................................................................................................................ 153Stack of Technologies Forming Blockchain ........................................................................................... 153Cryptographic Keys ........................................................................................................................... 153Peer-to-Peer Network with Shared Ledger ....................................................................................... 154Computing Resources to Store Transactions & Network Records.................................................... 155How Does Blockchain Technology Work? ............................................................................................. 155Node 155Block 155What Is Distributed Ledger Technology (DLT)? .................................................................................... 156Types of Blockchain Technology ........................................................................................................... 156Public Blockchain .............................................................................................................................. 158Private Blockchain ............................................................................................................................. 159Consortium Blockchain ..................................................................................................................... 159Hybrid Blockchains ............................................................................................................................ 159Typical Uses of Blockchain Technology ................................................................................................. 160Cryptocurrency.................................................................................................................................. 160Non-Fungible Token (NFT) ................................................................................................................ 161Smart Contracts ................................................................................................................................ 161Financial Markets .............................................................................................................................. 162Electronic Voting ............................................................................................................................... 162Record Maintenance ......................................................................................................................... 163Supply Chain ...................................................................................................................................... 163Government ...................................................................................................................................... 163Impact of Blockchain Technology on Cybersecurity ............................................................................. 164Chapter 05 – 5th Generation Wireless Technology ................................................................................... 168An Introduction to 5G Technology ........................................................................................................ 169Importance of 5G Technology .............................................................................................................. 170Evolution of Cellular Networks ............................................................................................................. 172First Generation (1G) ........................................................................................................................ 172Second Generation (2G) .................................................................................................................... 172Third Generation (3G) ....................................................................................................................... 173Fourth Generation (4G) ..................................................................................................................... 173Fifth Generation (5G) ........................................................................................................................ 174Sixth Generation (6G)........................................................................................................................ 174Key Features and Capabilities of 5G Technology .................................................................................. 174Architecture of 5G Network .................................................................................................................. 176Top Protocols Used in 5G Networks ..................................................................................................... 1793GPP 179New Radio (NR) ................................................................................................................................. 180NextGen Core .................................................................................................................................... 181LTE Advanced Pro .............................................................................................................................. 182EPC Evolution .................................................................................................................................... 183Impact of 5G Technology on Cybersecurity .......................................................................................... 183Chapter 06 – Internet of Things (IoT) ........................................................................................................ 188Introduction to Internet of Things (IoT) ................................................................................................ 189Importance of IoT.............................................................................................................................. 189Main Features of Internet of Things ................................................................................................. 190History of Internet of Things ................................................................................................................. 190What Is Ambient Intelligence in IoT? .................................................................................................... 191Autonomous Control in IoT ................................................................................................................... 191Range of Enabling Technologies Behind Internet of Things ................................................................. 191Low Power Sensors ........................................................................................................................... 192Cloud Computing .............................................................................................................................. 192Artificial Intelligence (AI) ................................................................................................................... 192Machine Learning .............................................................................................................................. 192Data Analytics ................................................................................................................................... 192Big Data 193Short Range Wireless Technologies .................................................................................................. 193Medium & Long-Range Wireless Technologies ................................................................................ 193Effective Communication Protocols .................................................................................................. 193Internet Protocol V6 ......................................................................................................................... 194Architecture of Internet of Things Ecosystem ...................................................................................... 194Three Layer Architecture .................................................................................................................. 194Four Layer Architecture .................................................................................................................... 194Five Layer Architecture ..................................................................................................................... 195What Is Decentralized Internet of Things Concept? ............................................................................. 195What Is Industrial Internet of Things? .................................................................................................. 196Industrial Internet of Things Standard Bodies ...................................................................................... 196Important Industrial Internet of Things IIoT Platforms......................................................................... 197Azure IoT 197Oracle IoT Cloud ................................................................................................................................ 198IBM Watson IoT................................................................................................................................. 198AWS IoT 198Siemens Mind Sphere ....................................................................................................................... 198Flutura Cerebra ................................................................................................................................. 198Thing Worx ........................................................................................................................................ 199GE Predix 199IIoT Use Cases in Different Industries ................................................................................................... 199Smart Cities ....................................................................................................................................... 200Smart Home ...................................................................................................................................... 200Manufacturing .................................................................................................................................. 200Process Automation .......................................................................................................................... 200Energy Management ......................................................................................................................... 200Supply Chain ...................................................................................................................................... 201Healthcare ......................................................................................................................................... 201Agriculture ........................................................................................................................................ 201Military 201Transportation .................................................................................................................................. 201Challenges Posed by Internet of Things ................................................................................................ 202Cybersecurity .................................................................................................................................... 202Privacy 202Complex Operations & Management ............................................................................................... 202Environment Impact ......................................................................................................................... 203Bulky Data ......................................................................................................................................... 203Impact of IoT on Cybersecurity ............................................................................................................. 203Chapter 07 – Distributed Cloud Computing .............................................................................................. 206An Introduction to Distributed Cloud Computing ................................................................................. 207What Is Edge Computing? ..................................................................................................................... 208Advantages of Distributed Cloud .......................................................................................................... 209Working Principle of Distributed Cloud ................................................................................................ 210Distributed Cloud Architecture ............................................................................................................. 210Top Use Cases of Distributed Cloud in Industries ................................................................................. 211Content Delivery Network (CDN) ...................................................................................................... 212Internet of Things (IoT) & Edge ......................................................................................................... 214Software Defined Infrastructure (SDI) .............................................................................................. 214Big Data Processing ........................................................................................................................... 215Multi-Cloud Unification ..................................................................................................................... 215Centralized Management ................................................................................................................. 216Challenges of Distributed Cloud Computing ......................................................................................... 216Impact of Distributed Cloud Computing on Cybersecurity ................................................................... 217Chapter 08 – Quantum Computing ........................................................................................................... 220An Introduction to Quantum Computing.............................................................................................. 221Salient Features of Quantum Computing ............................................................................................. 222Short History of Quantum Computing .................................................................................................. 223What Is Quantum Physics? ................................................................................................................... 224Theory of Quantum Computing ........................................................................................................ 224Working Principle of Quantum Computing........................................................................................... 225How Many States Are Used in Quantum Computing? .......................................................................... 225What Are Superimposition and Entanglement in Quantum Computing? ............................................ 225Difference Between Traditional Computing & Quantum Computing .................................................. 226Real-World Quantum Applications ....................................................................................................... 227Major Projects on Quantum Computing ............................................................................................... 229IBM 230Honeywell ......................................................................................................................................... 230Google 230Microsoft 231Main Terminologies Used in Quantum Computing .............................................................................. 232Superconductors ............................................................................................................................... 232Superfluid .......................................................................................................................................... 233Quantum Mechanics ......................................................................................................................... 234Qubits 234Quantum Logic Gate ......................................................................................................................... 235Quantum Counting ............................................................................................................................ 236Grover’s Algorithm ............................................................................................................................ 236Shor’s Algorithm ............................................................................................................................... 236Josephson Junction ........................................................................................................................... 237Chapter 09 – Tactile Virtual Reality .......................................................................................................... 240An Introduction to Tactile Virtual Reality ............................................................................................. 241Augmented Reality and Virtual Reality ................................................................................................. 242History & Evolution of Tactile Virtual Reality ........................................................................................ 242Types of Virtual Reality ......................................................................................................................... 244Non-Immersive VR ............................................................................................................................ 244Fully-Immersive VR ........................................................................................................................... 244Semi-Immersive VR ........................................................................................................................... 245Neurophysiological Tactile Measurement Techniques ......................................................................... 245Electroencephalography (EEG) ......................................................................................................... 246Magnetoencephalography (MEG)..................................................................................................... 246Functional Magnetic Resonance Imaging (fMRI) .............................................................................. 246Somatosensation and Its Types ............................................................................................................ 246Active Somatosensation.................................................................................................................... 247Passive Somatosensation .................................................................................................................. 247Major VR Terms with Definitions .......................................................................................................... 247Head Mounted Display (HMD) .......................................................................................................... 247Haptics 247360 Videos ......................................................................................................................................... 247Interactive VR .................................................................................................................................... 248Stereoscopy ....................................................................................................................................... 2484D Virtual Reality .............................................................................................................................. 248Field of View (FOV) ............................................................................................................................ 248Image/Video Stitching ....................................................................................................................... 248Simulator Sickness ............................................................................................................................ 248Cave Automatic Virtual Environment ............................................................................................... 249Mixed Reality .................................................................................................................................... 249Real-Word Applications of Tactile Virtual Reality ................................................................................. 249Video Games ..................................................................................................................................... 250Education & Training ......................................................................................................................... 251Product Development ....................................................................................................................... 252Chapter 10 – An Overview of Top Futuristic Technologies ....................................................................... 255What Is Futuristic Technology? ............................................................................................................. 256Top Futuristic Technologies .................................................................................................................. 2583D Printing Technology ..................................................................................................................... 2594D Printing ........................................................................................................................................ 2636G Technology .................................................................................................................................. 263Autonomous Robots ......................................................................................................................... 267Artificial Neurons .............................................................................................................................. 271Artificial General Intelligence (AGI) .................................................................................................. 273Artificial Super Intelligence (ASI)....................................................................................................... 274Mind Uploading................................................................................................................................. 276Driverless Vehicles ............................................................................................................................ 278Infrastructure Hacking ...................................................................................................................... 279Regenerative Medicine ..................................................................................................................... 279Digital Twin (DT) Technology ............................................................................................................ 280Programmable Living Robots ............................................................................................................ 282Human Augmentation ....................................................................................................................... 283Intelligent Process Automation (IPA) ................................................................................................ 283Space Elevator ................................................................................................................................... 284Rotating Skyhook .............................................................................................................................. 285Light Sail 285Chapter 11 – Impact of Advanced & Futuristic Technologies on Cybersecurity ...................................... 288Overview of Impact of Modern Technologies on Cybersecurity .......................................................... 288Major Cybersecurity Challenges Due to Advanced Technologies ........................................................ 291Risk to National Security ................................................................................................................... 292Breach of Privacy ............................................................................................................................... 293Increased Burden of Cybersecurity on Businesses ........................................................................... 294Shortage of Cybersecurity Specialists ............................................................................................... 294Risk of Extensive Data Exposure ....................................................................................................... 295Society & Business Manipulation ...................................................................................................... 295References ................................................................................................................................................ 298

    2 in stock

    £75.99

  • Blown to Bits

    Pearson Education (US) Blown to Bits

    Book SynopsisHal Abelson is Class of 1922 Professor of Computer Science and Engineering at MIT, and an IEEE Fellow. He has helped drive innovative educational technology initiatives such MIT OpenCourseWare, co-founded Creative Commons and Public Knowledge, and was founding director of the Free Software Foundation. Ken Ledeen, Chairman/CEO of Nevo Technologies, is a serial entrepreneur who has served on the boards of numerous technology companies. Harry Lewis, former Dean of Harvard College and of Harvard's School of Engineering and Applied Sciences, is Gordon McKay Research Professor of Computer Science at Harvard and Faculty Associate of the Berkman Klein Center for Internet and Society. He is author of Excellence Without a Soul: Does Liberal Education Have a Future? and editor of Ideas that Created the Future: Classic Papers of Computer Science. Wendy Seltzer is Counsel and Strategy Lead at the World Wide Web CTable of ContentsPreface xvii Chapter 1 Digital Explosion Why Is It Happening, and What Is at Stake? 1 The Explosion of Bits, and Everything Else 4 The Koans of Bits 7 Good and Ill, Promise and Peril 17 Endnotes 19 Chapter 2 Naked in the Sunlight Privacy Lost, Privacy Abandoned 21 1984 Is Here, and We Like It 21 Location, Location, Location 27 Big Brother, Abroad and in the United States 32 The Internet of Things 42 Endnotes 48 Chapter 3 Who Owns Your Privacy? The Commercialization of Personal Data 51 What Kind of Vegetable Are You? 51 Footprints and Fingerprints 57 Fair Information Practice Principles 64 Always On 70 Endnotes 71 Chapter 4 Gatekeepers Who's in Charge Here? 75 Who Controls the Flow of Bits? 75 The Open Internet? 76 Connecting the Dots: Designed for Sharing and Survival 79 The Internet Has No Gatekeepers? 85 Links Gatekeepers: Getting Connected 86 Search Gatekeepers: If You Can't Find It, Does It Exist? 94 Social Gatekeepers: Known by the Company You Keep 104 Endnotes 112 Chapter 5 Secret Bits How Codes Became Unbreakable 117 Going Dark 117 Historical Cryptography 122 Lessons for the Internet Age 131 Secrecy Changes Forever 135 Cryptography Unsettled 147 Endnotes 148 Chapter 6 Balance Toppled Who Owns the Bits? 153 Stealing Music 153 Automated Crimes, Automated Justice 155 The Peer-to-Peer Upheaval 160 No Commercial Skipping 167 Authorized Use Only 168 Forbidden Technology 172 Copyright Koyaanisqatsi: Life Out of Balance 177 The Limits of Property 183 Endnotes 187 Chapter 7 You Can't Say That on the Internet Guarding the Frontiers of Digital Expression 193 Child Sex Trafficking Goes Digital 193 Publisher or Distributor? 198 Protecting Good Samaritans—and a Few Bad Ones 205 Digital Protection, Digital Censorship, and Self-Censorship 215 What About Social Media? 219 Takedowns 221 Endnotes 222 Chapter 8 Bits in the Air Old Metaphors, New Technologies, and Free Speech 227 Censoring the Candidate 227 How Broadcasting Became Regulated 228 The Path to Spectrum Deregulation 241 The Most Beautiful Inventor in the World 245 What Does the Future Hold for Radio? 255 Endnotes 261 Chapter 9 The Next Frontier AI and the Bits World of the Future 265 Thrown Under a Jaywalking Bus 266 What's Intelligent About Artificial Intelligence? 267 Machine Learning: I'll Figure It Out 268 Algorithmic Decisions: I Thought Only People Could Do That 273 What's Next 277 Bits Lighting Up the World 282 A Few Bits in Conclusion 287 Endnotes 288 Index 293

    £20.69

  • GCIH GIAC Certified Incident Handler AllinOne

    McGraw-Hill Education GCIH GIAC Certified Incident Handler AllinOne

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a recognized cybersecurity expert and seasoned author, GCIH GIAC Certified Incident Handler All-in-One Exam Guide clearly explains all of the advanced security incident handling skills covered on the test. Detailed examples and chapter summaries throughout demonstrate real-world threats and aid in retention. You will get online access to 300 practice questions that match those on the live test in style, format, and tone. Designed to help you prepare for the exam, this resource also serves a

    1 in stock

    £37.59

  • Network Programmability and Automation

    O'Reilly Media Network Programmability and Automation

    5 in stock

    Book SynopsisThe updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud and programming with Go.

    5 in stock

    £35.99

  • Information Privacy Engineering and Privacy by

    Pearson Education (US) Information Privacy Engineering and Privacy by

    1 in stock

    Book SynopsisDr. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 18 textbooks and, counting revised editions, a total of 70 books on various aspects of these subjects. His writings have appeared in numerous ACM and IEEE publications, including the Proceedings of the IEEE and ACM Computing Reviews. He has 13 times received the award for the best computer science textbook of the year from the Text and Academic Authors Association. With more than 30 years in the field, he has been a technical contributor, a technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently he is an independent consultant whose clients have included computer and Table of Contents Part I: Planning for Privacy 1. Information Privacy Concepts 2. Security Governance and Management 3. Risk Assessment Part II: Privacy Threats 4. Information Storage and Processing 5. Information Collection and Dissemination 6. Intrusion and Interference Part III: Information Privacy Technology 7. Basic Privacy Controls 8. Privacy Enhancing Technology 9. Data Loss Prevention 10. Online Privacy 11. Detection of Conflicts In Security Policies 12. Privacy Evaluation Part IV: Information Privacy Regulations 13. GDPR 14. U.S. Privacy Laws and Regulations

    1 in stock

    £49.39

  • Cybersecurity Myths and Misconceptions

    Pearson Education (US) Cybersecurity Myths and Misconceptions

    1 in stock

    Book SynopsisEugene H. Spafford, PhD, is a professor in Computer Science at Purdue University. In his 35-year career, Spaf has been honored with every major award in cybersecurity. Leigh Metcalf, PhD, is a Senior Network Security Research Analyst at the Carnegie Mellon University Software Engineering Institute's cybersecurity-focused CERT division. Josiah Dykstra, PhD, is a cybersecurity practitioner, researcher, author, and speaker. He is the owner of Designer Security and has worked at the US National Security Agency for 18 years.Trade Review"Many security leaders are traditionally in charge of correcting misconceptions just as much as they are in charge of building up solid security practices. We have plenty of resources on practices--but this book is the crucial guide to that essential myth busting."--Phil Venables, CISO, Google Cloud "I'm writing this on my phone, over Wi-Fi, in an airplane on my way to Black Hat, one of the world's largest security conferences. The fact that I'm able to do this at all shows how much we've really learned about cybersecurity over the decades. Now it's all collected in one place for everyone to share. Thank the wise authors, and most importantly: GET OFF THEIR LAWN."--Wendy Nather, Head of Advisory CISOs, Cisco "This book is astounding. A true tour de force--which I have never said about any other book. Inverting the viewpoint is a stroke of genius. This is going to be on my grabbable-at-any-time shelf. What I learned, recalled, and was refreshed on with technically astute agnosticism cannot be measured; just appreciated as a profound historical compilation of security practice and theory. Bravo!"--Winn Schwartaul, Founder and Chief Visionary Officer, The Security Awareness Company "I am happy to endorse the central idea of this book--that cybersecurity is rife with myths that are themselves part of the problem. The brain wants to understand, the world grows ever more complicated, and the sum of the two is myth-making. As the authors say, even if some understanding is true at some time, with enough change what was true becomes a myth soon enough. As such, an acquired immunity to myths is a valuable skill for the cybersecurity practitioner if no other. The paramount goal of all security engineering is No Silent Failure, but myths perpetuate if not create silent failure. Why? Because a state of security is the absence of unmitigable surprise and you cannot mitigate what you don't know is going on. Myths blind us to reality. Ignorance of them is not bliss. This book is a vaccine."--Dan Geer, CISO, In-Q-Tel "This is a fun read for all levels. I like their rapid fire delivery and the general light they cast on so many diverse myths. This book will change the cybersecurity industry for the better."--Michael Sikorski, Author of Practical Malware Analysis & CTO, Unit 42 at Palo Alto NetworksTable of ContentsForeword by Vint Cerf xxiiiIntroduction xxivAcknowledgments xxxiiiAbout the Authors xxxiv Part I: General Issues 1 Chapter 1: What Is Cybersecurity? 2Everyone Knows What "Cybersecurity" Means 2We Can Measure How Secure Our Systems Are 5The Primary Goal of Cybersecurity Is Security 11Cybersecurity Is About Obvious Risks 12Sharing More Cyber Threat Intel Will Make Things Better 14What Matters to You Matters to Everyone Else 16Product X Will Make You Secure 17Macs Are Safer Than PCs, Linux Is Safer Than Windows 18Open Source Software Is More Secure Than Closed Source Software 19Technology X Will Make You Secure 20Process X Will Make You Secure 21Færie Dust Can Make Old Ideas Magically Revolutionary 22Passwords Should Be Changed Often 23Believe and Fear Every Hacking Demo You See 26Cyber Offense Is Easier Than Defense 27Operational Technology (OT) Is Not Vulnerable 29Breaking Systems Is the Best Way to Establish Yourself 30Because You Can, You Should 30Better Security Means Worse Privacy 32Further Reading 33 Chapter 2: What Is the Internet? 36Everyone Knows What the "Internet" Means 36An IP Address Identifies a Unique Machine 37The Internet Is Managed and Controlled by a Central Body 39The Internet Is Largely Static 40Your Network Is Static 41Email Is Private 43Cryptocurrency Is Untraceable 44Everything Can Be Fixed with Blockchain 46The Internet Is Like an Iceberg 46A VPN Makes You Anonymous 48A Firewall Is Enough 49Further Reading 51 Part II: Human Issues 55 Chapter 3: Faulty Assumptions and Magical Thinking 56Humans Will Behave Rationally, So Blame the User! 57We Know Everything We Need to Know About Cybersecurity Problems 62Compliance Equals (Complete) Security 63Authentication Provides Confidentiality 65I Can Never Be Secure, So Why Bother? 65I Am Too Small/Insignificant to Be a Target 66Everybody Is Out to Get Me 69I Engage Only with Trusted Websites, So My Data Is Safe from a Breach 71Security by Obscurity Is Reasonably Secure 72The Illusions of Visibility and Control 74Five 9's Is the Key to Cybersecurity 76Everybody Has Top-of-the-Line Technology 78We Can Predict Future Threats 80Security People Control Security Outcomes 81All Bad Outcomes Are the Result of a Bad Decision 82More Security Is Always Better 84Best Practices Are Always Best 85Because It Is Online It Must Be True/Correct 86Further Reading 87 Chapter 4: Fallacies and Misunderstandings 88The False Cause Fallacy: Correlation Is Causation 89Absence of Evidence Is Evidence of Absence 92The Straw Hacker Fallacy 94Ad Hominem Fallacy 95Hasty Generalization Fallacy 96Regression Fallacy 97Base Rate Fallacy 98Gambler's Fallacy 100Fallacies of Anomalies 100Ignorance of Black Swans 101Conjunction and Disjunction Fallacies 103Valence Effect 104Endowment Effect 104Sunk Cost Fallacy 105Bonus Fallacies 107Further Reading 109 Chapter 5: Cognitive Biases 110Action Bias 112Omission Bias 113Survivorship Bias 115Confirmation Bias 116Choice Affirmation Bias 117Hindsight Bias 117Availability Bias 119Social Proof 121Overconfidence Bias 122Zero Risk Bias 123Frequency Bias 124Bonus Biases 125Further Reading 128 Chapter 6: Perverse Incentives and the Cobra Effect 130The Goal of a Security Vendor Is to Keep You Secure 131Your Cybersecurity Decisions Affect Only You 132Bug Bounties Eliminate Bugs from the Offensive Market 134Cyber Insurance Causes People to Take Less Risk 135Fines and Penalties Cause People to Take Less Risk 136Attacking Back Would Help Stop Cyber Crime 137Innovation Increases Security and Privacy Incidents 138Further Reading 139 Chapter 7: Problems and Solutions 140Failure Is Not an Option in Cybersecurity 141Every Problem Has a Solution 142Anecdotes Are Good Leads for Cybersecurity Solutions 147Detecting More "Bad Stuff" Means the New Thing Is an Improvement 148Every Security Process Should Be Automated 149Professional Certifications Are Useless 151Further Reading 158 Part III: Contextual Issues 161 Chapter 8: Pitfalls of Analogies and Abstractions 162Cybersecurity Is Like the Physical World 165Cybersecurity Is Like Medicine and Biology 170Cybersecurity Is Like Fighting a War 172Cybersecurity Law Is Analogous to Physical-World Law 175Tips for Analogies and Abstractions 175Further Reading 178 Chapter 9: Legal Issues 180Cybersecurity Law Is Analogous to Physical-World Law 181Your Laws Do Not Apply to Me Where I Am 182That Violates My First Amendment Rights! 184Legal Code Supersedes Computer Code 186Law Enforcement Will Never Respond to Cyber Crimes 191You Can Always Hide Information by Suing 193Suing to Suppress a Breach Is a Good Idea 194Terms and Conditions Are Meaningless 194The Law Is on My Side, So I Do Not Need to Worry 195Further Reading 196 Chapter 10: Tool Myths and Misconceptions 198The More Tools, The Better 199Default Configurations Are Always Secure 201A Tool Can Stop All Bad Things 203Intent Can Be Determined from Tools 205Security Tools Are Inherently Secure and Trustworthy 207Nothing Found Means All Is Well 209Further Reading 212 Chapter 11: Vulnerabilities 214We Know Everything There Is to Know About Vulnerabilities 215Vulnerabilities Are Sparse 218Attackers Are Getting More Proficient 218Zero-Day Vulnerabilities Are Most Important 219All Attacks Hinge on a Vulnerability 223Exploits and Proofs of Concept Are Bad 226Vulnerabilities Happen Only in Complex Code 228First Movers Should Sacrifice Security 230Patches Are Always Perfect and Available 231Defenses Might Become Security Vulnerabilities with Time 236All Vulnerabilities Can Be Fixed 237Scoring Vulnerabilities Is Easy and Well Understood 239Because You Can, You Should--Vulnerabilities Edition 240Vulnerability Names Reflect Their Importance 241Further Reading 242 Chapter 12: Malware 244Using a Sandbox Will Tell Me Everything I Need to Know 246Reverse Engineering Will Tell Me Everything I Need to Know 249Malware and Geography Are/Are Not Related 251I Can Always Determine Who Made the Malware and Attacked Me 253Malware Is Always a Complex Program That Is Difficult to Understand 254Free Malware Protection Is Good Enough 256Only Shady Websites Will Infect Me 257Because You Can, You Should--Malware Edition 258Ransomware Is an Entirely New Kind of Malware 259Signed Software Is Always Trustworthy 261Malware Names Reflect Their Importance 263Further Reading 264 Chapter 13: Digital Forensics and Incident Response 266Movies and Television Reflect the Reality of Cyber 267Incidents Are Discovered as Soon as They Occur 269Incidents Are Discrete and Independent 270Every Incident Is the Same Severity 271Standard Incident Response Techniques Can Deal with Ransomware 272Incident Responders Can Flip a Few Switches and Magically EverythingIs Fixed 273Attacks Are Always Attributable 276Attribution Is Essential 278Most Attacks/Exfiltration of Data Originate from Outside the Organization 280The Trojan Horse Defense Is Dead 281Endpoint Data Is Sufficient for Incident Detection 282Recovering from an Event Is a Simple and Linear Process 284Further Reading 285 Part IV: Data Issues 287 Chapter 14: Lies, Damn Lies, and Statistics 288Luck Prevents Cyber Attacks 289The Numbers Speak for Themselves 290Probability Is Certainty 290Statistics Are Laws 293Data Is Not Important to Statistics 303Artificial Intelligence and Machine Learning Can Solve AllCybersecurity Problems 306Further Reading 310 Chapter 15: Illustrations, Visualizations, and Delusions 312Visualizations and Dashboards Are Inherently and Universally Helpful 313Cybersecurity Data Is Easy to Visualize 319Further Reading 324 Chapter 16: Finding Hope 326Creating a Less Myth-Prone World 328The Critical Value of Documentation 329Meta-Myths and Recommendations 331Avoiding Other and Future Traps 334Parting Thoughts 334 Appendix: Short Background Explanations 336 Acronyms 344Index 350

    1 in stock

    £31.34

  • Network Defense and Countermeasures

    Pearson Education (US) Network Defense and Countermeasures

    2 in stock

    Book SynopsisDr. Chuck Easttom is the author of 41 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cybersecurity, a Ph.D. in nanotechnology, a Ph.D. in computer science, and three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for Vanderbilt University.Table of Contents Preface xxiii Chapter 1: Introduction to Network Security 2 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Basics of a Network.. . . . . . . . . . . . . . . . . . . . . . . . . 3 Basic Network Utilities.. . . . . . . . . . . . . . . . . . . . . . . . . 11 The OSI Model.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 What Does This Mean for Security?. . . . . . . . . . . . . . . . . . . . 16 Assessing Likely Threats to the Network. . . . . . . . . . . . . . . . . . 16 Classifications of Threats.. . . . . . . . . . . . . . . . . . . . . . . . 20 Likely Attacks.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Threat Assessment.. . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Understanding Security Terminology.. . . . . . . . . . . . . . . . . . . . 26 Choosing a Network Security Approach.. . . . . . . . . . . . . . . . . . 30 Network Security and the Law.. . . . . . . . . . . . . . . . . . . . . . 32 Using Security Resources. . . . . . . . . . . . . . . . . . . . . . . . 34 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Chapter 2: Types of Attacks 42 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Understanding Denial of Service Attacks.. . . . . . . . . . . . . . . . . . 43 Defending Against Buffer Overflow Attacks.. . . . . . . . . . . . . . . . . 63 Defending Against IP Spoofing. . . . . . . . . . . . . . . . . . . . . . 64 Defending Against Session Hijacking.. . . . . . . . . . . . . . . . . . . 66 Blocking Virus and Trojan Horse Attacks. . . . . . . . . . . . . . . . . . 66 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Chapter 3: Fundamentals of Firewalls 82 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 What Is a Firewall?. . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Implementing Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . 90 Firewall Deployment.. . . . . . . . . . . . . . . . . . . . . . . . . . 95 Selecting and Using a Firewall.. . . . . . . . . . . . . . . . . . . . . . 96 Using Proxy Servers.. . . . . . . . . . . . . . . . . . . . . . . . . . 97 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Chapter 4: Firewall Practical Applications 106 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Using Single Machine Firewalls.. . . . . . . . . . . . . . . . . . . . . 107 Windows 10 Firewall.. . . . . . . . . . . . . . . . . . . . . . . . . . 108 User Account Control.. . . . . . . . . . . . . . . . . . . . . . . . . 110 Linux Firewalls.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Using Small Office/Home Office Firewalls.. . . . . . . . . . . . . . . . . 118 Using Medium-Sized Network Firewalls.. . . . . . . . . . . . . . . . . . 121 Using Enterprise Firewalls. . . . . . . . . . . . . . . . . . . . . . . . 124 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Chapter 5: Intrusion-Detection Systems 132 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Understanding IDS Concepts.. . . . . . . . . . . . . . . . . . . . . . 133 IDS Components and Processes.. . . . . . . . . . . . . . . . . . . . . 135 SIEM.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Evasion Techniques.. . . . . . . . . . . . . . . . . . . . . . . . . . 137 Understanding and Implementing IDSs.. . . . . . . . . . . . . . . . . . 138 Understanding and Implementing Honeypots. . . . . . . . . . . . . . . . 141 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Chapter 6: Encryption Fundamentals 152 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 The History of Encryption.. . . . . . . . . . . . . . . . . . . . . . . . 153 Learning About Modern Encryption Methods.. . . . . . . . . . . . . . . . 160 Identifying Good Encryption.. . . . . . . . . . . . . . . . . . . . . . . 173 Understanding Digital Signatures and Certificates.. . . . . . . . . . . . . . 174 MAC and HMAC.. . . . . . . . . . . . . . . . . . . . . . 179 Understanding and Using Decryption.. . . . . . . . . . . . . . . . . . . 179 Cracking Passwords.. . . . . . . . . . . . . . . . . . . . . . . . . . 180 Steganography. . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Steganalysis.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Quantum Computing and Quantum Cryptography. . . . . . . . . . . . . . 186 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Endnote.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Chapter 7: Virtual Private Networks 194 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Basic VPN Technology.. . . . . . . . . . . . . . . . . . . . . . . . . 195 Using VPN Protocols for VPN Encryption.. . . . . . . . . . . . . . . . . 197 IPsec.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 SSL/TLS.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Other VPN Protocols.. . . . . . . . . . . . . . . . . . . . . . . . . . 209 Implementing VPN Solutions.. . . . . . . . . . . . . . . . . . . . . . 210 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Chapter 8: Operating System Hardening 222 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Configuring Windows Properly.. . . . . . . . . . . . . . . . . . . . . . 223 Configuring Linux Properly.. . . . . . . . . . . . . . . . . . . . . . . 244 Patching the Operating System.. . . . . . . . . . . . . . . . . . . . . 245 Configuring Browsers.. . . . . . . . . . . . . . . . . . . . . . . . . 246 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Chapter 9: Defending Against Virus Attacks 260 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Understanding Virus Attacks.. . . . . . . . . . . . . . . . . . . . . . 261 Virus Scanners.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Virus Scanning Techniques. . . . . . . . . . . . . . . . . . 272 When Antivirus Causes a Problem. . . . . . . . . . . . . . . 274 Commercial Antivirus Software.. . . . . . . . . . . . . . . . 274 Antivirus Policies and Procedures.. . . . . . . . . . . . . . . . . . . . 283 Additional Methods for Defending Your System.. . . . . . . . . . . . . . . 284 What to Do If Your System Is Infected by a Virus.. . . . . . . . . . . . . . 285 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Chapter 10: Defending Against Trojan Horses and Phishing 296 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Trojan Horses.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Phishing.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Chapter 11: Security Policies 318 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 ISO 27002. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Important Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 322 Defining User Policies.. . . . . . . . . . . . . . . . . . . . . . . . . 324 Defining System Administration Policies.. . . . . . . . . . . . . . . . . . 331 Defining Access Control.. . . . . . . . . . . . . . . . . . . . . . . . 336 Defining Developmental Policies.. . . . . . . . . . . . . . . . . . . . . 337 Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Chapter 12: Assessing System Security 346 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 Risk Assessment Concepts.. . . . . . . . . . . . . . . . . . . . . . . 347 Evaluating the Security Risk.. . . . . . . . . . . . . . . . . . . . . . . 348 Conducting the Initial Assessment. . . . . . . . . . . . . . . . . . . . 351 Probing the Network.. . . . . . . . . . . . . . . . . . . . . . . . . . 357 Vulnerabilities.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 McCumber Cube.. . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Security Documentation.. . . . . . . . . . . . . . . . . . . . . . . . 385 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Chapter 13: Security Standards 394 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 COBIT.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 ISO Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 NIST Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 U.S. DoD Standards.. . . . . . . . . . . . . . . . . . . . . . . . . . 403 Using the Common Criteria.. . . . . . . . . . . . . . . . . . . . . . . 405 Using Security Models.. . . . . . . . . . . . . . . . . . . . . . . . . 407 U.S. Federal Regulations, Guidelines, and Standards.. . . . . . . . . . . . 410 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 Chapter 14: Physical Security and Disaster Recovery 422 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Physical Security.. . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Disaster Recovery.. . . . . . . . . . . . . . . . . . . . . . . . . . . 428 Ensuring Fault Tolerance.. . . . . . . . . . . . . . . . . . . . . . . . 432 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435 Chapter 15: Techniques Used by Attackers 438 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Preparing to Hack.. . . . . . . . . . . . . . . . . . . . . . . . . . . 439 The Attack Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . 453 Session Hijacking. . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Wi-Fi Hacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Bluetooth Hacking.. . . . . . . . . . . . . . . . . . . . . . . . . . . 459 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462 Chapter 16: Introduction to Forensics 466 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 General Forensics Guidelines.. . . . . . . . . . . . . . . . . . . . . . 467 FBI Forensics Guidelines. . . . . . . . . . . . . . . . . . . . . . . . 470 Imaging a Drive.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 471 Finding Evidence on the PC.. . . . . . . . . . . . . . . . . . . . . . . 474 Gathering Evidence from a Cell Phone.. . . . . . . . . . . . . . . . . . 485 Forensic Tools to Use.. . . . . . . . . . . . . . . . . . . . . . . . . 491 AccessData Forensic Toolkit.. . . . . . . . . . . . . . . . . 491 EnCase.. . . . . . . . . . . . . . . . . . . . . . . . . . 492 The Sleuth Kit. . . . . . . . . . . . . . . . . . . . . . . 492 OSForensics. . . . . . . . . . . . . . . . . . . . . . . . 492 Forensic Science.. . . . . . . . . . . . . . . . . . . . . . . . . . . 493 To Certify or Not to Certify?.. . . . . . . . . . . . . . . . . . . . . . . 493 Expert Witnesses.. . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Additional Types of Forensics.. . . . . . . . . . . . . . . . . . . . . . 495 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Endnote.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Chapter 17: Cyber Warfare and Terrorism 504 Introduction.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Defending Against Computer-Based Espionage. . . . . . . . . . . . . . . 505 Defending Against Computer-Based Terrorism. . . . . . . . . . . . . . . 508 Choosing Defense Strategies.. . . . . . . . . . . . . . . . . . . . . . 514 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Endnotes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524 Appendix A: Answers 530 Glossary 542 9780138200589, 9/1/2023

    2 in stock

    £64.79

  • Click Here to Kill Everybody

    WW Norton & Co Click Here to Kill Everybody

    1 in stock

    Book SynopsisA best-selling author and renowned security expert reveals the rise and risks of a new goliath: our massively networked, world-sized web.Trade Review"Schneier skilfully guides readers through serious attacks that have happened already — and moves on to those he believes are just over the horizon... This book is convincing, but not comforting." -- Financial Times"Schneier’s book is sober, lucid and often wise in diagnosing how the security challenges posed by the expanding Internet came about, and in proposing what should (but probably won’t) be done about them." -- Nature"... excellent work..." -- The Catholic Herald

    1 in stock

    £20.89

  • Web Application Security

    O'Reilly Media Web Application Security

    15 in stock

    Book SynopsisIn this revised and updated second edition, author Andrew Hoffman examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more.

    15 in stock

    £39.74

  • Security in Wireless Communication Networks

    John Wiley & Sons Inc Security in Wireless Communication Networks

    1 in stock

    Book SynopsisReceive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks,encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast natureof the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security serviTable of ContentsPreface xvii Acknowledgments xxiii About the Companion Website xxv Part I Introduction and Mathematics Background 1 1 Introduction 3 1.1 General Computer Communication Network Architecture 3 1.1.1 Wired Communication Network Infrastructure 3 1.1.2 Wireless Communication Network Infrastructure 4 1.2 Different Types of Wireless Communication Systems 5 1.2.1 Classification of Wireless Communication Systems 5 1.2.1.1 Based on Coverage 5 1.2.1.2 Based on Topology 6 1.2.1.3 Based on Mobility 6 1.2.2 Wireless Personal Area Networks 7 1.2.3 Wireless Local Area Networks 7 1.2.4 Wireless Wide Area Networks 7 1.3 Network Security and Wireless Security 9 1.3.1 Network Security 9 1.3.2 Security Threats in Wireless Networks 10 1.4 Summary 11 2 Basic Network Security Concepts 13 2.1 Security Attacks 13 2.1.1 Passive Attacks 13 2.1.1.1 Eavesdropping 13 2.1.1.2 Traffic Analysis 14 2.1.2 Active Attacks 15 2.2 Security Services 16 2.2.1 Access Control 17 2.2.2 Authentication 17 2.2.3 Confidentiality 18 2.2.4 Integrity 18 2.2.5 Non-repudiation 19 2.2.6 Availability 19 2.3 Security Mechanisms 21 2.3.1 Encipherment 21 2.3.2 Authentication 21 2.3.3 Access Control 22 2.3.4 Digital Signature 22 2.3.5 Data Integrity 23 2.3.6 Traffic Padding and Routing Control 23 2.3.7 Notarization 24 2.4 Other Security Concepts 24 2.4.1 Levels of Impact 24 2.4.2 Cryptographic Protocols 25 2.5 Summary 25 3 Mathematical Background 27 3.1 Basic Concepts in Modern Algebra and Number Theory 27 3.1.1 Group 27 3.1.1.1 Abelian Group 28 3.1.1.2 Cyclic Group 28 3.1.2 Ring 29 3.1.3 Field 29 3.2 Prime Numbers, Modular Arithmetic, and Divisors 30 3.2.1 Prime Numbers 30 3.2.2 Modular Arithmetic 30 3.2.3 Divisors and GCD 31 3.2.4 Multiplicative Inverse 33 3.3 Finite Field and Galois Field 34 3.4 Polynomial Arithmetic 35 3.4.1 Ordinary Polynomial Arithmetic 35 3.4.2 Polynomial Arithmetic in Finite Fields 36 3.4.3 Modular Polynomial Arithmetic 37 3.4.4 Computational Considerations 39 3.4.5 Generating a Finite Field with a Generator 40 3.5 Fermat’s Little Theorem, Euler’s Totient Function, and Euler’s Theorem 41 3.5.1 Fermat’s Little Theorem 41 3.5.2 Euler Totient Function 𝜙(n) 42 3.5.3 Euler’s Theorem 43 3.6 Primality Testing 44 3.7 Chinese Remainder Theorem 46 3.8 Discrete Logarithm 48 3.9 Summary 49 Part II Cryptographic Systems 51 4 Cryptographic Techniques 53 4.1 Symmetric Encryption 53 4.2 Classical Cryptographic Schemes 53 4.2.1 Classical Substitution Ciphers 54 4.2.1.1 Caesar Cipher 54 4.2.1.2 Monoalphabetic Cipher 55 4.2.1.3 Playfair Cipher 57 4.2.1.4 Polyalphabetic Cipher 58 4.2.1.5 Autokey Cipher 59 4.2.1.6 One-Time Pad 60 4.2.2 Classical Transposition Ciphers 60 4.2.2.1 Rail Fence Cipher 60 4.2.2.2 Row Transposition Cipher 60 4.2.2.3 Product Cipher 61 4.2.3 More Advanced Classical Ciphers 61 4.2.3.1 Rotor Machines 61 4.2.3.2 Steganography 61 4.3 Stream Cipher 62 4.3.1 Rivest Cipher 4 62 4.4 Modern Block Ciphers 63 4.4.1 Overview of Modern Block Ciphers 63 4.4.2 Feistel Block Cipher 64 4.4.2.1 Ideal Block Cipher 64 4.4.2.2 Feistel Cipher Structure 65 4.4.3 Block Cipher Design 67 4.5 Data Encryption Standards (DES) 67 4.5.1 Overview of DES 67 4.5.2 Initial Permutation (IP) 68 4.5.3 DES Round Function 69 4.5.3.1 DES S-Boxes 71 4.5.3.2 DES Permutation Function 72 4.5.4 DES Key Schedule 72 4.5.5 DES Security 74 4.5.6 Multiple Encryption and DES 75 4.6 Summary 76 5 More on Cryptographic Techniques 77 5.1 Advanced Encryption Standards 77 5.1.1 The AES Cipher: Rijndael 77 5.1.2 AES Data Structure 77 5.1.3 Details in Each Round 79 5.1.3.1 Substitute Bytes 79 5.1.3.2 Shift Rows 81 5.1.3.3 Mix Columns 81 5.1.3.4 Add Round Key 82 5.1.3.5 AES Key Expansion 82 5.1.3.6 AES Decryption 84 5.1.3.7 AES Implementation Aspects 84 5.2 Block Cipher Modes of Operation 85 5.2.1 Electronic Codebook (ECB) Mode 85 5.2.2 Cipher Block Chaining (CBC) Mode 86 5.2.3 Cipher Feedback (CFB) Mode 87 5.2.4 Output Feedback (OFB) Mode 88 5.2.5 The Counter (CTR) Mode 89 5.2.6 Last Block in Different Modes 90 5.2.7 XTS-AES Mode 90 5.3 Public Key Infrastructure 92 5.3.1 Basics of Public Key Cryptography 92 5.3.2 Public-Key Applications 94 5.3.3 Security of Public Key Schemes 94 5.4 The RSA Algorithm 95 5.4.1 RSA Key Setup 95 5.4.2 RSA Encryption and Decryption 96 5.4.3 RSA Security Analysis 96 5.4.3.1 Factoring Problem 97 5.4.3.2 Timing attacks 97 5.4.3.3 Chosen Ciphertext Attacks 97 5.5 Diffie–Hellman (D–H) Key Exchange 97 5.5.1 Finite-Field Diffie–Hellman 97 5.5.2 Elliptic-Curve Diffie–Hellman 98 5.5.3 Diffie–Hellman Key Exchange Vulnerability 98 5.6 Summary 99 6 Message Authentication, Digital Signature, and Key Management 101 6.1 Message Authentication 101 6.1.1 Message Authentication Functions 101 6.1.2 Message Authentication Code 102 6.1.3 Hash Functions 103 6.1.4 Size of MAC and Hash Value 104 6.2 MAC and Hash Algorithms 105 6.2.1 Data Authentication Algorithm 105 6.2.2 A Basic Hash Function Structure 106 6.2.3 Secure Hash Algorithm (SHA) 106 6.2.4 SHA-512 107 6.2.4.1 SHA-512 Compression Function 108 6.2.4.2 SHA-512 Round Function 109 6.2.5 Whirlpool 111 6.2.6 Other MAC Functions 112 6.2.6.1 Keyed Hash Functions as MACs 112 6.2.6.2 Cipher-Based MAC 113 6.3 Digital Signature and Authentication 114 6.3.1 Digital Signature Properties 115 6.3.2 Digital Signature Standard and Algorithm 116 6.3.3 The Elliptic Curve Digital Signature Algorithm 117 6.3.3.1 ECDSA Domain Parameters 117 6.3.3.2 ECDSA Private/Public Keys 118 6.3.3.3 ECDSA Digital Signature Generation 119 6.3.3.4 ECDSA Digital Signature Verification 120 6.3.4 Authentication Protocols 120 6.4 Key Management 122 6.4.1 Key Distribution with Symmetric Key Encryptions 122 6.4.2 Symmetric Key Distribution Using Public Key Cryptosystems 123 6.4.3 Distribution of Public Keys 124 6.4.4 Public Key Infrastructure 126 6.4.5 X.509 Authentication Service 126 6.5 Summary 128 Part III Security for Wireless Local Area Networks 129 7 WLAN Security 131 7.1 Introduction to WLAN 131 7.1.1 Wi-Fi Operating Modes 131 7.1.2 Challenges in WLAN Security 132 7.1.3 Tricks that Fail to Protect WLAN 133 7.2 Evolution of WLAN Security 133 7.3 Wired Equivalent Privacy 135 7.3.1 WEP Access Control 135 7.3.2 WEP Integrity and Confidentiality 136 7.3.3 WEP Key Management 136 7.3.4 WEP Security Problems 137 7.3.4.1 Problems in WEP Access Control 138 7.3.4.2 Problems in WEP Integrity 138 7.3.4.3 Problems in WEP Confidentiality 138 7.3.4.4 Problems in WEP Key Management 139 7.3.5 Possible WEP Security Enhancement 140 7.4 IEEE 802.1X Authentication Model 140 7.4.1 An Overview of IEEE 802.1X 140 7.4.2 Protocols in IEEE 802.1X 141 7.4.3 Mapping the IEEE 802.1X model to WLAN 143 7.5 IEEE 802.11i Standard 143 7.5.1 Overview of IEEE 802.11i 143 7.5.2 IEEE 802.11i Access Control 143 7.5.3 IEEE 802.1i Key Management 145 7.5.4 IEEE 802.11i Integrity and Confidentiality 147 7.5.4.1 TKIP Mode 147 7.5.4.2 AES-CCMP Mode 148 7.5.5 Function Michael 148 7.5.6 Weakness in 802.11i 150 7.6 Wi-Fi Protected Access 3 and Opportunistic Wireless Encryption 150 7.6.1 WPA3-Personal 150 7.6.2 WPA3-Enterprise 150 7.6.3 Opportunistic Wireless Encryption 151 7.7 Summary 152 8 Bluetooth Security 153 8.1 Introduction to Bluetooth 153 8.1.1 Overview of Bluetooth Technology 153 8.1.2 Bluetooth Vulnerabilities and Threats 154 8.1.2.1 Bluesnarfing 155 8.1.2.2 Bluejacking 155 8.1.2.3 Bluebugging 155 8.1.2.4 Car Whisperer 155 8.1.2.5 Fuzzing Attacks 155 8.1.3 Bluetooth Security Services and Security Modes 156 8.1.3.1 Bluetooth Security Services 156 8.1.3.2 Bluetooth Security Modes 156 8.2 Link Key Generation 157 8.2.1 Link Key Generation for Security Modes 2 and 3 157 8.2.2 Link Key Generation for Security Mode 4 158 8.2.3 Association Model in Mode 4 159 8.2.3.1 Numeric comparison 159 8.2.3.2 Out-of-Band (OOB) 160 8.2.3.3 Passkey entry 162 8.3 Authentication, Confidentiality, and Trust and Service Levels 163 8.3.1 Authentication 163 8.3.2 Confidentiality 164 8.3.3 Trust and Security Service Levels 165 8.4 Cryptographic Functions for Security Modes 1, 2, and 3 166 8.4.1 SAFER+ 166 8.4.1.1 Overview of the SAFER+ Structure 166 8.4.1.2 SAFER+ Round Function 166 8.4.1.3 SAFER+ Key Schedule for 128-Bit Key 168 8.4.2 Function E1(⋅) 168 8.4.3 Function E21(⋅) 170 8.4.4 Function E22(⋅) 170 8.4.5 Function E3(⋅) 171 8.4.6 Function E0(⋅) 171 8.5 Cryptographic Functions in Security Mode 4 (SSP) 173 8.5.1 Function P192(⋅) 173 8.5.2 Function f1(⋅) 174 8.5.3 Function g(⋅) 174 8.5.3.1 Function f2(⋅) 174 8.5.3.2 Function f3(⋅) 174 8.6 Summary 174 9 Zigbee Security 177 9.1 Introduction to Zigbee 177 9.1.1 Overview of Zigbee 177 9.1.2 Security Threats Against Zigbee 178 9.2 IEEE 802.15.4 Security Features 179 9.2.1 Security Levels 179 9.2.2 IEEE 802.15.4 Frame Structure 180 9.3 Zigbee Upper Layer Security 182 9.3.1 Zigbee Security Models 182 9.3.2 Security Keys in Zigbee 183 9.3.3 Zigbee Network Layer Security 184 9.3.4 Zigbee Application Support Layer Security 184 9.3.5 Other Security Features in Zigbee 185 9.4 Security-Related MAC PIB Attributes 187 9.5 Mechanisms Used in Zigbee Security 188 9.5.1 AES-CTR 188 9.5.2 AES-CBC-MAC 189 9.5.3 Overview of the AES-CCM 189 9.5.4 Nonces Applied to the Security Mechanisms 189 9.5.5 Matyas–Meyer–Oseas Hash Function 190 9.6 Summary 191 10 RFID Security 193 10.1 Introduction to RFID 193 10.1.1 Overview of RFID Subsystems 193 10.1.2 Types of RFID Tags 193 10.1.3 RFID Transactions 194 10.1.4 RFID Frequency Bands 194 10.2 Security Attacks, Risks, and Objectives of RFID Systems 195 10.2.1 Security Attacks to RFID Systems 195 10.2.2 RFID Privacy Risks 195 10.2.3 Security Objectives 196 10.3 Mitigation Strategies and Countermeasures for RFID Security Risks 196 10.3.1 Cryptographic Strategies 196 10.3.1.1 Encryption 196 10.3.1.2 One-Way Hash Locks 196 10.3.1.3 EPC Tag PINs 197 10.3.2 Anti-Collision Algorithms 197 10.3.2.1 Tree-Walking 197 10.3.2.2 The Selective Blocker Tag 197 10.3.3 Other Mitigation Strategies 198 10.3.3.1 Physical Shielding Sleeve (The Faraday Cage) 198 10.3.3.2 Secure Reader Protocol 1.0 198 10.4 RFID Security Mechanisms 199 10.4.1 Hash Locks 199 10.4.1.1 Default Hash Locking 199 10.4.1.2 Randomized Hash Locking 200 10.4.2 HB Protocol and the Enhancement 200 10.4.2.1 HB Protocol 200 10.4.2.2 HB+ Protocol 202 10.4.2.3 HB++ Protocol 203 10.5 Summary 205 Part IV Security for Wireless Wide Area Networks 207 11 GSM Security 209 11.1 GSM System Architecture 209 11.1.1 Mobile Station 209 11.1.2 Base Station Subsystem 210 11.1.3 Network Subsystem 211 11.2 GSM Network Access Security Features 212 11.2.1 GSM Entity Authentication 212 11.2.2 GSM Confidentiality 214 11.2.3 GSM Anonymity 215 11.2.4 Detection of Stolen/Compromised Equipment in GSM 215 11.3 GSM Security Algorithms 215 11.3.1 Algorithm A3 216 11.3.2 Algorithm A8 216 11.3.3 Algorithm COMP128 216 11.3.4 Algorithm A5 220 11.3.4.1 A5∕1 220 11.3.4.2 Algorithm A5∕2 223 11.4 Attacks Against GSM Security 225 11.4.1 Attacks Against GSM Authenticity 225 11.4.1.1 Attacks Against GSM Confidentiality 226 11.4.2 Other Attacks against GSM Security 227 11.5 Possible GSM Security Improvements 227 11.5.1 Improvement over Authenticity and Anonymity 227 11.5.2 Improvement over Confidentiality 228 11.5.3 Improvement of the Signaling Network 228 11.6 Summary 228 12 UMTS Security 229 12.1 UMTS System Architecture 229 12.1.1 User Equipment 229 12.1.2 UTRAN 230 12.1.3 Core Network 231 12.2 UMTS Security Features 231 12.3 UMTS Network Access Security 232 12.3.1 Authentication and Key Agreement 232 12.3.1.1 The AKA Mechanism 232 12.3.1.2 Authentication Vector Generation 234 12.3.1.3 AKA on the UE Side 236 12.3.2 Confidentiality 237 12.3.3 Data Integrity 238 12.3.4 User Identity Confidentiality 239 12.4 Algorithms in Access Security 240 12.4.1 Encryption Algorithm f8 240 12.4.1.1 Integrity Algorithm f9 241 12.4.2 Description of KASUMI 242 12.4.2.1 An Overview of KASUMI Algorithm 242 12.4.2.2 Round Function Fi(⋅) 244 12.4.2.3 Function FL 244 12.4.2.4 Function FO 244 12.4.2.5 Function FI 245 12.4.2.6 S-boxes S7 and S9 245 12.4.2.7 Key Schedule 247 12.4.3 Implementation and Operational Considerations 248 12.5 Other UMTS Security Features 249 12.5.1 Mobile Equipment Identification 249 12.5.2 Location Services 249 12.5.3 User-to-USIM Authentication 249 12.6 Summary 250 13 LTE Security 251 13.1 LTE System Architecture 251 13.2 LTE Security Architecture 253 13.3 LTE Security 255 13.3.1 LTE Key Hierarchy 255 13.3.2 LTE Authentication and Key Agreement 257 13.3.3 Signaling Protection 258 13.3.3.1 Protection of Radio-Specific Signaling 259 13.3.3.2 Protection of User-Plane Traffic 259 13.3.4 Overview of Confidentiality and Integrity Algorithms 259 13.3.4.1 Confidentiality Mechanism 259 13.3.4.2 Integrity Mechanism 260 13.3.5 Non-3GPP Access 261 13.4 Handover Between eNBs 261 13.4.1 Overview 261 13.4.2 Key Handling in Handover 262 13.4.2.1 Initialization 262 13.4.2.2 Intra-eNB Key Handling 264 13.4.2.3 Intra-MME Key Handling 265 13.4.2.4 Inter-MME Key Handling 266 13.5 Security Algorithms 268 13.5.1 128-EEA2 268 13.5.2 128-EIA2 269 13.5.3 EEA3 270 13.5.4 EIA3 271 13.6 Security for Interworking Between LTE and Legacy Systems 273 13.6.1 Between LTE and UMTS 273 13.6.1.1 Idle Mode Mobility from E-UTRAN to UTRAN 273 13.6.1.2 Idle Mode Mobility from UTRAN to E-UTRAN 274 13.6.1.3 Handover Mode from E-UTRAN to UTRAN 275 13.6.1.4 Handover Mode from UTRAN to E-UTRAN 276 13.6.2 Between E-UTRAN and GERAN 277 13.6.2.1 Idle Mode 277 13.6.2.2 Handover Mode 277 13.7 Summary 278 Part V Security for Next Generation Wireless Networks 279 14 Security in 5G Wireless Networks 281 14.1 Introduction to 5GWireless Network Systems 281 14.1.1 The Advancement of 5G 281 14.1.2 5GWireless Network Systems 282 14.2 5G Security Requirements and Major Drives 283 14.2.1 Security Requirements for 5GWireless Networks 283 14.2.2 Major Drives for 5GWireless Security 284 14.2.2.1 Supreme Built-in-Security 284 14.2.2.2 Flexible Security Mechanisms 285 14.2.2.3 Automation 285 14.2.3 Attacks in 5G Wireless Networks 286 14.2.3.1 Eavesdropping and Traffic Analysis 286 14.2.3.2 Jamming 286 14.2.3.3 DoS and DDoS 287 14.2.3.4 Man-In-The-Middle (MITM) 287 14.3 A 5G Wireless Security Architecture 287 14.3.1 New Elements in 5G Wireless Security Architecture 287 14.3.2 A 5G Wireless Security Architecture 288 14.3.2.1 Network Access Security (I) 288 14.3.2.2 Network Domain Security (II) 289 14.3.2.3 User Domain Security (III) 289 14.3.2.4 Application Domain Security (IV) 289 14.4 5GWireless Security Services 289 14.4.1 Cryptography in 5G 289 14.4.2 Identity Management 290 14.4.3 Authentication in 5G 291 14.4.3.1 Flexible Authentication 291 14.4.3.2 Authentication Through Legacy Cellular System 291 14.4.3.3 SDN Based Authentication in 5G 293 14.4.3.4 Authentication of D2D in 5G 294 14.4.3.5 Authentication of RFID in 5G 294 14.4.4 Data Confidentiality in 5G 295 14.4.4.1 Power Control 295 14.4.4.2 Artificial Noise and Signal Processing 297 14.4.5 Handover Procedure and Signaling Load Analysis 297 14.4.6 Availability in 5G 297 14.4.7 Location and Identity Anonymity in 5G 300 14.5 5G Key Management 300 14.5.1 3GPP 5G Key Architecture 300 14.5.2 Key Management in 5G Handover 301 14.5.3 Key Management for D2D Users 302 14.6 Security for New Communication Techniques in 5G 303 14.6.1 Heterogeneous Network and Massive MIMO in 5G 303 14.6.2 Device-to-Device Communications in 5G 304 14.6.3 Software-Defined Network in 5G 306 14.6.4 Internet-of-Things in 5G 308 14.7 Challenges and Future Directions for 5G Wireless Security 308 14.7.1 New Trust Models 308 14.7.2 New Security Attack Models 308 14.7.3 Privacy Protection 309 14.7.4 Flexibility and Efficiency 309 14.7.5 Unified Security Management 309 14.8 Summary 310 15 Security in V2X Communications 311 15.1 Introduction to V2X Communications 311 15.1.1 Generic System Architecture of V2X Communications 311 15.1.2 Dedicated Short Range Communications 312 15.1.3 Cellular Based V2X Communications 313 15.2 Security Requirements and Possible Attacks in V2X Communications 314 15.2.1 Security Requirements 314 15.2.2 Attacks in V2X Communications 315 15.2.3 Basic Solutions 316 15.3 IEEEWAVE Security Services for Applications and Management Messages 316 15.3.1 Overview of the WAVE Protocol Stack and Security Services 316 15.3.2 Secure Data Service and Security Service Management Entity 318 15.3.3 CRL Verification Entity and P2P Certificate Distribution Entity 319 15.4 Security in Cellular Based V2X Communications 320 15.4.1 LTE-V2X Communication Security 320 15.4.2 5G-V2X Communication Security 322 15.5 Cryptography and Privacy Preservation in V2X Communications 323 15.5.1 Identity Based Schemes 323 15.5.2 Group Signature Based Schemes 325 15.5.3 Batch Verification Schemes 326 15.5.4 Reputation and Trust Based Schemes 327 15.5.5 Identity Anonymity Preservation 328 15.5.6 Location Anonymity Preservation 328 15.6 Challenges and Future Research Directions 329 15.6.1 Highly Efficient Authentication Schemes 329 15.6.2 Efficient Revocation Mechanisms 330 15.6.3 Advancing OBU and TPD Technologies 330 15.6.4 Advancing Cryptography and Privacy Preservation Schemes 330 15.6.5 Advancing Solutions to HetNet, SDN, and NFV 330 15.6.6 Advancing Artificial Intelligence in V2X Communication Security 330 15.7 Summary 331 References 333 Index 345

    1 in stock

    £77.36

  • MCA Microsoft Certified Associate Azure Security

    John Wiley & Sons Inc MCA Microsoft Certified Associate Azure Security

    2 in stock

    Book SynopsisPrepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You'll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. You'll learn to maintain the security posture of an Azure environment, implement threat protection, and respond to security incident escalations. Readers will also find: Efficient and accurate coverage of every topic necessary to succeed on the MCA Azure Security Engineer examRobust discussions of all the skills you need to hit the ground running at your firstor nextAzure cybersecurity jobComplementary access to online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossaryThe MCA Azure Security Engineer AZ-500 exam is a challenging barrier to certification. But you can prepare confidently and quickly with this latest expert resource from Sybex. It's ideal for anyone preparing for the AZ-500 exam or seeking to step into their next role as an Azure security engineer.Table of ContentsIntroduction xix Assessment Test xxv Chapter 1 Introduction to Microsoft Azure 1 What Is Microsoft Azure? 3 Cloud Environment Security Objectives 4 Confidentiality 4 Integrity 4 Availability 5 Nonrepudiation 5 Common Security Issues 5 Principle of Least Privilege 5 Zero- Trust Model 6 Defense in Depth 6 Avoid Security through Obscurity 9 The AAAs of Access Management 9 Encryption 10 End- to- End Encryption 11 Symmetric Key Encryption 11 Asymmetric Key Encryption 11 Network Segmentation 13 Basic Network Configuration 13 Unsegmented Network Example 14 Internal and External Compliance 15 Cybersecurity Considerations for the Cloud Environment 16 Configuration Management 17 Unauthorized Access 17 Insecure Interfaces/APIs 17 Hijacking of Accounts 17 Compliance 18 Lack of Visibility 18 Accurate Logging 18 Cloud Storage 18 Vendor Contracts 19 Link Sharing 19 Major Cybersecurity Threats 19 DDoS 19 Social Engineering 20 Password Attacks 21 Malware 21 Summary 24 Exam Essentials 24 Review Questions 26 Chapter 2 Managing Identity and Access in Microsoft Azure 29 Identity and Access Management 31 Identifying Individuals in a System 31 Identifying and Assigning Roles in a System and to an Individual 32 Assigning Access Levels to Individuals or Groups 33 Adding, Removing, and Updating Individuals and Their Roles in a System 33 Protecting a System’s Sensitive Data and Securing the System 33 Enforcing Accountability 34 IAM in the Microsoft Azure Platform 34 Creating and Managing Azure AD Identities 34 Managing Azure AD Groups 37 Managing Azure Users 39 Adding Users to Your Azure AD 39 Managing External Identities Using Azure AD 40 Managing Secure Access Using Azure Active Directory 42 Implementing Conditional Access Policies, Including MFA 44 Implementing Azure AD Identity Protection 45 Enabling the Policies 47 Implement Passwordless Authentication 50 Configuring an Access Review 52 Managing Application Access 57 Integrating Single Sign- On and Identity Providers for Authentication 57 Creating an App Registration 58 Configuring App Registration Permission Scopes 58 Managing App Registration Permission Consent 59 Managing API Permission to Azure Subscriptions 60 Configuring an Authentication Method for a Service Principal 61 Managing Access Control 62 Interpret Role and Resource Permissions 62 Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources 63 Assigning Built- In Azure AD Roles 64 Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles 65 Summary 66 Exam Essentials 67 Review Questions 70 Chapter 3 Implementing Platform Protections 73 Implementing Advanced Network Security 75 Securing Connectivity of Hybrid Networks 75 Securing Connectivity of Virtual Networks 77 Creating and Configuring Azure Firewalls 78 Azure Firewall Premium 79 Creating and Configuring Azure Firewall Manager 82 Creating and Configuring Azure Application Gateway 82 Creating and Configuring Azure Front Door 87 Creating and Configuring a Web Application Firewall 91 Configuring Network Isolation for Web Apps and Azure Functions 93 Implementing Azure Service Endpoints 94 Implementing Azure Private Endpoints, Including Integrating with Other Services 97 Implementing Azure Private Link 98 Implementing Azure DDoS Protection 101 Configuring Enhanced Security for Compute 102 Configuring Azure Endpoint Protection for VMs 102 Enabling Update Management in Azure Portal 104 Configuring Security for Container Services 108 Managing Access to the Azure Container Registry 109 Configuring Security for Serverless Compute 109 Microsoft Recommendations 111 Configuring Security for an Azure App Service 112 Exam Essentials 118 Review Questions 122 Chapter 4 Managing Security Operations 125 Configure Centralized Policy Management 126 Configure a Custom Security Policy 126 Create Custom Security Policies 127 Creating a Policy Initiative 128 Configuring Security Settings and Auditing by Using Azure Policy 129 Configuring and Managing Threat Protection 130 Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint) 131 Configuring Microsoft Defender for SQL 134 Using the Microsoft Threat Modeling Tool 139 Azure Monitor 147 Visualizations in Azure Monitor 148 Configuring and Managing Security Monitoring Solutions 149 Creating and Customizing Alert Rules by Using Azure Monitor 149 Configuring Diagnostic Logging and Retention Using Azure Monitor 157 Monitoring Security Logs Using Azure Monitor 159 Microsoft Sentinel 167 Configuring Connectors in Microsoft Sentinel 170 Evaluating Alerts and Incidents in Microsoft Sentinel 175 Summary 176 Exam Essentials 177 Review Questions 179 Chapter 5 Securing Data and Applications 183 Configuring Security for Storage in Azure 184 Storage Account Access Keys 185 Configuring Access Control for Storage Accounts 185 Configuring Storage Account Access Keys 189 Configuring Azure AD Authentication for Azure Storage and Azure Files 191 Configuring Delegated Access for Storage Accounts 202 Configuring Security for Databases 220 Summary 254 Exam Essentials 255 Review Questions 257 Appendix A An Azure Security Tools Overview 261 Chapter 2, “Managing Identity and Access on Microsoft Azure” 262 Azure Active Directory (AD) 262 Microsoft Authenticator App 265 Azure API Management 265 Chapter 3, “Implementing Platform Protections” 266 Azure Firewall 266 Azure Firewall Manager 267 Azure Application Gateway 269 Azure Front Door 273 Web Application Firewall 273 Azure Service Endpoints 274 Azure Private Links 274 Azure DDoS Protection 275 Microsoft Defender for Cloud 276 Azure Container Registry 277 Azure App Service 278 Chapter 4, “Managing Security Operations” 279 Azure Policy 279 Microsoft Threat Modeling Tool 281 Microsoft Sentinel 287 How Does Microsoft Sentinel Work? 289 Automation 290 Chapter 5, “Securing Data and Applications” 290 Azure Key Vault 299 Appendix B Answers to Review Questions 301 Chapter 1: Introduction to Microsoft Azure 302 Chapter 2: Managing Identity and Access in Microsoft Azure 303 Chapter 3: Implementing Platform Protections 304 Chapter 4: Managing Security Operations 305 Chapter 5: Securing Data and Applications 306 Index 309

    2 in stock

    £38.00

  • CompTIA Security Practice Tests

    John Wiley & Sons Inc CompTIA Security Practice Tests

    2 in stock

    Book SynopsisPrepare for the Security+ certification exam confidently and quickly CompTIA Security+ Practice Tests: Exam SY0-701, Third Edition, prepares you for the newly updated CompTIA Security+ exam. You''ll focus on challenging areas and get ready to ace the exam and earn your Security+ certification. This essential collection of practice tests contains study questions covering every single objective domain included on the SY0-701. Comprehensive coverage of every essential exam topic guarantees that you''ll know what to expect on exam day, minimize test anxiety, and maximize your chances of success. You''ll find 1000 practice questions on topics like general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program oversight. You''ll also find: Complimentary access to the Sybex test bank and interactive learning environment Clear and accurate answers, complete with explanationsTable of ContentsIntroduction xi Chapter 1 Domain 1.0: General Security Concepts 1 Chapter 2 Domain 2.0: Threats, Vulnerabilities, and Mitigations 29 Chapter 3 Domain 3.0: Security Architecture 69 Chapter 4 Domain 4.0: Security Operations 115 Chapter 5 Domain 5.0: Security Program Management and Oversight 169 Appendix Answers to Review Questions 217 Chapter 1: Domain 1.0: General Security Concepts 218 Chapter 2: Domain 2.0: Threats, Vulnerabilities, and Mitigations 233 Chapter 3: Domain 3.0: Security Architecture 255 Chapter 4: Domain 4.0: Security Operations 283 Chapter 5: Domain 5.0: Security Program Management and Oversight 309 Index 337

    2 in stock

    £27.99

  • Cyber Warfare and Cyber Terrorism

    IGI Global Cyber Warfare and Cyber Terrorism

    1 in stock

    Book SynopsisCyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems.

    1 in stock

    £123.00

  • Cognitive Superiority: Information to Power

    Springer Nature Switzerland AG Cognitive Superiority: Information to Power

    1 in stock

    Book SynopsisIn a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains—land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger contest for power; a contest for cognitive superiority. Written by experts in military operations research and neuropsychology, this book introduces the concept of cognitive superiority and provides the keys to succeeding within a complex matrix where the only rules are the laws of physics, access to information, and the boundaries of cognition.The book describes the adversarial environment and how it interacts with the ongoing, accelerating change that we are experiencing, irrespective of adversaries. It talks about the ascendant power of information access, pervasive surveillance, personalized persuasion, and emerging new forms of cognition. It profiles salient technologies and science, including persuasion science, artificial intelligence and machine learning (AI/ML), surveillance technologies, complex adaptive systems, network science, directed human modification, and biosecurity. Readers will learn about human and machine cognition, what makes it tick, and why and how we and our technologies are vulnerable.Following in the tradition of Sun-Tsu and von Clausewitz, this book writes a new chapter in the study of warfare and strategy. It is written for those who lead, aspire to leadership, and those who teach or persuade, especially in the fields of political science, military science, computer science, and business.Table of ContentsChapter 1: Introduction – Humans and their Matrix.- Chapter 2: The Technium – Tools and Targets of the Conflicts.- Chapter 3: The Noosphere.- Chapter 4: The Target – Humans.- Chapter 5: The Technium – Plus, Redux.- Chapter 6: The adversarial Environment.- Chapter 7: Engagement.- Chapter 8: Conclusion.- Appendix.- Glossary of Selected Terms.- Bibliography.- Index.

    1 in stock

    £67.49

  • Privacy Risk Analysis

    Springer International Publishing AG Privacy Risk Analysis

    1 in stock

    Book SynopsisPrivacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects.This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book.Table of ContentsPreface.- Acknowledgments.- Introduction.- Terminology.- Processing System.- Personal Data.- Stakeholders.- Risk Sources.- Feared Events.- Privacy Harms.- Privacy Risk Analysis.- Conclusion.- Bibliography.- Authors' Biographies .

    1 in stock

    £31.49

  • Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

    Springer International Publishing AG Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022.The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy. Table of Contents​Symmetric Cryptography.- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128.- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers.- Hardware Implementation of Masked SKINNY SBox with Application to AEAD.- Bias Cancellation of MixColumns.- Big Brother Is Watching You: A Closer Look At Backdoor Construction.- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs.- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems.- Protecting the most significant bits in scalar multiplication algorithms.- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields.- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view.- Hardware Security and AI.- What Do You See? Transforming Fault Injection Target Characterizations.- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log.- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs.- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation.- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles.- Network security, Authentication, and Privacy.- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology.- An analysis of the hardware-friendliness of AMQ data structures for network security.- RemOD: Operational Drift-adaptive Intrusion Detection.- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.

    1 in stock

    £56.99

  • Autonomous Intelligent Cyber Defense Agent

    Springer International Publishing AG Autonomous Intelligent Cyber Defense Agent

    1 in stock

    Book SynopsisThis book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA.Today’s cyber defense tools are mostly watchers. They are not active doers. They do little to plan and execute responses to attacks, and they don’t plan and execute recovery activities. Response and recovery – core elements of cyber resilience – are left to human cyber analysts, incident responders and system administrators. This is about to change. The authors advocate this vision, provide detailed guide to how such a vision can be realized in practice, and its current state of the art.This book also covers key topics relevant to the field, including functional requirements and alternative architectures of AICA, how it perceives and understands threats and the overall situation, how it plans and executes response and recovery, how it survives threats, and how human operators deploy and control AICA. Additionally, this book covers issues of testing, risk, and policy pertinent to AICA, and provides a roadmap towards future R&D in this field.This book targets researchers and advanced students in the field of cyber defense and resilience. Professionals working in this field as well as developers of practical products for cyber autonomy will also want to purchase this book.Table of ContentsChapter. 1. Autonomous Intelligent Cyber-defense Agent: Introduction and OverviewChapter. 2. Alternative Architectural ApproachesChapter. 3. Perception of EnvironmentChapter. 4. Perception of Cyber ThreatsChapter. 5. Situational Understanding and DiagnosticsChapter. 6. Learning about the AdversaryChapter. 7. Response PlanningChapter. 8. Recovery PlanningChapter. 9. Strategic Cyber CamouflageChapter. 10. Adaptivity & AntifragilityChapter. 11. Negotiation and CollaborationChapter. 12. Human InteractionsChapter. 13. Testing and MeasurementsChapter. 14. Deployment and OperationChapter. 15. Command in AICA-intensive OperationsChapter. 16. Risk ManagementChapter. 17. Policy IssuesChapter. 18. Development ChallengesChapter. 19. Case Study A: A Prototype Autonomous Intelligent Cyber-defense AgentChapter. 20. Case Study B: AI Agents for Tactical EdgeChapter. 21. Case Study C: the Sentinel Agents

    1 in stock

    £123.49

  • Space-Air-Ground Integrated Network Security

    Springer Verlag, Singapore Space-Air-Ground Integrated Network Security

    1 in stock

    Book SynopsisThis book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.Table of ContentsChapter 1 Introduction to SAGIN Security.- Chapter 2 Theory Foundation of SAGIN Security.- Chapter 3 Ground Network Security.- Chapter 4 Airborne Network Security.- Chapter 5 Space Network Security.- Chapter 6 Future Trend of Network Security.

    1 in stock

    £151.99

  • Ransomware and Cyber Extortion

    Pearson Education (US) Ransomware and Cyber Extortion

    1 in stock

    Book SynopsisSherri Davidoff, CEO of LMG Security and author of Data Breaches, has been called a security badass by the New York Times. An instructor at the renowned Black Hat cybersecurity trainings, she is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN). She holds a degree in computer science and electrical engineering from MIT. Matt Durrin, the Director of Training and Research at LMG Security, is a popular speaker at national conferences and training venues. His malware research has been featured on the NBC Nightly News. Karen Sprenger, LMG Security's COO and chief ransomware negotiator, is a noted industry expert, speaker, trainer, and course developer with 25+ years of security/IT experience. She is a GIAC-certified forensic examiner (GCFE) and Certified Information Systems Security Professional (CISSP).Trade Review"Ransomware and Cyber Extortion is a masterstroke that will lead both technical and non-technical readers alike on a journey through the complex and sometimes dark world of cyber extortion. The encore of practical advice and guidance on preventing ransomware can help organizations of all sizes."--Russ Cohen, Head of Cyber Services US, Beazley Group "Davidoff and team have built a magisterial and yet still approachable guide to ransomware. This just became the definitive and classic text. I've been writing about some of these attacks for years and still was blown away by how much more they taught me. I'll hand this to every infosec newcomer and senior consultant from now on."--Tarah Wheeler, CEO, Red Queen Dynamics "Ransomware attacks are no longer encrypt-and-export incidents; they have evolved into sophisticated, multipronged attacks that require a multidisciplinary response of forensic, technical, and compliance expertise and savvy cybercrime negotiation skills. Sherri Davidoff, Matt Durrin, and Karen Sprenger are that 'Dream Team' and concisely help the reader understand how to prepare for and respond to ransomware attacks. This book is a must-read for every member of an internal or external incident response team."--Jody R. Westby, CEO, Global Cyber Risk LLC, Chair, ABA Privacy & Computer Crime Committee (Section of Science & Technology Law) "A thoroughly delightful read, Ransomware and Cyber Extortion takes the topic everyone is talking about and deconstructs it with history and actionable guidance. A must-read before you next brief your board or peers on your own incident response plans."--Andy Ellis, CSO Hall of Fame '21Table of ContentsPreface xxiAcknowledgments xxviiAbout the Authors xxix Chapter 1: Impact 11.1 A Cyber Epidemic 31.2 What Is Cyber Extortion? 41.3 Impacts of Modern Cyber Extortion 71.4 Victim Selection 151.5 Scaling Up 181.6 Conclusion 241.7 Your Turn! 24 Chapter 2: Evolution 272.1 Origin Story 282.2 Cryptoviral Extortion 292.3 Early Extortion Malware 302.4 Key Technological Advancements 312.5 Ransomware Goes Mainstream 382.6 Ransomware-as-a-Service 392.7 Exposure Extortion 402.8 Double Extortion 432.9 An Industrial Revolution 452.10 Conclusion 602.11 Your Turn! 61 Chapter 3: Anatomy of an Attack 633.1 Anatomy Overview 633.2 Entry 653.3 Expansion 723.4 Appraisal 763.5 Priming 773.6 Leverage 803.7 Extortion 853.8 Conclusion 883.9 Your Turn! 88 Chapter 4: The Crisis Begins! 914.1 Cyber Extortion Is a Crisis 924.2 Detection 934.3 Who Should Be Involved? 944.4 Conduct Triage 984.5 Assess Your Resources 1024.6 Develop the Initial Response Strategy 1054.7 Communicate 1074.8 Conclusion 1124.9 Your Turn! 112 Chapter 5: Containment 1155.1 The Need for Speed 1165.2 Gain Access to the Environment 1175.3 Halting Encryption/Deletion 1185.4 Disable Persistence Mechanisms 1215.5 Halting Data Exfiltration 1235.6 Resolve Denial-of-Service Attacks 1245.7 Lock Out the Hackers 1255.8 Hunt for Threats 1295.9 Taking Stock 1335.10 Conclusion 1345.11 Your Turn! 134 Chapter 6: Investigation 1376.1 Research the Adversary 1386.2 Scoping 1466.3 Breach Investigation or Not? 1506.4 Evidence Preservation 1526.5 Conclusion 1606.6 Your Turn! 161 Chapter 7: Negotiation 1637.1 It's a Business 1647.2 Establish Negotiation Goals 1657.3 Outcomes 1697.4 Communication Methods 1717.5 Pressure Tactics 1737.6 Tone, Timeliness, and Trust 1767.7 First Contact 1787.8 Sharing Information 1797.9 Common Mistakes 1827.10 Proof of Life 1837.11 Haggling 1867.12 Closing the Deal 1897.13 Conclusion 1907.14 Your Turn! 191 Chapter 8: Payment 1938.1 To Pay or Not to Pay? 1948.2 Forms of Payment 1978.3 Prohibited Payments 1988.4 Payment Intermediaries 2018.5 Timing Issues 2028.6 After Payment 2048.7 Conclusion 2058.8 Your Turn! 206 Chapter 9: Recovery 2099.1 Back up Your Important Data 2109.2 Build Your Recovery Environment 2119.3 Set up Monitoring and Logging 2149.4 Establish Your Process for Restoring Individual Computers 2179.5 Restore Based on an Order of Operations 2199.6 Restoring Data 2249.7 Decryption 2279.8 It's Not Over 2349.9 Adapt 2359.10 Conclusion 2369.11 Your Turn! 236 Chapter 10: Prevention 23910.1 Running an Effective Cybersecurity Program 24010.2 Preventing Entry 25010.3 Detecting and Blocking Threats 25810.4 Operational Resilience 26110.5 Reducing Risk of Data Theft 26710.6 Solving the Cyber Extortion Problem 26910.7 Conclusion 27410.8 Your Turn! 274 Afterword 277 Checklist A: Cyber Extortion Response 279 Checklist B: Resources to Create in Advance 285 Checklist C: Planning Your Response 291 Checklist D: Running an Effective Cybersecurity Program 293 Index 299

    1 in stock

    £34.19

  • Foundations Of Information Security: A

    No Starch Press,US Foundations Of Information Security: A

    1 in stock

    Book SynopsisFoundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.Trade Review“This book is an excellent starting point for future security professionals but also network and system administrators.”—Help Net Security"A thorough overview for many different areas within security. The author explains what and more importantly why, then illustrates each concept with concrete, realistic examples. Definitely a great addition to any security engineer's library, but also less technical people who want to learn more about common topics like defense in depth."—Seth Foley"If you’re new to info security or are looking to refresh your knowledge, then this is an ideal book. It’s easy to read and makes the information fun to consume."—HaXez, Blogger and YouTuberTable of ContentsIntroductionChapter 1: What is Information Security?Chapter 2: Indentification and AuthenticationChapter 3: Authorization and Access ControlChapter 4: Auditing and AccountabilityChapter 5: CryptographyChapter 6: Compliance, Laws, and RegulationsChapter 7: Operations SecurityChapter 8: Human Element SecurityChapter 9: Physical SecurityChapter 10: Network SecurityChapter 11: Operating System SecurityChapter 12: Mobile, Embedded, and Internet of Things SecurityChapter 13: Application SecurityChapter 14: Assessing SecurityNotes

    1 in stock

    £30.39

  • Tactical Wireshark

    APress Tactical Wireshark

    3 in stock

    Book SynopsisTake a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you''ll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial click through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you''ll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forenTable of ContentsChapter 1: Customization of the Wireshark Interface Chapter Goal: - Learn how to edit the columns of the Wireshark user interface. Explore important items to include in the interface for performing intrusion and malware analysis No of pages - 18 Sub -Topics 1. Identifying columns to delete from the default displays 2. Adding the source and destination ports for easy traffic analysis 3. Specialty column customization for malware analysis Intrusions Chapter 2: Capturing Network Traffic Chapter Goal: Setup a network capture in Wireshark No of pages: - 24 Sub - Topics 1. Prerequisites for capturing live network data 2. Working with Network Interfaces 3. Exploring the network capture options 4. Filtering While Capturing Chapter 3: Interpreting Network Protocols Chapter Goal: A deep understanding of the network protocols at the packet level No of pages : 30 Sub - Topics: 1. Investigating IP, the workhorse of the network 2. Analyzing ICMP and UDP 3. Dissection of TCP traffic 4. Reassembly of packets 5. Interpreting Name Resolution Chapter 4: Analysis of Network Attacks Chapter Goal: Understand the hacking mindset and leverage that to identify attacks No of pages: 30 Sub - Topics: 1. Introducing a Hacking Methodology 2. Examination of reconnaissance network traffic artifacts 3. Leveraging the statistical properties of the capture file 4. Identifying SMB based attacks 5. Uncovering HTTP/HTTPS based attack traffic Chapter 5: Effective Network Traffic Filtering Chapter Goal: Use of the complex filtering capability of Wireshark to extract attack data No of pages: 35 Sub - Topics: 1. Identifying filter components 2. Investigating the conversations 3. Extracting the packet data 4. Building Filter Expressions 5. Decrypting HTTPS Traffic Chapter 6: Advanced Features of Wireshark Chapter Goal: A fundamental review and understanding of the advanced features of Wireshark No of pages: 35 Sub – Topics: 1. Working with cryptographic information in a packet 2. Exploring the protocol dissectors of Wireshark 3. Viewing logged anomalies in Wireshark 4. Capturing traffic from remote computers 5. Command line tool tshark 6. Creating Firewall ACL rules Chapter 7: Scripting and interacting with Wireshark Chapter Goal: Using scripts to extract and isolate data of interest from network capture files No of pages: 30 Sub – Topics: 1. Lua scripting 2. Interaction with Pandas 3. Leveraging PyShark Malware Chapter 8: Basic Malware Traffic Analysis Chapter Goal: Develop an understanding of the different stages of a malware infection No of pages: 36 Sub – Topics: 1. Customization of the interface for malware analysis 2. Extracting the files 3. Recognizing URL/Domains of an infected site 4. Determining the connections as part of the infected machine 5. Scavenging the infected machine meta data 6. Exporting the data objects Chapter 9: Analyzing Encoding, Obfuscated and ICS Malware Traffic Chapter Goal: Identify the encoding or obfuscated method in network traffic No of pages: 40 Sub – Topics: 1. Investigation of njRAT 2. Analysis of Wanna Cry 3. Exploring Cryptolocker 4. Dissecting TRITON 5. Examining Trickbot 6. Understanding exploit kits Chapter 10: Dynamic Malware Network Activities Chapter Goal: Review and understand malware network activity as it happens No of pages: 40 Sub – Topics: 1. Setting up network and service simulation 2. Monitoring malware communications and connections at run time and beyond 3. Detecting network evasion attempts 4. Investigating Cobalt Strike Beacons 5. Exploring C2 backdoor methods 6. Identifying Domain Generation Algorithms Forensics Chapter 10: Extractions of Forensics Data with Wireshark Chapter Goal: Learn different methods of extracting different types of case related and potential forensics evidence No of pages: 30 Sub – Topics: 1. Interception of telephony data 2. Discovering DOS/DDoS 3. Analysis of HTTP/HTTPS Tunneling over DNS 4. Carving files from network data Chapter 11: Network Traffic Forensics Chapter Goal: An understanding of extraction of potential forensics data No of pages: 30 Sub – Topics: 1. Isolation of conversations 2. Detection of Spoofing, port scanning and SSH attacks 3. Reconstruction of timeline network attack data 4. Extracting compromise data Chapter 12: Conclusion Chapter Goal: Review and summary of covered content No of pages: 10

    3 in stock

    £46.74

  • CCSK Certificate of Cloud Security Knowledge

    McGraw-Hill Education CCSK Certificate of Cloud Security Knowledge

    1 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the challenging CCSK exam from the Cloud Security AllianceThis highly effective self-study guide covers all domains of the challenging Certificate of Cloud Security Knowledge v4 exam. Written by a cloud security trainer and consultant in collaboration with the Cloud Security Alliance, CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide offers clear explanations, real-world examples, and practice questions that match the content and format of those on the actual exam. To aid in retention, each chapter includes exam tips that highlight key information, a review that serves as a quick recap of salient points, and practice questions tTable of ContentsChapter 1: Cloud Computing Concepts and ArchitecturesChapter 2: Governance and Enterprise Risk ManagementChapter 3: Legal Issues, Contracts, and Electronic DiscoveryChapter 4: Compliance and Audit ManagementChapter 5: Information GovernanceChapter 6: Management Plan E and Business ContinuityChapter 7: Infrastructure SecurityChapter 8: Virtualization and ContainersChapter 9: Incident ResponseChapter 10: Application SecurityChapter 11: Data Security and EncryptionChapter 12: Identity, Entitlement, and Access ManagementChapter 13: Security as a ServiceChapter 14: Related TechnologiesChapter 15: ENISA Cloud Computing: Benefits, Risks and Recommendations for Information SecurityAppendix A: Cloud Security LexiconAppendix B: Cloud Security Standards and CertificationsAppendix C: Sample Cloud Policy

    1 in stock

    £31.19

  • In Zero Trust We Trust

    Pearson Education In Zero Trust We Trust

    Book SynopsisAvinash Naduvath is a renowned security architect in the Customer Experience (CX) Security Services division at Cisco Systems. As part of CX-Security, he has delivered multiple solutions to help secure customer networks. The range of services included incepting secure architectures, designs, technology advisories, best practice recommendations, and security assessments.   Prior to his current role in Cisco, Avinash was part of the technical services for security in Cisco-Bangalore and has helped troubleshoot and secure networks for multiple customers. He is a subject matter expert in next-generation firepower technology. Previous to this, Avinash was part of the professional services team in Cisco-Bangalore as a network consulting engineer.   Avinash has over 10 years of experience in the information security domain, having worked on multiple aspects of security such as secure engineering and secure architecture. He has a passio

    £32.39

  • Pearson Education Network Defense and Countermeasures

    1 in stock

    a huge range and FREE tracked UK delivery on ALL orders.

    1 in stock

    £60.32

  • Practical Cloud Native Security with Falco

    O'Reilly Media Practical Cloud Native Security with Falco

    1 in stock

    Book SynopsisThis practical guide introduces you to Falco, the open source standard for continuous risk and threat detection across Kubernetes, containers, and the cloud. Falco creator Loris Degioanni and core maintainer Leonardo Grasso bring you up to speed on cloud native threat detection basics and show you how to get Falco up and running.

    1 in stock

    £39.74

  • Cambridge University Press Cryptography and Secure Communication

    1 in stock

    a huge range and FREE tracked UK delivery on ALL orders.

    1 in stock

    £85.49

  • Cybersecurity for Hospitals and Healthcare

    APress Cybersecurity for Hospitals and Healthcare

    1 in stock

    Book SynopsisLearn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machinethey will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hosTable of ContentsChapter 1: Hacker Reconnaissance of a Hospital Network .- Chapter 2: How Hackers Gain Access to a Hospital Network .- Chapter 3: Active Medical Device Cyber-Attacks.- Chapter 4: Medical Facility Cyber-Physical Attacks.- Chapter 5: Hospital Insider Threat.- Chapter 6: Detection of Cyber-Attacks.- Chapter 7: Preventing Cyber-Attacks.- Chapter 8: Cyber-Attack Response and Recovery Planning.- Chapter 9: Appendix. Cyber-Attack Response Procedures Template.-

    1 in stock

    £48.74

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account