This book gathers the latest research with case studies in secure computing from many researchers. It compiles the recent work and findings through case studies, where the growing security attacks and countermeasures in the mobile and networking world has been explained, along with other pertinent s..
A companion volume to the highly touted CISO Handbook, this book presents tools to empower organizations to identify the intangible negative influences on security that plague most organizations, and provides further techniques for security professionals to identify, minimize, and overcome these pit..
This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili..
This book discusses national cyber threat intelligence and security information sharing. It details ongoing work in research laboratories world-wide to address current national security concerns. It allows practitioners to learn about upcoming trends, researchers to share current results, and decisi..
Structured along the same lines as the certification class, this volume describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. It examines five functional areas: security governance, risk manag..
This book defines more than 900 metrics measuring compliance with current legislation, resiliency of security controls, and return on investment. It explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The metric..
Penetration testing remains one of the best ways to test the security of private, government, military and corporate computer networks. This book provides step-by-step instruction on how to use tools, available mostly for free, to perform effective penetration tests of today’s computer networks. Cov..
Conflict and Cooperation in Cyberspace brings together some of the world’s most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses. Focusing on policy-relevant solutions, it offers a well-reasoned study o..
With an emphasis on protecting an infrastructure's ability to perform its mission or function, this volume presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National..
New generation industrial control systems are better able to connect cyber space and the physical process in close-loop than ever before. However, such connections also provide rich opportunities for adversaries to perform potential malicious attacks. Cyber Security for Industrial Control Systems: F..
This book supplies comprehensive coverage of the principles and design of CPSs. It addresses the many challenges that must be overcome and outlines a roadmap of how to get there. Covering the most important design theories and modeling methods for a practical CPS, text presents concrete CPS designs ..
This book discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and chara..