51Rg1AIDtBL._SY291_BO1,204,203,200_QL40_
PDF
Information Security Across Federal Agencies (American Political, Economic, and Security Issues)

Persistent weaknesses at 24 federal agencies illustrate the challenges they face in effectively applying information security policies and practices. Most agencies continue to have weaknesses in (1) limiting, preventing, and detecting inappropriate access to computer resources; (2) managing the configuration of software and hardware; (3) segregating duties to ensure that a single individual does not have control over all key aspects ...

61X5FbHYVVL._SY291_BO1,204,203,200_QL40_
PDF
The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

I came to this book the long way around. Knowing that I had just published a military thriller in which North Korea crashes the electrical grid for the greater DC area, my brother-in-law sent me a link to David Sanger’s recent interview on NPR. Listening to Mr. Sanger confirmed some of the scariest parts of my own research. I discovered that my fictional scheme for robbing the U.S. government of electrical power is uncomfortably simi...

51X6ei4V1SL._SX218_BO1,204,203,200_QL40_
PDF
Security Metrics: Replacing Fear, Uncertainty, and Doubt

"Security Metrics "is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analy...

0057808d_medium
PDF
The Privatization of Israeli Security

Between 1994-2014, Israel's security service was transformed, becoming one of the most extreme examples of privatised security in the world. This book is an investigation into this period and the conditions that created `Occupation Inc.': the institution of a private military-security-industrial complex. State sponsored violence is increasing as a result of this securitisation, but why is it necessary, and what are its implications? ...

51TZ6pkvzVL._SX218_BO1,204,203,200_QL40_
PDF
Gray Hat Hacking: The Ethical Hacker's Handbook, 5th Edition

Great book, with detail information for us in the Cyber Security space. the training in it as well will help those work on the skills they need to either be Penetration testers or better at Cyber Security related events. Extremely informative on current cybersecurity hacking and design of system/networks. I'm collecting all the Gray Hat Hacking series. Can't wait for number 6 and on to come out. to bad Shon Harris is gone, but the re...

51Z10jQTOGL._SY291_BO1,204,203,200_QL40_
PDF
Information Security: Foundations, Technologies and Applications

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our ...

517oyD+8dWL._SX218_BO1,204,203,200_QL40_
PDF
Network Security Through Data Analysis: From Data to Action, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In th...

41rkOweIrCL._SY291_BO1,204,203,200_QL40_
PDF
Firewalls Don't Stop Dragons:, Third Edition

Personal computer security is receiving increasing attention in the press, and rightly so. This book is an excellent "how to" manual geared toward those of us who are computer literate, but not necessarily "expert". Each section provides both background and a checklist for implementing security measures on Mac, PC, Android and IOS systems, both dedicated and portable to provide protection for all of your computing devices. "Safe prac...

004cbb2e_medium
PDF
Gray Hat Hacking: The Ethical Hacker's Handbook

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hackers's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzze...