Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical Infrastructure
Author: Sajal K Das
Publisher: Elsevier
Total Pages: 849
Release: 2012-01-25
Genre: Computers
ISBN: 0124159109

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. - Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios - Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on - Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Computer Viruses: from theory to applications

Computer Viruses: from theory to applications
Author: Eric Filiol
Publisher: Springer Science & Business Media
Total Pages: 412
Release: 2006-03-30
Genre: Computers
ISBN: 2287280995

A precise and exhaustive description of different types of malware from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas.

Worm

Worm
Author: Mark Bowden
Publisher: Grove/Atlantic, Inc.
Total Pages: 215
Release: 2011-09-27
Genre: True Crime
ISBN: 0802195121

From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world. The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became infected almost instantaneously. No one had ever seen anything like it. By January 2009, the worm lay hidden in at least eight million computers, and the botnet of linked computers it had created was big enough that an attack might crash the world. In this “masterpiece” (The Philadelphia Inquirer), Mark Bowden expertly lays out a spellbinding tale of how hackers, researchers, millionaire Internet entrepreneurs, and computer security experts found themselves drawn into a battle between those determined to exploit the Internet and those committed to protecting it.

A Short Course on Computer Viruses

A Short Course on Computer Viruses
Author: Frederick B. Cohen
Publisher:
Total Pages: 282
Release: 1994-04-04
Genre: Computers
ISBN:

Here is an outstanding opportunity to learn about computer viruses from the internationally acclaimed pioneer in the field who actually coined the phrase "computer virus." This new edition of Cohen's classic work has been updated and expanded to nearly double its original size and now includes entirely new chapters on LAN viruses, international viruses, and good viruses (including code). As entertaining as it is thorough, the text is enlivened by Cohen's down-to-earth wit and his many fascinating anecdotes and heretofore unpublished historical facts about viruses. Both broad in its coverage and deep in its consideration, it includes dozens of lucid explanations and examples that amicably guide the reader through the complex, often convoluted subject matter. Hailed as a tour de force, Cohen's discussion of defensive strategies reveals many of the stumbling blocks that often trip readers up.

Malicious Mobile Code

Malicious Mobile Code
Author: Roger Grimes
Publisher: "O'Reilly Media, Inc."
Total Pages: 548
Release: 2001-06
Genre: Computers
ISBN: 9781565926820

Viruses today are more prevalent than ever and the need to protect the network or company against attacks is imperative. Grimes gives strategies, tips and tricks needed to secure any system. He explains what viruses can and can't do, and how to recognize, remove and prevent them.