Marc Weber Tobias - Böcker
Visar alla böcker från författaren Marc Weber Tobias. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
Tobias on Locks and Insecurity Engineering
Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
Inbunden, Engelska, 2024
810 kr
Skickas inom 7-10 vardagar
A must-read exploration of lock and physical security from a renowned author and expert In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful exploration of how locks are designed, built, and — ultimately — defeated by criminals, spies, hackers, and even lockpickers. In the book, you'll discover the myriad ways that security experts and bad actors have compromised physical locks using everything from the newest 3D printers to 99-cent ballpoint pens. The book explores the origins of different lock designs and the mistakes that design engineers make when they create new locks. It explains the countless ways that locks remain at risk for attack. The author explains the latest lock designs and technology, as well as how to assess whether a specific solution will work for you depending on your individual security requirements and use case. You'll also find: Ways to differentiate between fatally flawed locks and solid, secure optionsSeveral relevant and real-world case examples of catastrophic lock design failures that led to monetary loss, property damage, or bodily harmExaminations of lock security from the perspectives of forced entry, covert entry, and key-controlAn instructive and indispensable roadmap to locks and physical security, Tobias on Locks and Insecurity Engineering is the perfect guide for security and information technology professionals, design engineers, risk managers, law enforcement personnel, intelligence agents, regulators, policymakers, investigators, lawyers, and more.
1 311 kr
Skickas inom 7-10 vardagar
A value-packed two-book set that combines the best of engineering dependable and secure software systems with the best in-depth look at physical lock security and insecurityIn Security Engineering: A Guide to Building Dependable Distributed Systems, Cambridge University professor Ross Anderson updates his classic textbook and teaches readers how to design, implement, and test systems to withstand both error and attack. Now the latest edition brings it up to date for 2020. As people now go online from phones more than laptops, most servers are in the cloud, online advertising drives the Internet and social networks have taken over much human interaction, many patterns of crime and abuse are the same, but the methods have evolved. Ross Anderson explores what security engineering means in 2020, including: How the basic elements of cryptography, protocols, and access control translate to the new world of phones, cloud services, social media and the Internet of ThingsWho the attackers are – from nation states and business competitors through criminal gangs to stalkers and playground bulliesSecurity psychology, from privacy through ease-of-use to deception The economics of security and dependability – why companies build vulnerable systems and governments look the other wayHow to manage security and safety engineering in a world of agile development – from reliability engineering to DevSecOpsSecurity Engineering ends with a grand challenge: sustainable security. As we build ever more software and connectivity into safety-critical durable goods like cars and medical devices, how do we design systems we can maintain and defend for decades? Or will everything in the world need monthly software upgrades, and become unsafe once they stop?In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful exploration of how locks are designed, built, and — ultimately — defeated by criminals, spies, hackers, and even lockpickers. In the book, you'll discover the myriad ways that security experts and bad actors have compromised physical locks using everything from the newest 3D printers to 99-cent ballpoint pens.The book explores the origins of different lock designs and the mistakes that design engineers make when they create new locks. It explains the countless ways that locks remain at risk for attack.The author explains the latest lock designs and technology, as well as how to assess whether a specific solution will work for you depending on your individual security requirements and use case. You'll also find ways to differentiate between fatally flawed locks and solid, secure options as well as examinations of lock security from the perspectives of forced entry, covert entry, and key-control.Together these two books are the perfect guides for security and information technology professionals, design engineers, risk managers, law enforcement personnel, intelligence agents, regulators, policymakers, investigators, lawyers, and more.
Techno Security's Guide to Securing SCADA
A Comprehensive Handbook On Protecting The Critical Infrastructure
Häftad, Engelska, 2008
635 kr
Skickas inom 7-10 vardagar
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field