Author: Scott Hogg,Eric Vyncke
Publisher: Pearson Education
IPv6 Security Protection measures for the next Internet Protocol As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world’s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today’s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component of today’s networks, identifying specific security deficiencies that occur within IPv6 environments and demonstrating how to combat them. The authors describe best practices for identifying and resolving weaknesses as you maintain a dual stack network. Then they describe the security mechanisms you need to implement as you migrate to an IPv6-only network. The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. The authors also turn to Cisco® products and protection mechanisms. You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. You also learn about securing hosts with Cisco Security Agent 6.0 and about securing a network with IOS routers and switches. Multiple examples are explained for Windows, Linux, FreeBSD, and Solaris hosts. The authors offer detailed examples that are consistent with today’s best practices and easy to adapt to virtually any IPv6 environment. Scott Hogg, CCIE® No. 5133, is Director of Advanced Technology Services at Global Technology Resources, Inc. (GTRI). He is responsible for setting the company’s technical direction and helping it create service offerings for emerging technologies such as IPv6. He is the Chair of the Rocky Mountain IPv6 Task Force. Eric Vyncke, Cisco Distinguished System Engineer, consults on security issues throughout Europe. He has 20 years’ experience in security and teaches security seminars as a guest professor at universities throughout Belgium. He also participates in the Internet Engineering Task Force (IETF) and has helped several organizations deploy IPv6 securely. Understand why IPv6 is already a latent threat in your IPv4-only network Plan ahead to avoid IPv6 security problems before widespread deployment Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills Understand each high-level approach to securing IPv6 and learn when to use each Protect service provider networks, perimeters, LANs, and host/server connections Harden IPv6 network devices against attack Utilize IPsec in IPv6 environments Secure mobile IPv6 networks Secure transition mechanisms in use during the migration from IPv4 to IPv6 Monitor IPv6 security Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure Protect your network against large-scale threats by using perimeter filtering techniques and service provider—focused security practices Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: IPv6 Security
Reading Literature in a Men's Prison
Author: Mikita Brottman
Category: Literary Criticism
A riveting account of the two years literary scholar Mikita Brottman spent reading literature with criminals in a maximum-security men’s prison outside Baltimore, and what she learned from them—Orange Is the New Black meets Reading Lolita in Tehran. On sabbatical from teaching literature to undergraduates, and wanting to educate a different kind of student, Mikita Brottman starts a book club with a group of convicts from the Jessup Correctional Institution in Maryland. She assigns them ten dark, challenging classics—including Conrad’s Heart of Darkness, Shakespeare’s Macbeth, Stevenson’s Dr. Jekyll and Mr. Hyde, Poe’s story “The Black Cat,” and Nabokov’s Lolita—books that don’t flinch from evoking the isolation of the human struggle, the pain of conflict, and the cost of transgression. Although Brottman is already familiar with these works, the convicts open them up in completely new ways. Their discussions may “only” be about literature, but for the prisoners, everything is at stake. Gradually, the inmates open up about their lives and families, their disastrous choices, their guilt and loss. Brottman also discovers that life in prison, while monotonous, is never without incident. The book club members struggle with their assigned reading through solitary confinement; on lockdown; in between factory shifts; in the hospital; and in the middle of the chaos of blasting televisions, incessant chatter, and the constant banging of metal doors. Though The Maximum Security Book Club never loses sight of the moral issues raised in the selected reading, it refuses to back away from the unexpected insights offered by the company of these complex, difficult men. It is a compelling, thoughtful analysis of literature—and prison life—like nothing you’ve ever read before.
Author: Gina Wohlsdorf
Publisher: Algonquin Books
“Original and imaginative . . . Ripping suspense, sheer terror, and a wrenching love story.” —Sandra Brown, New York Times bestselling author of Friction The terrible truth about Manderley is that someone is always watching. Manderley Resort is a gleaming, new twenty-story hotel on the California coast. It’s about to open its doors, and the world--at least those with the means to afford it--will be welcomed into a palace of opulence and unparalleled security. But someone is determined that Manderley will never open. The staff has no idea that their every move is being watched, and over the next twelve hours they will be killed off, one by one. Writing in the tradition of Edgar Allan Poe and Stephen King, and with a deep bow to Daphne du Maurier, author Gina Wohlsdorf pairs narrative ingenuity and razor-wire prose with quick twists, sharp turns, and gasp-inducing terror. Security is grand guignol storytelling at its very best. A shocking thriller, a brilliant narrative puzzle, and a multifaceted love story unlike any other, Security marks the debut of a fearless and gifted writer. “Be surprised, be very surprised: Gina Wohlsdorf brings more than just plot twists and a terrifically tender love story to this thriller . . . It’s her playful homage to Hitchcock and du Maurier that had me reading, howling, and just plain loving this novel.” —Sara Gruen, author of At the Water’s Edge “Grand Hotel meets Psycho in the age of surveillance . . . Security is cinematically vivid, crisply written, and sharp enough to cut . . . Wohlsdorf brilliantly subverts our expectations of the action genre in this smart, shocking, poignant thriller.” —Emily Croy Barker, author of The Thinking Woman’s Guide to Real Magic “The thrill of this novel goes beyond its wickedly clever, split-screen, high-tech wizardry—a kind of video gamer’s literary retake of Hitchcock’s Rear Window--and emanates from its strange, disembodied narrator . . . The effect is terrifying, sexy, dizzying, and impossible to look away from.” —Tim Johnston, author of Descent “Shocking and filled with Tarantino-ish dark humor. . . Structurally reminiscent of the amazing Jennifer Egan,Wohlsdorf’s book is certainly a hybrid, like nothing else. Get ready.” —Ann Beattie, author of The State We’re In “Flawless . . . Security is perfectly tuned for blockbuster status . . . They don’t make a hotel big enough to house all the people who will want to read this, and soon, as in Manderley, all eyes will be on Wohlsdorf.” —Daniel Kraus, Booklist, starred review
Analysis, Visualization and Dashboards
Author: Jay Jacobs,Bob Rudis
Publisher: John Wiley & Sons
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions. Everything in this book will have practical application for information security professionals. Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.
Enabling Security in a Continuous Delivery Pipeline
Author: Laura Bell,Michael Brunton-Spall,Rich Smith,Jim Bird
Publisher: "O'Reilly Media, Inc."
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You’ll learn how to: Add security practices to each stage of your existing development lifecycle Integrate security with planning, requirements, design, and at the code level Include security testing as part of your team’s effort to deliver working software in each release Implement regulatory compliance in an agile or DevOps environment Build an effective security program through a culture of empathy, openness, transparency, and collaboration
Private Communications in a Public World
Author: Mike Speciner,Radia Perlman,Charlie Kaufman
Publisher: Pearson Education
The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together clear, insightful, and clever explanations of every key facet of information security, from the basics to advanced cryptography and authentication, secure Web and email services, and emerging security standards. Coverage includes: All-new discussions of the Advanced Encryption Standard (AES), IPsec, SSL, and Web security Cryptography: In-depth, exceptionally clear introductions to secret and public keys, hashes, message digests, and other crucial concepts Authentication: Proving identity across networks, common attacks against authentication systems, authenticating people, and avoiding the pitfalls of authentication handshakes Core Internet security standards: Kerberos 4/5, IPsec, SSL, PKIX, and X.509 Email security: Key elements of a secure email system-plus detailed coverage of PEM, S/MIME, and PGP Web security: Security issues associated with URLs, HTTP, HTML, and cookies Security implementations in diverse platforms, including Windows, NetWare, and Lotus Notes The authors go far beyond documenting standards and technology: They contrast competing schemes, explain strengths and weaknesses, and identify the crucial errors most likely to compromise secure systems. Network Security will appeal to a wide range of professionals, from those who design or evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level.
Author: Evelyn Adams
Publisher: Evelyn Adams
Amanda Southerland has a job she loves and a solid relationship with a man who looks great on paper. If it all feels a little hollow, so what? She’s got nothing to complain about. Her life is running like clockwork. That is until she slides down the side of a mountain and crashes into the cocky gym rat who's exactly the kind of guy she avoids. He’s all muscle, no finesse, and if she can’t stop thinking about him, it’s just because he irritates her. Nothing more. Michael Dean’s finally opened the gym of his dreams. He doesn’t have time for a relationship and he’s absolutely not looking for love - not until the beautiful rock climber practically falls into his lap. Meeting Amanda has reordered his priorities, even if she’s stubbornly racing toward a future with the wrong guy. She may not know that he’s her happily ever after, but he’s determined to make her fall again – right into his arms.
A Darwinian Approach to a Dangerous World
Author: Raphael D. Sagarin,Terence Taylor
Publisher: Univ of California Press
Category: Political Science
Written with the aim of breaking down barriers between disparate disciplines in order to create more responsive and effective strategies, Natural Security provides a new lens through which to explore the ancient and ever present problem of how to maintain security in an unpredictable, complex, and dangerous world."--BOOK JACKET.
Author: Robert Muchamore
Publisher: Simon and Schuster
Category: Juvenile Fiction
CHERUB agents are all seventeen and under. They wear skate tees and hemp, and look like regular kids. But they're not. They are trained professionals who are sent out on missions to spy on terrorists and international drug dealers. CHERUB agents hack into computers, bug entire houses, and download crucial documents. It is a highly dangerous job. For their safety, these agents DO NOT EXIST. Two hundred eighty child criminals live in the sunbaked desert prison Arizona Max. One of them is the son of a weapons dealer who has been selling U.S. missiles to terrorists. If CHERUB can get the kid, they can get the parent. Over the years, CHERUB has put plenty of criminals behind bars. Now, for the first time ever, they've got to break one out....
Author: Ronnie D. Lipschutz
Publisher: Columbia University Press
Category: Political Science
In April 1993, as part of the March on Washington for Lesbian, Gay, and Bi Equal Rights and Liberation, hundreds of couples participated in "the Wedding," a symbolic commitment ceremony held in front of the Internal Revenue Service building. Part protest and part affirmation of devotion, the event was a reminder that marriage rights have become a major issue among lesbians and gay men, who cannot marry legally and can only claim domestic partner rights in a few locations in the United States. Yet despite official lack of recognition, same-sex wedding ceremonies have been increasing in frequency over the past decade. Ellen Lewin, who has consecrated her own lesbian relationship with a commitment ceremony, decided to explore the myriad ways in which lesbians and gay men create meaningful ceremonies for themselves. She offers the first comprehensive account of lesbian and gay weddings in modern America. A series of richly detailed profiles -- the result of extensive interviews and participation in the planning and realization of many of these commitment rituals -- is woven together to show how new traditions, and ultimately new families, are emerging within contemporary America. Just as the book is a moving portrait of same-sex couples today, it is also a significant political document on a new arena in the struggle for lesbian and gay rights. In a larger sense, Lewin's work is about the politics surrounding same-sex marriages and the ramifications for central dimensions of American culture such as kinship, community, morality, and love. Lewin explores the ceremonies themselves, which range from traditional church weddings to Wicca rituals in the countryside, with portraits of the planning, the joys, and the anxieties that led up to the weddings. She introduces Bob and Mark, a leather fetishist couple who sanctified their love by legally changing their last names and exchanging vows in tuxedos, leather bow ties, and knee-high police boots. In an equally absorbing profile, Lewin describes Khadija, from a working-class black family deeply suspicious of whites (and especially Jews) and Shulamith, raised in a Zionist household. She tells of how the two women struggled to reconcile their widely disparate upbringings and how they ultimately combined elements of African and Jewish traditions in their wedding. These, among many other stories, make Recognizing Ourselves a vivid tapestry of lesbian and gay life in post-Stonewall United States.
From the Tower of London to Guantanamo Bay
Author: Amanda L. Tyler
Publisher: Oxford University Press
Habeas Corpus in Wartime unearths and presents a comprehensive account of the legal and political history of habeas corpus in wartime in the Anglo-American legal tradition. The book begins by tracing the origins of the habeas privilege in English law, giving special attention to the English Habeas Corpus Act of 1679, which limited the scope of executive detention and used the machinery of the English courts to enforce its terms. It also explores the circumstances that led Parliament to invent the concept of suspension as a tool for setting aside the protections of the Habeas Corpus Act in wartime. Turning to the United States, the book highlights how the English suspension framework greatly influenced the development of early American habeas law before and after the American Revolution and during the Founding period, when the United States Constitution enshrined a habeas privilege in its Suspension Clause. The book then chronicles the story of the habeas privilege and suspension over the course of American history, giving special attention to the Civil War period. The final chapters explore how the challenges posed by modern warfare during the twentieth and twenty-first centuries have placed great strain on the previously well-settled understanding of the role of the habeas privilege and suspension in American constitutional law. Throughout, the book draws upon a wealth of original and heretofore untapped historical resources to shed light on the purpose and role of the Suspension Clause in the United States Constitution, revealing all along that many of the questions that arise today regarding the scope of executive power to arrest and detain in wartime are not new ones.
Protecting Systems with Data and Algorithms
Author: Clarence Chio,David Freeman
Publisher: "O'Reilly Media, Inc."
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine learning to security issues such as intrusion detection, malware classification, and network analysis. Machine learning and security specialists Clarence Chio and David Freeman provide a framework for discussing the marriage of these two fields, as well as a toolkit of machine-learning algorithms that you can apply to an array of security problems. This book is ideal for security engineers and data scientists alike. Learn how machine learning has contributed to the success of modern spam filters Quickly detect anomalies, including breaches, fraud, and impending system failure Conduct malware analysis by extracting useful information from computer binaries Uncover attackers within the network by finding patterns inside datasets Examine how attackers exploit consumer-facing websites and app functionality Translate your machine learning algorithms from the lab to production Understand the threat attackers pose to machine learning solutions
The Nonmilitary Aspects
Author: Joseph J. Romm
Publisher: Council on Foreign Relations
Category: Political Science
Published by the Council on Foreign Relations Press, 58 East 68th St., New York, NY 10021. Annotation copyright by Book News, Inc., Portland, OR
Author: Bruce Schneier
Publisher: John Wiley & Sons
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.
A Guide to Junos for the SRX Services Gateways and Security Certification
Author: Rob Cameron,Brad Woodberg,Patricio Giecco,Timothy Eberhard,James Quinn
Publisher: "O'Reilly Media, Inc."
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX platform. The author's newer book, Juniper SRX Series, covers the SRX devices themselves. Get up to speed on Juniper’s multi-function SRX platforms and SRX Junos software Explore case studies and troubleshooting tips from engineers with extensive SRX experience Become familiar with SRX security policy, Network Address Translation, and IPSec VPN configuration Learn about routing fundamentals and high availability with SRX platforms Discover what sets SRX apart from typical firewalls Understand the operating system that spans the entire Juniper Networks networking hardware portfolio Learn about the more commonly deployed branch series SRX as well as the large Data Center SRX firewalls "I know these authors well. They are out there in the field applying the SRX's industry-leading network security to real world customers everyday. You could not learn from a more talented team of security engineers." --Mark Bauhaus, EVP and General Manager, Juniper Networks
A New Framework for Analysis
Author: Barry Buzan,Ole Wæver,Jaap de Wilde
Publisher: Lynne Rienner Publishers
Category: Political Science
Two schools of thought now exist in security studies: traditionalists want to restrict the subject to politico-military issues; while wideners want to extend it to the economic, societal and environmental sectors. This book sets out a comprehensive statement of the new security studies, establishing the case for the broader agenda.
How to Build and Strengthen a School Safety Program
Author: Paul Timm
Category: Social Science
It seems that every day there’s a new story about a security lapse, emergency lock-down, or violent act taking place at a school somewhere in the United States. Today it’s simply inexcusable not to have adequate security measures in place—regardless of how safe you think your community may be. In School Security, author Paul Timm, a nationally acclaimed school security expert, explains how to make your institution a safer place to learn with easy-to-follow steps. Throughout the book, Timm emphasizes a proactive rather than reactive approach to school security. Readers are introduced to basic loss prevention and safety concepts, including how to communicate safety information to students and staff, how to raise security awareness, and how to prepare for emergencies. The book discusses how to positively influence student behavior, lead staff training programs, and write sound security policies. An entire chapter is dedicated to describing what school security resources are available for follow-up reading and further training. School Security isn’t just a book for security professionals: it helps people without formal security training—namely, educators and school administrators—effectively address school risk. Serves as a comprehensive guide for building an effective security program at little or no cost. Covers fundamental crime prevention concepts, making it suitable for both school security professionals and educators with no formal security training. Addresses the risks commonly facing school administrators today, from access control to social media. Takes a holistic approach to school security rather than focusing on a particular threat or event.
Author: Ernest B. Abbott
Publisher: American Bar Association
This book provides a number of windows into homeland security and emergency management law - covering both the basic structure of the homeland security and emergency management system and presenting detailed analysis of specific areas (such as applying for federal preparedness funds, negotiating intergovernmental agreements, applying for disaster assistance, and managing the impact of catastrophic events).