Techno Security's Guide to Securing SCADA by Jack Wiles
Look inside with Google Book Preview
Techno Security's Guide to Securing SCADA
By Jack Wiles

Techno Security's Guide to Securing SCADA

A Comprehensive Handbook on Protecting the Critical Infrastructure

By (author) See other recent books by Jack Wiles See other recent books by Ted Claypoole See other recent books by Phil Drake
Format: Paperback

Normal Price: $90.95
Your Price: $81.86 AUD, inc. GST
Shipping: $7.95 per order
You Save: $9.09! (10% off normal price)
Plus...earn $4.09 in Boomerang Bucks
Availability: Available Available to Backorder, No Due Date for Supply

Techno Security's Guide to Securing SCADA by Jack Wiles

Book Description

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure - everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, side jacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectively have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure. Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures. Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more. Companion Website featuring video interviews with subject matter experts offer a 'sit-down' with the leaders in the field.

Buy Techno Security's Guide to Securing SCADA book by Jack Wiles from Australia's Online Bookstore, Boomerang Books.

Book Details

ISBN: 9781597492829
ISBN-10: 1597492825
Format: Paperback
(235mm x 191mm x 23mm)
Pages: 352
Imprint: Syngress Media,U.S.
Publisher: Syngress Media,U.S.
Publish Date: 23-Aug-2008
Country of Publication: United States

Books By Author Jack Wiles

Low Tech Hacking by Jack Wiles Low Tech Hacking, Paperback (January 2012)

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. This title contains descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware.

Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles Best Damn Cybercrime and Digital Forensics Book Period, Paperback (December 2007)

Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.

TechnoSecurity's Guide to E-discovery and Digital Forensics by Jack Wiles TechnoSecurity's Guide to E-discovery and Digital Forensics, Paperback (November 2007)

Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators by Jack Wiles Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators, Paperback (May 2007)

Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying some of the risks, threats, and vulnerabilities, discussing the countermeasures to address them. It shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.

» View all books by Jack Wiles


» Have you read this book? We'd like to know what you think about it - write a review about Techno Security's Guide to Securing SCADA book by Jack Wiles and you'll earn 50c in Boomerang Bucks loyalty dollars (you must be a member - it's free to sign up!)

Write a book review

Author Biography - Jack Wiles

Jack Wiles is a security professional with over 40 years' experience in security-related fields. This includes computer security, disaster recovery, and physical security. He is a professional speaker, and has trained federal agents, corporate attorneys, and internal auditors on a number of computer crime-related topics. He is a pioneer in presenting on a number of subjects, which are now being labeled "Homeland Security" topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., and is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, IRS-CID, U.S. Customs, Department of Justice, The Department of Defense, and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter, which is now one of the largest chapters in the country. He is also a founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force. Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967-68, where he was awarded two Bronze stars for his actions in combat. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career. Ted Claypoole is a Member of the law firm Womble Carlyle Sandridge and Rice, in Charlotte, North Carolina, in the Intellectual Property Transaction group, and a senior member of its Privacy and Data Management Team. Phil Drake is Communications Manager for the Charlotte Observer in Charlotte, N.C. Paul A. Henry, (MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP,-ISSAP, CISM, CISA, CIFI) is the Vice President of Technology Evangelism at Secure Computing . Paul is one of the world's foremost global information security experts, with more than 20 years experience managing security initiatives for Global 2000 enterprises and government organizations worldwide. Lester J. "Chip" Johnson Jr. is employed by the SCANA Corporation, a $ 9 Billion, Fortune 500, energy-based holding company, headquartered in Columbia, South Carolina. Mr. Johnson serves in the Corporate Security and Claims Department as a Manager with responsibility for Investigations and Crisis Management. Sean Lowther is the President and Founder of Stealth Awareness, Inc. ( Sean is an independent consultant who brings years of experience designing and implementing information security awareness programs at the highest level. He founded Stealth Awareness, Inc. in 2007. Sean worked at Bank of America for over seven years, managing the enterprise information security awareness program. The program received the highest rating from its regulators and was consistently rated "world class" by industry peer groups. Sean has worked with BITS, the Financial Services Roundtable Task Force on Privacy, prior to the enactment of the Gramm-Leach-Bliley Act. He produced the video "It's Not If, But When" for the Financial Services Sector Coordinating Council in partnership with the U.S. Treasury Department with the goal to improve critical infrastructure protection and Homeland Security. Greg Miles,(Ph.D., CISSP#24431, CISM#0300338, IAM, IEM)is the President, and Chief Financial Officer of Security Horizon, Inc. Security Horizon is a Global, Veteran-Owned Small Business headquartered in Colorado Springs, Colorado. Marc Weber Tobias is an investigative attorney and security specialist living in Sioux Falls, South Dakota. He has authored six police textbooks, including Locks, Safes, and Security, (ISBN 978-0398070793), which is recognized as the primary reference for law enforcement and security professionals worldwide. James H. Windle is employed as a Police Sergeant in Charlotte, North Carolina, where he serves as a certified bomb technician and is assigned as the Bomb Squad Commander and Arson Supervisor.

Boomerang Bucks close

For every $20 you spend on books, you will receive $1 in Boomerang Bucks loyalty dollars. You can use your Boomerang Bucks as a credit towards a future purchase from Boomerang Books. Note that you must be a Member (free to sign up) and that conditions do apply.

Recent books by Jack Wiles close
Low Tech Hacking by Jack Wiles
Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles
TechnoSecurity's Guide to E-discovery and Digital Forensics by Jack Wiles
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators by Jack Wiles
Recent books by Ted Claypoole close
Privacy in the Age of Big Data by Ted Claypoole
Protecting Your Internet Identity by Ted Claypoole
Techno Security's Guide to Securing SCADA by Ted Claypoole
Recent books by Phil Drake close
Techno Security's Guide to Securing SCADA by Phil Drake
» close