Submarine commander Aiexi Novskoyy has been sprung from prison by a multibillion-dollar organization with a very special mission in mind. The company has designed a new submarine—the Vepr—which they will use to wreak havoc on international trade. To test its new weapon, Alexi must sink a cruise ship carrying the entire brass of the U.S Navy—effectively decapitating the American fleet. The legendary USS Devilfish is called in to stop the catastrophe, only to be ambushed by the ultra-advanced Vepr. With the Devilfish down, the Navy sends Captain “Kelly” McKee and the newest sub in the U.S. arsenal to hunt down and destroy the super sub. What they don’t realize is that Alexi has his own plans, which have him heading straight for the shores of America.
For Jack Ryan, Jr., and his comrades at the covert organization known as The Campus, the fight against America’s enemies is never over. But the danger has just hit home in a way they never expected… The Campus has been discovered. And whoever knows they exist knows they can be destroyed. Meanwhile, President Jack Ryan has been swept back into the Oval Office—and his wisdom and courage are needed more desperately than ever. Internal political and economic strife has pushed the leadership of China to the edge of disaster. And those who wish to consolidate their power are using the opportunity to strike at long-desired Taiwan, as well as the Americans who have protected the tiny nation. Now, as two of the world’s superpowers move ever closer to a final confrontation, President Ryan must use the only wild card he has left—The Campus. But with their existence about to be revealed, they might not even have a chance to enter the battle before the world is consumed by war.
CompTIA® Security+ Exam Cram, Fourth Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 200 questions in two full practice exams. The CD-ROM contains the powerful Pearson IT Certification Practice Test engine that provides real-time practice and feedback with all the questions so you can simulate the exam. Covers the critical information you need to know to score higher on your Security+ exam! --Categorize types of attacks, threats, and risks to your systems --Secure devices, communications, and network infrastructure -- Troubleshoot issues related to networking components -- Effectively manage risks associated with a global business environment -- Differentiate between control methods used to secure the physical domain -- Identify solutions to secure hosts, data, and applications -- Compare techniques to mitigate risks in static environments -- Determine relevant access control, authorization, and authentication procedures -- Select appropriate mitigation techniques in response to attacks and vulnerabilities -- Apply principles of cryptography and effectively deploy related solutions --Implement security practices from both a technical and an organizational standpoint
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. How and why organizations are being attacked How to develop a "Risk based Approach to Security" Tools for protecting data and preventing attacks Critical information on how to respond and recover from an intrusion The emerging threat to Cloud based networks
Technology & Engineering by Management Association, Information Resources
Author: Management Association, Information Resources
Publisher: IGI Global
Category: Business & Economics
Digital technology has revitalized the landscape of the global economy. As digital currency, such as bitcoin and IOTA, continues to become more prominent in society, conducting further research in this area is vital to promoting economic advancements. Digital Currency: Breakthroughs in Research and Practice is a critical source of academic knowledge on the use of computers, smartphones, and the internet to purchase goods and services using virtual currency. The security and privacy aspects of using digital currency are also explored. Highlighting a range of pertinent topics such as electronic commerce, online transaction payment, and web-based electronic money, this book is an ideal reference source for business executives, financial analysts, business professionals, economists, IT professionals, and researchers interested in emerging trends in digital currency and finance.
Critical Infrastructure (CI) is fundamental to the functioning of a modern economy, and consequently, maintaining CI security is paramount. However, despite all the security technology available for threats and risks to CI, this crucial area often generates more fear than rational discussion. Apprehension unfortunately prompts many involved in CI policy to default to old-fashioned intuition rather than depend on modern concrete risk assessment as the basis for vital security decisions. Going beyond definitions, Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies looks at the iron triangle within CI: power, telecom, and finance. It introduces the concept of CI as an industrial and enterprise risk conductor, highlighting the reality that a CI failure can propagate a crisis with far-reaching repercussions. Focuses on Canada and the US Equally for a Useful Cross-Border Security Analysis With $2.5 trillion at stake in United States’ CI alone, supreme standards and metrics are mandatory for solid protection of such a sophisticated and complex area. This powerful volume is dedicated to moving CI security into the 21st century, illustrating the danger in basing critical CI policy decisions on the existing legacy frames of reference. It represents one of the first complete departures from policy, planning, and response strategies based on intuition and anecdotal evidence.