No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Kindle Price: CDN$ 4.80
includes free international wireless delivery via Amazon Whispernet
kindle unlimited logo
Unlimited reading. Over 1 million titles. Learn more
Read for Free

These promotions will be applied to this item:

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Kindle App Ad

Cyber Security: Best of TIM Review Kindle Edition

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition, May 7 2015
CDN$ 4.80

Length: 323 pages Enhanced Typesetting: Enabled Page Flip: Enabled

Product description

Product Description

"The rapid evolution and adoption of disruptive technology is challenging traditional security models and creating a new paradigm of more sophisticated, multi-stage threats ranging from denial-of-service attacks to attacks on the control plane. The familiar paradigms of classic firewalls and 'build it, and then secure it' do not work for the connected future." (Eros Spadotto, Executive Vice President of Technology Strategy, TELUS)

This book examines today’s and tomorrow’s cybersecurity challenge and approaches to solutions. Many putative solutions to cybersecurity have been purely technical in nature and, at times, have been cast as "silver bullets" or all-encompassing solutions. Virus checkers, firewalls, monitoring systems, and so on, all play roles in mitigating cyber-attack risks, but, unfortunately, the bottom line is that cyber-attacks continue to be successful and losses are mounting. Many cyber-attacks start with social engineering techniques (e.g., phishing), thereby introducing psychological and sociological considerations for handling cyber-attacks. It has become quite apparent to that we can only truly solve the cybersecurity problem by drawing researchers and practitioners from across disciplines; in isolation, disciplines miss important insights into cybersecurity challenges.

Moreover, it is also apparent that there is insufficient science underlying our approaches to cybersecurity. For example, we do not have good metrics for measuring the security postures of systems and, hence, are unable to provide rigorous measures to inform security investment decisions. The absence of a science has been recognized, especially in the United States, where there are concerted efforts in developing a science of security. However, the formulation of such a science will take decades to fulfill, and progress will be sporadic.

Finally, we conclude that the multi-faceted challenges of cybersecurity necessitate collaborative approaches to seeking solutions – no one organization has the capacity to solve the challenges alone. In our view, this need argues for ecosystem-based approaches to cybersecurity, through which organizations work in concert to address the substantial number of challenges. For this book, we have chosen 15 articles from the Technology Management Review that we feel provide particularly relevant insights into cybersecurity and, in general, contribute to a theory or science of cybersecurity.

Contents of the book:

Part I: Understanding

1. Defining Cybersecurity
2. Cyber-Attack Attributes
3. Crimeware Marketplaces and Their Facilitating Technologies
4. Cybersecurity Skills Training: An Attacker-Centric Gamified Approach
5. Botnet Takedown Initiatives: A Taxonomy and Performance Model
6. Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities

Part II: Technical Approaches

7. Peer-to-Peer Enclaves for Improving Network Defence
8. Security Challenges in Smart-Grid Metering and Control Systems
9. Quantitative Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity
10. On the Road to Holistic Decision Making in Adaptive Security
11. Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure

Part III: Future

12. Developing an Innovation Engine to Make Canada a Global Leader in Cybersecurity
13. Cybersecurity Futures: How Can We Regulate Emergent Risks?
14. A Research Agenda for Security Engineering
15. The Online World of the Future: Safe, Productive, and Creative

Product details

  • Format: Kindle Edition
  • File Size: 5694 KB
  • Print Length: 323 pages
  • Simultaneous Device Usage: Unlimited
  • Publisher: Talent First Network (May 7 2015)
  • Sold by: Amazon Digital Services LLC
  • Language: English
  • ASIN: B00XD3O6L0
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Screen Reader: Supported
  • Enhanced Typesetting: Enabled
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #338,266 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  • Would you like to tell us about a lower price?

click to open popover

Customer reviews

There are no customer reviews yet.
Share your thoughts with other customers

Where's My Stuff?

Delivery & Returns

Need Help?