Blog Posts Tagged with "book"

3e35900ae6facc6c146a85c435c71d82

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

April 09, 2013 Added by:Ben Rothke

In Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure, authors Eric Knapp and Raj Samani provide and excellent overview on what the smart grid is and how it can be secured.

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Managing Risk and Information Security: Protect to Enable

April 01, 2013 Added by:Ben Rothke

In Managing Risk and Information Security: Protect to Enable, author Malcolm Harkins deals with the inherent tension of information security – that between limitations and enablement.

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Burdens of Proof: Cryptographic Culture & Evidence Law in the Age of Electronic Documents

February 19, 2013 Added by:Ben Rothke

When the IBM PC first came out 31 years ago, it supported a maximum of 256KB RAM. You can buy an equivalent computer today with substantially more CPU power at a fraction of the price. But in those 31 years, the information security functionality in which the PC operates has not progressed accordingly.

Comments  (0)