Physical and Logical Security Convergence Powered By Enterprise Security Management

Physical and Logical Security Convergence  Powered By Enterprise Security Management
Author: William P Crowell,Brian T Contos,Colby DeRodeff,Dan Dunkel
Publsiher: Syngress
Total Pages: 592
Release: 2011-04-18
ISBN 10: 9780080558783
ISBN 13: 008055878X
Language: EN, FR, DE, ES & NL

Physical and Logical Security Convergence Powered By Enterprise Security Management Book Review:

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today’s changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide

Security Technology Convergence Insights

Security Technology Convergence Insights
Author: Ray Bernard
Publsiher: Elsevier
Total Pages: 160
Release: 2015-04-02
ISBN 10: 0128030011
ISBN 13: 9780128030011
Language: EN, FR, DE, ES & NL

Security Technology Convergence Insights Book Review:

Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems. As the pace of information technology (IT) advances continued to accelerate, the physical security industry continued to lag behind IT advances by at least two to three years. Security Technology Convergence Insights explores this sometimes problematic convergence of physical security technology and information technology and its impact on security departments, IT departments, vendors, and management. Includes material culled directly from author's column in Security Technology Executive Easy-to-read question and answer format Includes real-world examples to enhance key lessons learned

Security Convergence

Security Convergence
Author: Dave Tyson
Publsiher: Elsevier
Total Pages: 232
Release: 2011-04-08
ISBN 10: 9780080546261
ISBN 13: 0080546269
Language: EN, FR, DE, ES & NL

Security Convergence Book Review:

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets. * A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend * Contains case examples that detail how convergence can be implemented to save money and improve efficiencies

Cyber Crime Investigations

Cyber Crime Investigations
Author: Anthony Reyes,Richard Brittson,Kevin O'Shea,James Steele
Publsiher: Elsevier
Total Pages: 432
Release: 2011-04-18
ISBN 10: 9780080553634
ISBN 13: 008055363X
Language: EN, FR, DE, ES & NL

Cyber Crime Investigations Book Review:

Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The book begins with the chapter “What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner. This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution. This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases Discusses the complex relationship between the public and private sector with regards to cyber crime Provides essential information for IT security professionals and first responders on maintaining chain of evidence

Security Strategy

Security Strategy
Author: Bill Stackpole,Eric Oksendahl
Publsiher: CRC Press
Total Pages: 346
Release: 2010-10-13
ISBN 10: 9781439827345
ISBN 13: 1439827346
Language: EN, FR, DE, ES & NL

Security Strategy Book Review:

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and place of strategy in an information security program and arms security managers and practitioners with a set of security tactics to support the implementation of strategic planning initiatives, goals, and objectives. The book focuses on security strategy planning and execution to provide a clear and comprehensive look at the structures and tools needed to build a security program that enables and enhances business processes. Divided into two parts, the first part considers business strategy and the second part details specific tactics. The information in both sections will help security practitioners and mangers develop a viable synergy that will allow security to take its place as a valued partner and contributor to the success and profitability of the enterprise. Confusing strategies and tactics all too often keep organizations from properly implementing an effective information protection strategy. This versatile reference presents information in a way that makes it accessible and applicable to organizations of all sizes. Complete with checklists of the physical security requirements that organizations should consider when evaluating or designing facilities, it provides the tools and understanding to enable your company to achieve the operational efficiencies, cost reductions, and brand enhancements that are possible when an effective security strategy is put into action.

Physical Security Systems Handbook

Physical Security Systems Handbook
Author: Michael Khairallah
Publsiher: Butterworth-Heinemann
Total Pages: 296
Release: 2006
ISBN 10: 075067850X
ISBN 13: 9780750678506
Language: EN, FR, DE, ES & NL

Physical Security Systems Handbook Book Review:

SHORT BLURB/BRIEF DESCRIPTION: The Security System Design and Implementation Guide is a practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. This guide presents an easy-to-follow outline developing the technical requirements for security systems, establishing the procurement process for those systems, and managing the implementation of the acquired systems. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent How To for the aspiring security professional that wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant. UNIQUE FEATURE: Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system. Builds upon well-known, widely adopted concepts prevalent among security professionals. Offers seasoned advice on the competitive bidding process as well as on legal issues involved in the selection of applied products. BENEFIT TO THE READER: The author presents information previously available only from a costly Physical Security Consultant Dozens of sample forms, checklists, surveys, and tables make for quick reference

InfoSecurity 2008 Threat Analysis

InfoSecurity 2008 Threat Analysis
Author: Craig Schiller,Seth Fogie,Colby DeRodeff,Michael Gregg
Publsiher: Elsevier
Total Pages: 480
Release: 2011-04-18
ISBN 10: 9780080558691
ISBN 13: 0080558690
Language: EN, FR, DE, ES & NL

InfoSecurity 2008 Threat Analysis Book Review:

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Intelligent Distributed Computing IX

Intelligent Distributed Computing IX
Author: Paulo Novais,David Camacho,Cesar Analide,Amal El Fallah Seghrouchni,Costin Badica
Publsiher: Springer
Total Pages: 521
Release: 2015-10-26
ISBN 10: 3319250175
ISBN 13: 9783319250175
Language: EN, FR, DE, ES & NL

Intelligent Distributed Computing IX Book Review:

This book represents the combined peer-reviewed proceedings of the ninth International Symposium on Intelligent Distributed Computing – IDC’2015, of the Workshop on Cyber Security and Resilience of Large-Scale Systems – WSRL’2015, and of the International Workshop on Future Internet and Smart Networks – FI&SN’2015. All the events were held in Guimarães, Portugal during October 7th-9th, 2015. The 46 contributions published in this book address many topics related to theory and applications of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

Security

Security
Author: Anonim
Publsiher: Anonim
Total Pages: 329
Release: 2008
ISBN 10:
ISBN 13: CORNELL:31924088345594
Language: EN, FR, DE, ES & NL

Security Book Review:

Cybersecurity for Industrial Control Systems

Cybersecurity for Industrial Control Systems
Author: Tyson Macaulay,Bryan L. Singer
Publsiher: CRC Press
Total Pages: 203
Release: 2012-02-02
ISBN 10: 1466516119
ISBN 13: 9781466516113
Language: EN, FR, DE, ES & NL

Cybersecurity for Industrial Control Systems Book Review:

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS. Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required. The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors.

Resilience of Cyber Physical Systems

Resilience of Cyber Physical Systems
Author: Francesco Flammini
Publsiher: Springer
Total Pages: 229
Release: 2019-01-25
ISBN 10: 3319955977
ISBN 13: 9783319955971
Language: EN, FR, DE, ES & NL

Resilience of Cyber Physical Systems Book Review:

This book addresses the latest approaches to holistic Cyber-Physical System (CPS) resilience in real-world industrial applications. Ensuring the resilience of CPSs requires cross-discipline analysis and involves many challenges and open issues, including how to address evolving cyber-security threats. The book describes emerging paradigms and techniques from two main viewpoints: CPSs’ exposure to new threats, and CPSs’ potential to counteract them. Further, the chapters address topics ranging from risk modeling to threat management and mitigation. The book offers a clearly structured, highly accessible resource for a diverse readership, including graduate students, researchers and industry practitioners who are interested in evaluating and ensuring the resilience of CPSs in both the development and assessment stages. Foreword by Prof. Shiyan Hu, Chair of Cyber-Physical Systems at Linnaeus University, Sweden.

Glossary of Key Information Security Terms

Glossary of Key Information Security Terms
Author: Richard Kissel
Publsiher: DIANE Publishing
Total Pages: 207
Release: 2011-05
ISBN 10: 1437980090
ISBN 13: 9781437980097
Language: EN, FR, DE, ES & NL

Glossary of Key Information Security Terms Book Review:

This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.

Internet of Things

Internet of Things
Author: Peter Friess
Publsiher: River Publishers
Total Pages: 364
Release: 2013-06
ISBN 10: 8792982735
ISBN 13: 9788792982735
Language: EN, FR, DE, ES & NL

Internet of Things Book Review:

The book aims to provide a broad overview of various topics of the Internet of Things (IoT) from the research and development priorities to enabling technologies, architecture, security, privacy, interoperability and industrial applications. It is intended to be a stand-alone book in a series that covers the Internet of Things activities of the IERC - Internet of Things European Research Cluster - from technology to international cooperation and the global "state of play." The book builds on the ideas put forward by the European Research Cluster on the Internet of Things Strategic Research and Innovation Agenda and presents views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Today we see the integration of Industrial, Business and Consumer Internet which is bringing together the Internet of People, Internet of Things, Internet of Energy, Internet of Vehicles, Internet of Media, Services and Enterprises in forming the backbone of the digital economy, the digital society and the foundation for the future knowledge and innovation based economy. These developments are supporting solutions for the emerging challenges of public health, aging population, environmental protection and climate change, the conservation of energy and scarce materials, enhancements to safety and security and the continuation and growth of economic prosperity. Penetration of smartphones and advances in nanoelectronics, cyber-physical systems, wireless communication, software, and Cloud computing technology will be the main drivers for IoT development. The IoT contribution is seen in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the Cloud using the increased storage and computing power while attempting to standardize communication and metadata. In this context, the next generation of Cloud computing technologies will need to be flexible enough to scale autonomously, adaptive enough to handle constantly changing connections and resilient enough to stand up to the huge flows of data that will occur. In 2025, analysts forecast that there will be six devices per human on the planet, which means around 50 billion more connected devices over the next 12 years. The Internet of Things market is connected to this anticipated device growth from industrial Machine to Machine (M2M) systems, smart meters and wireless sensors. Internet of Things technology will generate new services and new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, Smart Transport, Buildings, Energy, Grid, to Smart Health and Life.

Ten Strategies of a World Class Cybersecurity Operations Center

Ten Strategies of a World Class Cybersecurity Operations Center
Author: Carson Zimmerman
Publsiher: Anonim
Total Pages: 329
Release: 2014-07-01
ISBN 10: 9780692243107
ISBN 13: 0692243100
Language: EN, FR, DE, ES & NL

Ten Strategies of a World Class Cybersecurity Operations Center Book Review:

Ten Strategies of a World-Class Cyber Security Operations Center conveys MITRE's accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments. This book offers perspective and context for key decision points in structuring a CSOC, such as what capabilities to offer, how to architect large-scale data collection and analysis, and how to prepare the CSOC team for agile, threat-based response. If you manage, work in, or are standing up a CSOC, this book is for you. It is also available on MITRE's website, www.mitre.org.

Top Down Network Design

Top Down Network Design
Author: Priscilla Oppenheimer
Publsiher: Pearson Education
Total Pages: 600
Release: 2010-08-24
ISBN 10: 9781587140013
ISBN 13: 1587140012
Language: EN, FR, DE, ES & NL

Top Down Network Design Book Review:

Objectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. Audience This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third Edition Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics: ¿ Network redundancy ¿ Modularity in network designs ¿ The Cisco SAFE security reference architecture ¿ The Rapid Spanning Tree Protocol (RSTP) ¿ Internet Protocol version 6 (IPv6) ¿ Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet ¿ Network design and management tools

Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security
Author: Axel Buecker,Saritha Arunkumar,Brian Blackshaw,Martin Borrett,Peter Brittenham,Jan Flegr,Jaco Jacobs,Vladimir Jeremic,Mark Johnston,Christian Mark,Gretchen Marx,Stefaan Van Daele,Serge Vereecke,IBM Redbooks
Publsiher: IBM Redbooks
Total Pages: 240
Release: 2014-02-06
ISBN 10: 0738437891
ISBN 13: 9780738437897
Language: EN, FR, DE, ES & NL

Using the IBM Security Framework and IBM Security Blueprint to Realize Business Driven Security Book Review:

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.

Practical VoIP Security

Practical VoIP Security
Author: Thomas Porter, CISSP, CCNP, CCDA, CCS
Publsiher: Elsevier
Total Pages: 500
Release: 2006-03-31
ISBN 10: 9780080489551
ISBN 13: 0080489559
Language: EN, FR, DE, ES & NL

Practical VoIP Security Book Review:

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive · More VoIP phone lines are being installed every day than traditional PBX phone lines · VoIP is vulnerable to the same range of attacks of any network device · VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities

Enemy at the Water Cooler

Enemy at the Water Cooler
Author: Brian T Contos
Publsiher: Elsevier
Total Pages: 304
Release: 2006-10-30
ISBN 10: 9780080477602
ISBN 13: 0080477607
Language: EN, FR, DE, ES & NL

Enemy at the Water Cooler Book Review:

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today’s headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization’s building or networks that possesses some level of trust. * Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security. * Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.—ArcSight.

The Power of Deterrence

The Power of Deterrence
Author: Amir Lupovici
Publsiher: Cambridge University Press
Total Pages: 244
Release: 2016-08-31
ISBN 10: 110714339X
ISBN 13: 9781107143395
Language: EN, FR, DE, ES & NL

The Power of Deterrence Book Review:

Argues that states' attachment to the strategy of deterrence can increases the chances of violence rather than avoid it.

Great Divergence and Great Convergence

Great Divergence and Great Convergence
Author: Leonid Grinin,Andrey Korotayev
Publsiher: Springer
Total Pages: 251
Release: 2015-05-09
ISBN 10: 331917780X
ISBN 13: 9783319177809
Language: EN, FR, DE, ES & NL

Great Divergence and Great Convergence Book Review:

This new monograph provides a stimulating new take on hotly contested topics in world modernization and the globalizing economy. It begins by situating what is called the Great Divergence--the social/technological revolution that led European nations to outpace the early dominance of Asia--in historical context over centuries. This is contrasted with an equally powerful Great Convergence, the recent economic and technological expansion taking place in Third World nations and characterized by narrowing inequity among nations. They are seen here as two phases of an inevitable global process, centuries in the making, with the potential for both positive and negative results. This sophisticated presentation examines: Why the developing world is growing more rapidly than the developed world. How this development began occurring under the Western world's radar. How former colonies of major powers grew to drive the world's economy. Why so many Western economists have been slow to recognize the Great Convergence. The increasing risk of geopolitical instability. Why the world is likely to find itself without an absolute leader after the end of the American hegemony A work of rare scope, Great Divergence and Great Convergence gives sociologists, global economists, demographers, and global historians a deeper understanding of the broader movement of social and economic history, combined with a long view of history as it is currently being made; it also offers some thrilling forecasts for global development in the forthcoming decades.