-
Systems Engineering Demystified
Get to grips with systems engineering life cycles, processes, and best practices and discover techniques to successfully develop complex systemsKey FeaturesDiscover how to manage increased complexity and understand systems better via effective communicationAdopt a proven model-based approach for sys.... -
Agile Model-Based Systems Engineering Cookbook
Discover recipes for addressing the growing complexity of modern systems by applying agile methodologies and techniques in model-based systems engineering (MBSE)Key FeaturesLearn how Agile and MBSE can work iteratively and collaborate to overcome system complexityDevelop essential systems engineerin.... -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Computers For Seniors For Dummies, 6th Edition
Author Faithe Wempen
A simple guide to computers that'll show you what all the fuss is aboutMost people new to computers find them a little intimidating at first. But with the right guidance, even a total novice can be sending email and banking online in no time at all. Computers For Seniors For Dummies is your must-ha....
Release Date 2021/12 -
Author Ryan Leirvik
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are availabl....
Release Date 2022/01 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
Incident Response Techniques for Ransomware Attacks
Author Oleg Skulkin
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactic....
Release Date 2022/04 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
Author David Routin , Simon Thoores , Samuel Rossier
Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniquesKey FeaturesApply real-world strategies to strengthen the capabilities of your organization's security systemLearn t....
Release Date 2022/06 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
Microsoft Sentinel: Planning and implementing Microsoft's cloud-native SIEM solution, 2nd Edition
Author Nicholas DiCola , Yuri Diogenes , Tiander Turpijn
Build next-generation security operations with Microsoft SentinelMicrosoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you....
Release Date 2022/08 -
Modeling and Control of Modern Electrical Energy Systems
Author Masoud Karimi-Ghartemani
Modeling and Control of Modern Electrical Energy SystemsA step-by-step approach to the modeling, analysis, and control of modern electronically controlled energy systemsIn Modeling and Control of Modern Electrical Energy Systems, distinguished researcher Dr. Masoud Karimi-Ghartemani delivers a compr....
Release Date 2022/08 -
Cybersecurity - Attack and Defense Strategies
Author Yuri Diogenes , Dr. Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest too....
Release Date 2022/09 -
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
Author David Sutton
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Release Date 2022/12 -
Digital Forensics and Incident Response - Third Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensics tools ....
Release Date 2022/12 -
How to Measure Anything in Cybersecurity Risk, 2nd Edition
Author Douglas W. Hubbard , Richard Seiersen
A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the qu....
Release Date 2023/04