-
Author Cesar Bravo , Darren Kitchen
An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurityKey FeaturesGet hold of the best defensive security strategies and toolsDevelop a defensive security strategy at an en....
Release Date 2022/01 -
Cybersecurity Leadership Demystified
Author Dr. Erdal Ozkaya , Melih Abdulhayoglu
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform the....
Release Date 2022/01 -
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
Author Mike Wills
The only SSCP study guide officially approved by (ISC)2The (ISC)2 Systems Security Certified Practitioner (SSCP) certification is a well-known vendor-neutral global IT security certification. The SSCP is designed to show that holders have the technical skills to implement, monitor, and administer IT....
Release Date 2022/02 -
CSSLP SECURE SOFTWARE LIFECYCLE PROFESSIONAL ALL-IN-ONE EXAM GUIDE, Third Edition, 3rd Edition
Author Wm. Arthur Conklin , Daniel Paul Shoemaker
Providing 100% coverage of the latest CSSLP exam, this self-study guide offers everything you need to ace the examCSSLP Certification All-in-One Exam Guide, Third Edition covers all eight exam domains of the challenging CSSLP exam, developed by the International Information Systems Security Certific....
Release Date 2022/02 -
The Ultimate Kali Linux Book - Second Edition
Author Glen D. Singh
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchPurchase of the print or Kindle book includes a free eBook in the PDF formatKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using a....
Release Date 2022/02 -
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Author Vijay Kumar Velu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your inf....
Release Date 2022/02 -
Cyber Security and Digital Forensics
Author Mangesh M. Ghonge , Sabyasachi Pramanik , Ramchandra Mangrulkar , Dac-Nhuong Le
CYBER SECURITY AND DIGITAL FORENSICSCyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes.Cur....
Release Date 2022/03 -
Author Amy Sample Ward , Afua Bruce
Changing the way we use, develop, and fund technology for social change is possible, and it starts with you. The Tech That Comes Next: How Changemakers, Philanthropists, and Technologists Can Build an Equitable World outlines a vision of a more equitable and just world along with practical steps to ....
Release Date 2022/03 -
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition
Author Allen Harper , Ryan Linn , Stephen Sims , Michael Baucom , Huascar Tejeda , Daniel Fe
Up-to-date strategies for thwarting the latest, most insidious network attacksThis fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at ma....
Release Date 2022/03 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
IT Security Controls: A Guide to Corporate Standards and Frameworks
Author Virgilio Viegas , Oben Kuyucu
Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.....
Release Date 2022/03 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Author Svetlana Ostrovskaya , Oleg Skulkin
A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniquesKey FeaturesExplore memory forensics, one of the vital branches of digital investigationLearn the art of user activities reconstruction and malware detection using volatile memoryGet acquainted wi....
Release Date 2022/03 -
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide
Author Trevor Stuart , Joe Anich
Remediate active attacks to reduce risk to the organization by investigating, hunting, and responding to threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 DefenderKey FeaturesDetect, protect, investigate, and remediate threats using Microsoft Defender for endpointExpl....
Release Date 2022/03 -
The Cybersecurity Playbook for Modern Enterprises
Author Jeremy Wittkop
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishi....
Release Date 2022/03 -
Digital Forensics and Internet of Things
Author Anita Gehlot , Rajesh Singh , Jaskaran Singh , Neeta Raj Sharma
DIGITAL FORENSICS AND INTERNET OF THINGSIt pays to be ahead of the criminal, and this book helps organizations and people to create a path to achieve this goal.The book discusses applications and challenges professionals encounter in the burgeoning field of IoT forensics. IoT forensics attempts to a....
Release Date 2022/04 -
Cybersecurity and Local Government
Author Donald F. Norris , Laura K. Mateczun , Richard F. Forno
CYBERSECURITY AND LOCAL GOVERNMENTLearn to secure your local government’s networks with this one-of-a-kind resourceIn Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compell....
Release Date 2022/04 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Cybersecurity For Dummies, 2nd Edition
Author Joseph Steinberg
Explore the latest developments in cybersecurity with this essential guideEvery day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree....
Release Date 2022/04 -
The Official (ISC)2 SSCP CBK Reference, 6th Edition
Author Mike Wills
The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated 2021 SSCP Exam Outline.Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implem....
Release Date 2022/04 -
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
Author Jean Nestor M. Dahj
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisionsKey FeaturesBuild the analytics skills and practices you need for analyzing, detecting, an....
Release Date 2022/04 -
Incident Response Techniques for Ransomware Attacks
Author Oleg Skulkin
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactic....
Release Date 2022/04 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Author Peter H. Gregory , Bobby E. Rogers , Dawn Dunkerley
A fully updated self-study guide for the industry-standard information technology risk certification, CRISCWritten by information security risk experts, this complete self-study system is designed to help you prepare for—and pass—ISACA’s CRISC certification exam. CRISC Certified in Risk and Informa....
Release Date 2022/05 -
iOS Forensics for Investigators
Author Gianluca Tiepolo
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devicesKey FeaturesExplore free and commercial tools for carrying out data extractions and analysis for digital forensicsLearn to look for key artifacts, recover deleted mobile data, and investigate p....
Release Date 2022/05 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06