-
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an.... -
Author Steve Winterfeld , Jason Andress
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The ....
Release Date 2011/07 -
Cyber Warfare - Truth, Tactics, and Strategies
Author Dr. Chase Cunningham , Gregory J. Touhill
Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat.Key FeaturesDefine and determine a cyber-defence strategy based on current and past ....
Release Date 2020/02 -
Author Steve Winterfeld , Jason Andress
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information....
Release Date 2013/10 -
Author Mark Klein , Dionisio de Niz , Raj Rajkumar
Learn the State of the Art in Embedded Systems and Embrace the Internet of ThingsThe next generation of mission-critical and embedded systems will be “cyber physical”: They will demand the precisely synchronized and seamless integration of complex sets of computati....
Release Date 2016/12 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
Cyber-Vigilance and Digital Trust
Author Wiem Tounsi
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – no....
Release Date 2019/07 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Cybersecurity - Attack and Defense Strategies
Author Erdal Ozkaya , Yuri Diogenes
Enhance your organization's secure posture by improving your attack and defense strategiesAbout This BookGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.Learn to unique te....
Release Date 2018/01 -
Cybersecurity - Attack and Defense Strategies
Author Yuri Diogenes , Dr. Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest too....
Release Date 2022/09 -
Author Jessica Barker , Adrian Davis , Bruce Hallas , Ciarán Mc Mahon
Cybersecurity problems don’t always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practic....
Release Date 2021/02 -
Cybersecurity and Local Government
Author Donald F. Norris , Laura K. Mateczun , Richard F. Forno
CYBERSECURITY AND LOCAL GOVERNMENTLearn to secure your local government’s networks with this one-of-a-kind resourceIn Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compell....
Release Date 2022/04 -
Cybersecurity Attacks – Red Team Strategies
Author Johann Rehberger
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team program Leve....
Release Date 2020/03 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06 -
Cybersecurity For Dummies, 2nd Edition
Author Joseph Steinberg
Explore the latest developments in cybersecurity with this essential guideEvery day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure—and it doesn’t take a degree....
Release Date 2022/04 -
Cybersecurity for Executives: A Practical Guide
Author C. Joseph Touhill , Gregory J. Touhill
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their businessEmphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with ....
Release Date 2014/07 -
Cybersecurity for Space: Protecting the Final Frontier
Author Jacob G. Oakley
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must ....
Release Date 2020/03 -
Cybersecurity in Humanities and Social Sciences
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international rel.... -
Author Rida Khatoun
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to i....
Release Date 2022/08 -
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Author Eric C. Thompson
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and....
Release Date 2018/09 -
Cybersecurity Leadership Demystified
Author Dr. Erdal Ozkaya , Melih Abdulhayoglu
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform the....
Release Date 2022/01 -
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
Author Eugene H. Spafford , Leigh Metcalf , Josiah Dykstra
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the wor....
Release Date 2023/02 -
Author Cynthia Brumfield , Brian Haugli
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fund....
Release Date 2021/12 -
Cybersecurity Threats, Malware Trends, and Strategies
Author Tim Rains
After scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor provides unique insights on the evolution of the threat landscape and how enterprises can address modern cybersecurity challenges.Key FeaturesProtect your organization ....
Release Date 2020/05 -
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Author Thomas J. Mowbray
A must-have, hands-on guide for working in the cybersecurity professionCybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as sy....
Release Date 2013/11 -
CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition
Author Julie Mehan
Successful cyberattacks can damage your organisation, no matter who is behind themThe goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause s....
Release Date 2014/05 -
Data Analyst - BCS Guides to IT Roles
Author Obi Umegbolu , Clare Stanier , Charles Joseph , Harish Gulati , Rune Rasmussen
Data is constantly increasing; everything from app usage, to sales, to customer surveys generate data in an average business. Out on the streets data is everywhere too, from speed and security cameras, weather monitoring and measuring footfall to name just a few ex....
Release Date 2019/03