-
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
Author Eugene H. Spafford , Leigh Metcalf , Josiah Dykstra
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the wor....
Release Date 2023/02 -
Getting Started with z/OS Data Set Encryption
Author Bill White , Cecilia Carranza Lewis , Eysha Shirrine Powers , David Rossi , Eric Ros
This IBM® Redpaper Redbooks® publication provides a broad explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on IBM z/OS® data set encryption. It describes how the various hardware and software components interact in a z/OS data set encryption environment.....
Release Date 2021/12 -
Transitioning to Quantum-Safe Cryptography on IBM Z
Author Bill White , Didier Andre , Gregg Arquero , Ritu Bajaj , Joe Cronin , Anne Dames , Hen
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl....
Release Date 2023/04 -
Author Pedro H. J. Nardelli
CYBER-PHYSICAL SYSTEMSProvides a unique general theory of cyber-physical systems, focusing on how physical, data, and decision processes are articulated as a complex whole Cyber-physical systems (CPS) operate in complex environments systems with integrated physical and computational capabilities. Wi....
Release Date 2022/05 -
Cyber Mayday and the Day After
Author Daniel Lohrmann , Shamane Tan
Successfully lead your company through the worst crises with this first-hand look at emergency leadershipCyber security failures made for splashy headlines in recent years, giving us some of the most spectacular stories of the year. From the Solar Winds hack to the Colonial Pipeline ransomware event....
Release Date 2021/11 -
Joint Ventures Involving Tax-Exempt Organizations, 4th Edition
Author Michael I. Sanders
Stay up to date on all relevant regulatory and legislative changes, as well as leading case law, in a complicated area of law In the 2021 Cumulative Supplement to the 4th edition of Joint Ventures Involving Tax-Exempt Organizations, a renowned team of authors delivers the latest updates and developm....
Release Date 2021/12 -
Executive's Guide to Cyber Risk
Author Siegfried Moyo
A solid, non-technical foundation to help executives and board members understand cyber riskIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives task....
Release Date 2022/08 -
Wireless Security Architecture
Author Jennifer Minella , Stephen Orr
Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutionsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrast....
Release Date 2022/04 -
Modeling and Control of Modern Electrical Energy Systems
Author Masoud Karimi-Ghartemani
Modeling and Control of Modern Electrical Energy SystemsA step-by-step approach to the modeling, analysis, and control of modern electronically controlled energy systemsIn Modeling and Control of Modern Electrical Energy Systems, distinguished researcher Dr. Masoud Karimi-Ghartemani delivers a compr....
Release Date 2022/08 -
Author George Finney , John Kindervag
Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Pr....
Release Date 2022/10 -
Author Peter H. Gregory , Bobby E. Rogers , Dawn Dunkerley
A fully updated self-study guide for the industry-standard information technology risk certification, CRISCWritten by information security risk experts, this complete self-study system is designed to help you prepare for—and pass—ISACA’s CRISC certification exam. CRISC Certified in Risk and Informa....
Release Date 2022/05 -
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition
Author Peter H. Gregory
Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, inf....
Release Date 2022/10 -
Author Mohammed Moreb
Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investi....
Release Date 2022/04 -
Theoretical Cybersecurity: Principles and Advanced Concepts
Author Jacob G. Oakley , Michael Butler , Wayne York , Matthew Puckett , J. Louis Sewell
There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract an....
Release Date 2022/07 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06 -
Author Leeza Garber , Scott Olson
Building a successful cybersecurity team is no longer optional.Cyberthreats evolve at a staggering pace, and effective cybersecurity operations depend on successful teams. Unfortunately, statistics continue to illustrate that employers are not finding the people they need.The Can. Trust. Will. syste....
Release Date 2022/01 -
Author Amr Sukkar
This book tries to support the elaboration and implementation of strategies and to foster SMEs and entrepreneurship development.Most of businesses fall within the category of start-up, small and medium size enterprises. Therefore, governments in part of their quest to reform the economy and related ....
Release Date 2022/08 -
Author Gregory J. Skulmoski
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness.Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity....
Release Date 2022/08 -
Security Operations in Practice
Author Mike Sheward
This book walks you through how to establish and grow a strong security operations team, including hiring the right people, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a ....
Release Date 2020/02 -
Information Security Management Principles, 3rd Edition
Author Andy Taylor , David Alexander , Amanda Finch , David Sutton
This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book support....
Release Date 2020/01 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
Author William Puech
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveilla....
Release Date 2022/07 -
Intelligent Security Management and Control in the IoT
Author Mohamed-Aymen Chalouf
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications....
Release Date 2022/06 -
Author Rida Khatoun
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to i....
Release Date 2022/08 -
Author Massimo Bertaccini
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and....
Release Date 2022/03 -
Author Jean Nestor M. Dahj
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisionsKey FeaturesBuild the analytics skills and practices you need for analyzing, detecting, an....
Release Date 2022/04 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06