If you enjoyed this book, you may be interested in these other books by Packt:
Cybersecurity – Attack and Defense Strategies - Second Edition
Yuri Diogenes
Erdal Ozkaya
ISBN: 9781838827793
The importance of having a solid foundation for your security posture
Use cyber security kill chain to understand the attack strategy
Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence
Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy
Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails
Perform an incident investigation using Azure Security Center and Azure Sentinel
Get an in-depth understanding of the disaster recovery process
Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud
Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
ISBN: 9781839216992
Hacking at scale – how machine learning (ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise
Using video and audio as weapons of influence
Uncovering DeepFakes and their associated attack vectors
Using voice augmentation for exploitation
Defending when there is no perimeter
Responding tactically to counter-campaign-based attacks
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
ISBN: 9781800206014
Discover cybersecurity strategies and the ingredients critical to their success
Improve vulnerability management by reducing risks and costs for your organization
Learn how malware and other threats have evolved over the past decade
Mitigate internet-based threats, phishing attacks, and malware distribution sites
Weigh the pros and cons of popular cybersecurity strategies of the past two decades
Implement and then measure the outcome of a cybersecurity strategy
Learn how the cloud provides better security capabilities than on-premises IT environments
Packt is searching for authors like you
If you're interested in becoming an author for Packt, please visit authors.packtpub.com and apply today. We have worked with thousands of developers and tech professionals, just like you, to help them share their insight with the global tech community. You can make a general application, apply for a specific hot topic that we are recruiting an author for, or submit your own idea.