Packt Publishing, 2016. — 412 p. — ISBN: 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and...
Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh. — CRC Press, 2019. — 331 p. — ISBN13: 978-0-8153-6145-9. Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs...
Independently published, 2021. — 181 p. — ASIN B092XW9S1Q. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated,...
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
O’Reilly Media, Inc., 2024. — 220 р. — ISBN-13: 978-1-098-14779-2. Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk...
ReferencePoint Press, 2021. — 80 p. As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.Online gamers consider themselves among the most tech-savvy people in the world. Yet many of them have been snared by a game-related online scam....
Amazon Digital Services LLC, 2018. — 155 p. — ASIN B07GWSK35V. This book is totally about cybersecurity and hacking and this is mainly for Entrepreneurs and normal citizens. You can learn to become a hacker and also things about cybersecurity. In today's date hacking cases and cyber threats are increasing rapidly but people don't know how to save themselves from cyber crimes and...
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
Kogan Page, 2024. — 304 р. — ISBN-13: 978-1-3986-1428-4. To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and...
Wiley, 2023. — 272 р. — ISBN 978-1119582311. A classroom tested introduction to cyber investigations with real-life examples included. Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence,...
RAND Corporation, 2001. — 370 p. Networks and Netwars: The Future of Terror, Crime, and Militancy by John Arquilla and David Ronfeldt demonstrates that Netwar―like cyberwar―describes a new spectrum of conflict that is emerging in the wake of the information revolution. What distinguished netwar is the networked organizational structure of its practitioners and their quickness...
James Bacigalupo, Janine Fodor, John Bambenek, Kevin Borgeson, Matthew Thierry, Michael Hoffman, Michael Loadenthal, Robin Maria Valeri, Samantha Hausserman. — Lexington Books, 2022. — 186 p. — ISBN-13: 978-1793606983. Cyberhate: The Far Right in the Digital Age explores how right-wing extremists operate in cyberspace by examining their propaganda, funding, subcultures,...
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
Kogan Page, 2024. — 304 р. — ISBN 978-1-3986-1-3713. When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hackedoffers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and...
BPB Publications, 2023. — 282 р. — ISBN 978-93-5551-150-8. A Guide to Enter the Journey of a Digital Forensic Investigator. Description Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to...
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
BPB Publications, 2020. — 331 p. — ISBN-13: 978-9389328646. Understand Cybersecurity fundamentals and protect your Blockchain systems for a scalable and secured automation Key Features Understand the fundamentals of Cryptography and Cybersecurity and the fundamentals of Blockchain and their role in securing the various facets of automation. Also understand threats to Smart...
Apress Media LLC., 2020. — 359 p. — ISBN13: (electronic): 978-1-4842-5952-8. Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will...
McGraw-Hill Education, 2016. — 744 p. — (Hacking Exposed). — ISBN10: 1259589714. — ISBN13: 978-1259589713. This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and...
John Wiley & Sons, Inc., 2024. — 240 р. — ISBN-13: 978-1394254958. Discover how to navigate the intersection of tech, cybersecurity, and commerce In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and...
Independently published, 2023-07-31. — 158 p. — ASIN: B0CDF6GX74. In today’s digital age, safeguarding your organization’s assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with “Cyber Security Program and Policy Using NIST Cybersecurity Framework” by seasoned cybersecurity professionals. This guide steers you through the process of...
Amazon Digital Services LLC, 2017. — 57 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature...
Harvard University Press, 2020. — 268 p. — ISBN: 978-0-674-24599-0. “One of the finest books on information security published so far in this century―easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” ―Thomas Rid, author of Active Measures “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the...
ITGP, 2020. — 54 p. — ISBN: 978-1787782099. Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations...
John Wiley & Sons, Inc., 2020. — 260 p. — ISBN: 978-1119643777. Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies...
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-64344-9 (ebk). Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems...
John Wiley & Sons, Inc., 2019. — 337 p. — ISBN: 978-1-79346-418-7. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry,...
John Wiley & Sons, Inc., 2019. — 224 p. — ISBN: 978-1119442134 (EPUB). The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity―but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity...
Apress Media LLC, 2024. — 388 p. — ISBN-13: 979-8-8688-0094-8. This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years...
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
Apress Media LLC, 2022. — 150 р. — ISBN-13: 978-1-4842-8628-9. Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions...
Cambridge University Press, 2024. — 411 p. The Cyber Predators. Dark Personality and Online Misconduct and Crime by Aaron Cohen is focusing on dark personalities perpetrating cybercrime and deviance. This incredible academic and practical handbook provides valuable awareness of this growing phenomenon. Ever wondered who lurks in the shadows of the internet's vast landscape,...
John Wiley & Sons, Inc., 2024. — 320 p. — ISBN-13: 978-1119712091. A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the...
O’Reilly Media, Inc., 2024. — 292 p. — ISBN 978-1-098-14567-5. Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping...
No Starch Press, 2024. — 500 р. — ISBN-13: 978-1718503267. Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and...
Boston (Massachusetts, USA): Harvard Business Review Press, 2019. — 176 p. No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no...
Syngress, 2015. — 52 p. Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and...
Syngress, 2015. — 52 p. Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to...
Syngress, 2015. — 62 p. Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all...
Independently published, 2020. — 300 p. — ISBN B08JQB65SR. 5 Books in 1 What is Hacking? Hacking is a Skill. Hacking is a practice. Hacking is a passion. To be a hacker you need not build things but you need to crack them. Hackers are always decipted as evil in popular cultural references. However, there are good hackers called as ” Ethical hackers “ also known as ” Penetration...
Orange Education Pvt Ltd, 2023. — 338 p. — ISBN: 978-81-19416-46-2. Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to. Book Description In today’s digital landscape, web apps evolve rapidly, demanding enhanced security. This Ultimate Web Authentication Handbook offers a comprehensive journey into this realm. Beginning with web...
Addison-Wesley Professional, 2022-11-28. — 352 p. — ISBN-13: 978-0-13-745033-6. Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks. Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after...
Pearson Education, Ins., 2012. — 576 p. — ISBN: 978-0-13-256471-7. “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this...
Addison-Wesley Professional, 2019. — 489 p. — ISBN13: 978-0134506784. Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical...
Independently published, 2023-08-29. — 55 р. — ASIN: B0CSYTKDFK. Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing the security of computer systems, networks, applications, and other digital environments in order to identify vulnerabilities and weaknesses that could potentially be exploited by malicious...
2nd Edition. — Packt Publishing, 2020. — 595 p. — ISBN: 978-1-83882-779-3. Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and...
Packt Publishing, 2018. — 384 p. Enhance your organization’s secure posture by improving your attack and defense strategies The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience...
Biden Dum., 2021. — 48 p. — ASIN B097S1RWZ1. A security analyst is a financial professional who studies various industries and businesses, provides research and valuation reports, and makes buy, sell, and/or hold recommendations. This situation has resulted in a surge in demand for security analysis. Introduction Understanding Security Analyst Data and Estimates Security...
Robert Douglass, Keith Gremban, Ananthram Swami, Stephan Gerali. — Wiley-IEEE Press, 2023. — 516 р. — ISBN: 978-1119892144. Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and...
Palgrave Macmillan, 2023. — 273 p. Critical Security Studies in the Digital Age - Social Media and Security by Joseph Downing demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is...
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
Wiley, 2024. — 667 p. — ISBN 9781394250196. Understand and respond to a new generation of cybersecurity threats. Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus...
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
No Starch Press, 2022. — 291 р. — ISBN-13: 978-1-7185-0149-2. A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll...
BPB Publications, 2022. — 571 p. — ISBN 978-93-89328-93-6. Этический взлом промышленной системы управления: анализ, использование, смягчение последствий и защита промышленных процессов для этичного хакера Explore to tackle industrial cyber risks Key Features Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and...
No Starch Press, 2021. — 265 p. — ISBN 978-1-7185-0126-3. How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to...
Independently published, 2019. — 148 p. — ISBN 9781705485606. If you are interested in learning about hacking, this handbook will offer some subtle guidance . For starters, the handbook will make sure that you have gained an overview of hacking. The term hacking usually refers to the individuals who possess the skills that are needed to perform a penetration test and also...
Independently published, 2019. — 177 p. — ISBN 9781705492703. Do you want to learn about how to hack using Kali Linux within a short time span? Do you want to learn about how to perform an actual attack and become a professional hacker? This handbook will suit your needs, and you will not only learn about Hacking Tools for Computers , but you will also be accorded some guidance...
Independently published, 2023. — 234 р. — ISBN-13: 978-1088210093. Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you’ve come to the right place. Unlike malicious hacking, ethical hacking is a...
No Starch Press, 2021. — 219 p. — ISBN 978-1718501287. Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks. You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you...
CRC Press, 2020. — 170 p. — ISBN13: 978-0-367-36770-1. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures (Security, Privacy, and Trust in Mobile Communications) Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect...
Mercury Learning & Information, 2020. — 220 p. — ISBN: 978-1-68392-498-2. This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and...
2nd Edition. — Apress, 2020. — 419 p. — ISBN13: (electronic): 978-1-4842-5914-6. See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors...
Apress, 2020. — 190 p. — ISBN13: (electronic): 978-1-4842-5165-2. Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage...
2nd Edition. — Apress Media LLC., 2024. — 303 p. — ISBN-13: 979-8-8688-0233-1. Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities―whether human or...
Akram Press, 2023. — 84 р. — ASIN: B0C522DNCM. Even if you have no technological expertise, this book will give an accessible introduction to the fundamentals of cybersecurity. You may be a businessperson who wants to learn more about this critical topic or an information security professional who wants to brush up on your skills. Companies that employ technology intelligently...
Amazon Digital Services LLC, 2017. — 48 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
2016. — 602 p. Book in simple language, not only introduces the general method and steps of computer hackers, and the use of tools, and protection from hacker attack method is described in detail, can make the reader in understanding the basic knowledge and understanding of network security premise, easily and quickly grasp the basic knowledge, tools and repair skills, from black...
Amazon Digital Services LLC, 2017. — 23 p. — ASIN B071DZC8K7. In this short tome, the authors will give a brief synoptic of several approaches to profiling the hacker. The goal of this review is to offer individuals in Cognitive Science, Neuroscience, and Cyber Counter Intelligence different research ideas for studying and applying hacker profiling toward the identification of...
Qian Han, Sai Deep Tetali, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Yanhai Xiong. — No Starch Press, 2024. — 328 p. — ISBN-13: 978-1-7185-0330-4. This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a comprehensive introduction to detecting...
6th edition. — McGraw-Hill Education, 2022. — 1145 p. — ISBN 978-1-26-426895-5. Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the...
Apress, 2019. — 205 p. — ISBN13: (electronic): 978-1-4842-4255-1. Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to...
Amazon.com Services LLC, 2020. — 728 p. This Book Bundle Includes 7 Books: Book 1 - 25 Most Common Security Threats & How To Avoid Them Book 2 - 21 Steps For Implementing The Nist Cybersecurity Framework Book 3 - Cryptography Fundamentals & Network Security Book 4 - How to Get Into Cybersecurity Without Technical Background Book 5 - Wireless Technology Fundamentals Book 6 -...
John Wiley & Sons, Inc., 2023. — 400 p. — ISBN: 978-1-394-17309-9. The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that...
2nd edition. — Independently published, 2020. — 397 p. — ISBN B08P94H263. This book was written to help protect every person who uses a computer, mobile phone or tablet. Cyber security is not only about protecting governments or companies from spies. It’s so much more, and also so much more persona l. Cyber security is about: - stopping trolls from stealing you or your loved...
Leaders Press, 2019. — 211 р. Even with over $100 billion spent each year on security, attackers break in. They stay hidden and steal data or disrupt with ransomware. Can anything be done to stop the hack? The answer is yes. Intensive reviews of the world’s largest hacks uncovered the secret: detect attackers’ signals early. This book reveals what those signals are and shows...
Amazon Digital Services LLC, 2019. — 99 p. — ISBN: 1514673150, ASIN B010EN16P0. Do you hear news everyday on the latest hacking attack, but just don't quite understand what it is all about? Well this is the book for you. In BIT WARS, Dr. Thomas Hyslip presents the history of cybercrime, hacking and information warfare that has lead us to where we are today. Espionage, Stuxnet,...
John Wiley & Sons, Inc., 2024. — 240 p. — ISBN-13: 978-1394256099. Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process. Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber...
CreateSpace Independent Publishing Platform, 2015. — 42 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN10: 1517599334. — ISBN13: 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
Direct IT Inc., 2020. — 116 p. The Game Has Changed gives the story of small business cybersecurity from 2004-2019, with a particular focus on dark web marketplaces and cryptocurrency and how they have allowed massive growth in the global cybercriminal economy. The author is a small business IT expert who also gives a lot of advice and resources to help businesses defend...
CTS GMBH, 2017. — 36 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on...
Independently published, 2021. — 496 p. — ISBN 979-8719777528. Cyber Forensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes. The goal is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing...
Independently published, 2021. — 293 p. — ISBN 978-1-7774990-2-0. As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first...
John Wiley & Sons, Inc., 2024. — 224 p. — ISBN-13: 978-1394189076. A guide for insurance and other industries to staying on customers’ radars Attention Hacking: The Power of Social Media Selling in Insurance and Finance shows how you can make insurance go viral on social media. It might sound too good to be true, but think about it―products that enhance wealth accumulation,...
Amazon Digital Services LLC, 2016. — 182 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
Shaun Kimmons, 2022-07-08. — 90 p. — ISBN-13: 978-3986535384. Protecting yourself and your data against online threats and hacking has never been more critical, and as the saying goes, knowledge is power. The Principles of Cybersecurity and Hacking seeks to equip you with such knowledge and power. Our complete, in-depth reference to the basics, ideas, and techniques of...
André Zingsheim, Dr Matthias Wübbeling, Frank Neugebauer, Klaus Gebeshuber, Markus Widl, Michael Kofler, Peter Kloep, Roland Aigner, Stefan Kania, Thomas Hackner, Tobias Scheible. — Rheinwerk Computing, 2023. — 1141 p. — ISBN-13: 978-1-4932-2426-5. Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning...
O’Reilly Media, Inc., 2023. — 163 р. — ISBN-13: 978-1-098-13189-0. Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and co__cpLocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and...
Springer Nature, 2023. — 1120 р. — (International Series in Operations Research & Management Science No. Volume 342). — ISBN 13: 978-3-031-30190-2. This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too...
Manning Publications, 2022. — 288 р. — ISBN 978-161728004. A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to. Develop and incrementally improve your own cybersecurity strategy Detect rogue Wi-Fi networks and safely...
University of Toronto Press, 2021. — 432 p. — ISBN 978-1-4875-3125-6. Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, the...
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong. — CRC Press, 2020. — 230 p. — ISBN: 978-0-367-81643-8 (ebk). Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one...
BPB Publications, 2025. — 210 p. — ISBN: 978-93-65891-218. Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the...
John Wiley & Sons, Inc., 2023. — 307 p. — ISBN 978-1119861768. Информация о киберугрозах CYBER THREAT INTELLIGENCE “Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when...
No Starch Press, 2023. — 544 p. — ISBN 978-1-7185-0313-7. Data-science investigations have brought journalism into the 21st century, and — guided by The Intercept’s infosec expert Micah Lee — this book is your blueprint for uncovering hidden secrets in hacked datasets. In the current age of hacking and whistleblowing, the internet contains massive troves of leaked information....
2nd Edition. — Apress Media LLC, 2023. — 245 p. — ISBN-13: 978-1-4842-9319-5. Понимание, управление и измерение кибер-рисков: практические решения для создания устойчивой кибербезопасности When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components,...
Apress Media LLC, 2025. — 150 p. — ISBN-13 979-8-8688-0823-4. Безопасность и конфиденциальность в современных сетях: стратегии и идеи по защите цифровых инфраструктур This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense...
No Starch Press, 2024. — 200 р. — ISBN-13: 978-1-7185-0383-0. The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their...
2nd Edition. — Springer Nature, 2024. — 208 p. — ISBN 978-981-99-4943-4. The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has...
Syngress, 2016. — 226 p. — ISBN: 978-0-12-803306-7. DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the...
Independent, 2023. — 21 p. — ASIN: B0C3827CF3. "The Algorithm Hack: The Secret to Social Media Success" is a must-read for anyone looking to enhance their social media presence and gain more visibility online. In today's digital age, social media has become a powerful tool for businesses, entrepreneurs, and individuals alike, but with so many users and so much content being...
Amazon Digital Services LLC, 2017. — 297 p. — ASIN B073M87664. This book is geared for people that want to learn ethical hacking, penetration testing, and network security. As the title implies this book is for beginners, so there are no preconceived assumptions that you know network routing, firewall rules, Group policies, etc. This book is laid out with several simple tutorials...
De Gruyter, 2023. — 160 р. — ISBN 978-3-11-076676-9. Cyber threats today are one of the expensive losses that an organization can face. Today, it is impossible to deploy effective cybersecurity technology without relying heavily on advanced techniques like Machine Learning and Deep Learning. Cybersecurity is a growing challenge in the era of Internet. This book addresses...
No Starch Press, 2021. — 267 p. — ISBN 978-1718500549. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a...
John Wiley & Sons, Inc., 2024. — 288 p. — ISBN-13: 978-1394226238. A comprehensive overview for directors aiming to meet their cybersecurity responsibilities. In the following chapters, we will cover various cybersecurity topics in depth, such as threat actors, data breaches, compliance regulations, risk assessments, and incident response. But more importantly, we will provide...
Cutrain Ltd, 2015. — 190 p. — ISBN10: 1483431231, ISBN13: 978-1-4834-3123-9. This book provides an easy insight into the essentials of cybersecurity, even if you have a nontechnical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the...
Independently published, 2023. — 118 p. — ISBN: 978-3986536312. NEW 2022 UPDATE! THE NEW EDITION INCLUDES ALL OF THE READERS’ SUGGESTIONS. The books have been appropriately updated, edited, and proofread, and new information has been added. Most of us associate hacking with individuals with a lot of programming abilities and lose morality, and it is too difficult for us to...
Manning Publications, 2022. — 250 p. — ISBN: 978-1617298202. Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You’ll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that’s based on research and interviews with hundreds of hiring managers. Practical self-analysis...
Independently published, 2024. — 252 p. — (Python Trailblazer’s Bible). — ASIN: B0D5VXZ1GB. Cybersecurity Crash Course: From Digital Chump to Cyber Champion in One Sitting Feeling like a sitting duck in a digital world crawling with hackers? Does the mere mention of “phishing” send shivers down your spine? You’re not alone. In today’s hyper-connected world, everyone – from...
BPB Publications, 2023. — 564 p. — ISBN 978-93-55513-137. Security is a shared responsibility, and we must all own it. Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks,...
Little, Brown and Company, 2017. — 320 p. — ISBN: 0316380504. Новая книга от легендарного Кевина Митника! Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet...
Independently published, 2023-05-05. — 152 р. — ISBN-13: 979-8393656386. "APIs Unlocked: Defending Against Hackers and Threats" is a comprehensive guide to securing APIs in the modern digital landscape. APIs have become an essential component of modern software development, but they are also increasingly targeted by hackers looking to exploit vulnerabilities and gain access to...
John Wiley & Sons, Inc., 2022. — 208 p. — ISBN 978-1119863137. This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to...
2nd Edition. — Apress Media LLC, 2024. — 235 p. — ISBN-13: 979-8-8688-0339-0. Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will...
Apress, 2019. — 188 p. — ISBN13: (electronic): 978-1-4842-4309-1. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or...
Apress Media LLC., 2024. — 319 р. — ISBN-13: 979-8-8688-0174-7. There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the...
Independently published, 2021. — 190 p. — ISBN B08SG67Q53. This book gives the reader an introduction into Artificial Intelligence (AI) and demonstrates its relationship to Cyber Security. Its discusses the past, present and future of how AI impacts Cyber Security and the various systems that use this technology. It evaluates some of the current market leading AI cyber security...
Packt Publishing, 2020. — 368 p. — ISBN: 978-1-83864-817-6. Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
Springer, 2022. — 59 p. — (Springer Briefs in Computer Science). — ISBN 978-3-031-11626-1. This book discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge...
Springer, 2022. — 336 р. — ISBN 978-3-031-05752-6. This book presents a collection of state-of-the-art Artificial Intelligence (AI) and Big Data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive countermeasures. It also introduces...
Packt Publishing, 2019. — 534 p. — ISBN: 978-1-78961-619-4. It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO’s like Satya Nadella, McAfee’s CEO Chris Young, Cisco’s CIO Colin...
Kavis Web Designer, 2023-10-16. — 239 p. — ASIN: B0CL72QSS8. Ethical Hacking Tutorial For Beginners Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated. In this tutorial, we will...
John Wiley & Sons, Inc., 2022. — 339 p. — ISBN 978-1-119-83367-3 (ebk.). Land the perfect cybersecurity role—and move up the ladder—with this insightful resource. Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In...
Packt Publishing, 2019. — 518 p. — ISBN: 978-1-83864-016-3. Get up to speed with various penetration testing techniques and resolve security threats of varying complexity Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you’ll learn crucial penetration testing...
Amazon Digital Services LLC, 2017. — 51 p. — ASIN B0736HZRSC6. Cyber crime is the biggest threat that every organization on the planet faces today! And it's not just the organizations that are vulnerable. People too are at risk of being targeted by hackers. Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it is...
Independently published, 2021. — 235 p. — ASIN B0936QDBJZ. In the time of network enhancements, cloud-based services are everywhere. Many love the cloud and its ease of access, while others hate it. Despite what feelings you may have about the cloud, it is important to understand how to protect the information you store there. Tens of thousands of cyberattacks happen every day....
John Wiley & Sons, 2019. — 251 p. — ISBN: 978-1-119-61736-5. Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of...
BPB Publications, 2022. — 472 р. — ISBN-13: 978-9355512154. Discover security posture, vulnerabilities, and blind spots ahead of the threat actor Key Features Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning,...
Wiley, 2021. — 480 p. — ISBN-13 978-1119809555. Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is...
Skyhorse Publishing, 2023. — 240 p. Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime by Hari Ravichandran teaches how we can put our families’ online safety on autopilot and regain our peace of mind. It provides families with the tools and knowledge they need to create a personalized, proactive defense against cybercriminals. From identifying the...
Apress, 2019. — 455 p. — ISBN13: (electronic): 978-1-4842-4460-9. Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your...
Packt Publishing, 2020. — 506 p. — ISBN: 978-1-83882-886-8. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage It’s now more important than ever for organizations to be ready to detect and respond to security events and breaches....
Pearson, 2018. — 704 p. — ISBN: 0789759351. All You Need to Know to Secure Linux Systems, Networks, Applications, and Datain one Book From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT...
Packt Publishing, 2020. — 190 p. — ISBN: 978-1-78980-700-4. Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government. Shira Rubinoff’s Cyber Minds brings together the top authorities in cyber security to discuss the emergent threats that face industries,...
Syber Risk LLC, 2018. — 111 p. — ASIN B07G3PVXZC. This book is a spin-off of our series on anticipated expansion and use of National Institute of Standards and Technology (NIST) based frameworks, and how they fit the terms of agile or lean development. In this book, we explore several approaches to making "agility" a reality. We discuss both the National Cybersecurity Framework...
Syber Risk, 2019. — 127 p. — ASIN B07MKJJ99Z. This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad...
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
3rd Edition. — Pearson IT Certification, 2018. — 672 p. — ISBN13: 978-0-7897-5940-5. All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and...
McGraw-Hill Education, 2018. — 592 p. — ISBN: 978-1260118179. Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain...
Weldon Owen, 2017. — 224 p. — ISBN13: 978-1681881751. As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that...
John Wiley & Sons, Inc., 2020. — 256 p. — (For Dummies) — ISBN: 978-1-119-57747-8. Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with...
Mercury Learning and Information, 2024. — 150 p. — ISBN: 978-1-50152-312-0. Surviving a Cyberattack: Securing Social Media and Protecting Your Home is a roadmap to protecting your homeagainst cybercrime. This comprehensive guide addresses the ever-growing challenges users face from the potential of cybercrime in the technology-connected world. It explores various online risks,...
CRC Press, 2020. — 102 p. — ISBN-13: 978-0-367-64278-5. Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals...
Independently published, 2021. — 245 p. — ISBN B08RT98K6K, 9798590059621. Are you looking for a complete guide that enables you to use Linux and cyber security like a pro? Do you know what is hacking? Are you struggling to navigate among all the Linux distributions out there and finding hard to define the best one for your needs? Do you want to evaluate your learning level step...
Independently published, 2020. — 117 p. Do you know what is hacking? Do you want to learn about cyber security? Are you unaware of mistakes made in cybersecutity? This book is for you! This book teaches cyber security, how to defend themselves and defend against cyber-attacks. This book covers the latest security threats and defense strategies. Cyber security starts with the...
Apress Media LLC, 2022. — 230 p. — ISBN-13 (electronic): 978-1-4842-7744-7. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords,...
Addison-Wesley; Pearson, 2023. — 550 p. — ISBN-13: 978-0-13-792923-8. 175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them. Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our...
Amazon Digital Services LLC, 2017. — 142 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-56034-0 (EPUB). Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both...
Create Space Independent Publishing Platform, 2017. — 170 p. Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun? This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in...
2nd Edition. — BCS, The Chartered Institute for IT, 2022. — 333 р. — ISBN: 978-1-78017-5973. Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains...
4th Edition. — Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. — Packt Publishing, 2020. — 525 p. — ISBN: 978-1-83864-752-0. Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Mobile phone forensics is the science of retrieving data from a mobile phone under...
Springer, 2020. — 217 p. — ISBN: 978-981-15-1706-8 (eBook). This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further,...
Apress, 2018. — 136 p. — ISBN13: (electronic): 978-1-4842-3870-7. Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don’t allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a...
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
Amazon Digital Services LLC, 2017. — 34 p. — ASIN B073S5QV5V. Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest. What does this app do? Well, if you think about the way technology is moving, it does not do much for you but you can use it for chatting with...
O’Reilly Media, 2019. — 300 р. — ISBN: 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This...
BPB Publications, 2024. — 414 р. — ISBN 978-93-5551-7180. Empowering you to investigate, analyze, and secure the digital realm. Key Features: Comprehensive coverage of all digital forensics concepts. Real-world case studies and examples to illustrate techniques. Step-by-step instructions for setting up and using essential forensic tools. In-depth exploration of volatile and...
CRC Press, 2020. — 356 p. — ISBN: 978-0-367-34602-7. Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email...
Independently published, 2021. — 258 p. — ASIN B095TSRD6T. Ever found yourself being fascinated by the idea of being able to hack into any system? While modern culture has pushed hacking to a screen-based villainous role that can do miracles, there is much more to hacking that remains untold. Hardly anyone feels it necessary to mention how hacking can be an illustrious career...
Apress Media LLC., 2024. — 334 p. — ISBN-13: 979-8-8688-0785-5. The digital age has ignited a new era of opportunity and efficiency. However, this interconnected world has also created a rapidly evolving landscape of cyber threats. In 2023 alone, cybercrime caused an estimated $6 trillion in global damages, a staggering figure that showcases the immense financial risk...
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
Independently published, 2021. — 176 p. — ISBN 979-8703830253. Modern day web applications are a complicated mix of client and server-side programming languages, frameworks, cloud infrastructure, proxies and caches. Additionally, web applications are protected and monitored by several defense in-depth tools including web application firewalls, intrusion detection and prevention...
Amazon Digital Services LLC, 2018. — 175 р. Ethical hackers are in high demand. As we become more and more reliant on computer technology, black-hat hackers are working to profit from exploiting those technologies to steal personal information, so this is a perfect ethical hacking book for beginners 2019. In this we will learn basic of hacking and how to protect yourself from...
Wiley-IEEE Press, 2023. — 147 р. — ISBN 978-1119784128. Cybersecurity in Intelligent Networking Systems Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social...
Комментарии