-
Zero Trust Networks, 2nd Edition
Author Razi Rais , Christina Morillo , Evan Gilman , Doug Barth
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method....
Release Date 2023/12 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Author Yvonne Wilson , Abhishek Hingnikar
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building ....
Release Date 2022/11 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Network Security: Private Communications in a Public World, 3rd Edition
Author Charlie Kaufman , Radia Perlman , Mike Speciner , Ray Perlner
The classic guide to cryptography and network security -- now fully updated!"Alice and Bob are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explan....
Release Date 2022/09 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09 -
Check Point Firewall Administration R81.10+
Author Vladimir Yakovlev , Dameon D. Welch
Improve your organization's security posture by performing routine administration tasks flawlesslyKey FeaturesGet a gradual and practical introduction to Check Point firewallsAcquire the knowledge and skills necessary for effective firewall administration, maintenance, and troubleshootingCreate and....
Release Date 2022/08 -
Mastering Windows Security and Hardening - Second Edition
Author Mark Dunkerley , Matt Tumbarello
A comprehensive guide to administering and protecting the latest Windows 11 and Windows server operating system from ongoing cyber threats using zero-trust security principlesKey FeaturesLearn to protect your Windows environment using zero-trust and a multi-layered security approachImplement securit....
Release Date 2022/08 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Cyber Security and Network Security
Author Sabyasachi Pramanik , Debabrata Samanta , M. Vinay , Abhijit Guha
CYBER SECUTIRY AND NETWORK SECURITYWritten and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly....
Release Date 2022/04 -
Author Lawrence E. Hughes
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required backgrou....
Release Date 2022/03 -
Author Chris Peiris , Binil Pillai , Abbas Kudrati
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting prosIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Bi....
Release Date 2021/10 -
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an.... -
Adversarial Tradecraft in Cybersecurity
Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand .... -
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit.... -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
Practical Threat Intelligence and Data-Driven Threat Hunting
Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h.... -
Mastering Python for Networking and Security - Second Edition
Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events wi.... -
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. -
Author Aditya Mukherjee
Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
Release Date 2020/11 -
Network Security, Firewalls, and VPNs, 3rd Edition
Author J. Michael Stewart , Denise Kinsey
Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet.
Release Date 2020/10 -
Author Tom Piens
Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtec....
Release Date 2020/09 -
Mastering Windows Security and Hardening
Author Mark Dunkerley , Matt Tumbarello
Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
Release Date 2020/07 -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Author Morey J. Haber
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
Release Date 2020/06