-
Zero Trust Networks, 2nd Edition
Author Razi Rais , Christina Morillo , Evan Gilman , Doug Barth
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method....
Release Date 2023/12 -
Cyber resilience - Defence-in-depth principles
Author Alan Calder
This book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Release Date 2023/08 -
How to Measure Anything in Cybersecurity Risk, 2nd Edition
Author Douglas W. Hubbard , Richard Seiersen
A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the qu....
Release Date 2023/04 -
Transitioning to Quantum-Safe Cryptography on IBM Z
Author Bill White , Didier Andre , Gregg Arquero , Ritu Bajaj , Joe Cronin , Anne Dames , Hen
As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break cl....
Release Date 2023/04 -
Risk Management and ISO 31000 - A pocket guide
Author Alan Field
This pocket guide introduces the premise of RBT (risk-based thinking), exploring the principles outlined in the risk management standard, ISO 31000:2018. Understand the benefits of risk-based thinking and ISO 31000 with this pocket guide!
Release Date 2023/03 -
Computer Security Fundamentals, 5th Edition
Author William Chuck Easttom
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITYClearly explains core concepts, terminology, challenges, technologies, and skillsCovers today's latest attacks and countermeasuresThe perfect beginner's guide for anyone interested in a computer security careerDr. Chuck Easttom brings together complete c....
Release Date 2023/02 -
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
Author Eugene H. Spafford , Leigh Metcalf , Josiah Dykstra
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct ThemCybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the wor....
Release Date 2023/02 -
Certified Information Security Manager Exam Prep Guide - Second Edition
Author Hemang Doshi
Master information security fundamentals with comprehensive explanations of concepts. Purchase of the book unlocks access to web-based tools like practice questions, flashcards, and more to take your CISM prep to the next level. Purchase of the print or Kindle book includes a free eBook in PDF fo....
Release Date 2022/12 -
Digital Forensics and Incident Response - Third Edition
Author Gerard Johansen
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threatsKey FeaturesCreate a solid incident response framework and manage cyber incidents effectivelyLearn to apply digital forensics tools ....
Release Date 2022/12 -
Author David Sutton
Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Release Date 2022/12 -
Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level
Author Jesus Vigo , Jr.
Learn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that’s made of steel and won’t buckle when attacked!Ok, there’s no such thing as unhackable. No magic to....
Release Date 2022/12 -
Building a Cyber Resilient Business
Author Dr. Magda Lilia Chelly , Shamane Tan , Hai Tran
Learn how to build a proactive cybersecurity culture together with the rest of your C-suite to effectively manage cyber risksKey FeaturesEnable business acceleration by preparing your organization against cyber risksDiscover tips and tricks to manage cyber risks in your organization and build a cybe....
Release Date 2022/11 -
Pro Encryption in SQL Server 2022: Provide the Highest Level of Protection for Your Data
Author Matthew McGiffen
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Alwa....
Release Date 2022/11 -
Solving Identity Management in Modern Applications: Demystifying OAuth 2, OpenID Connect, and SAML 2
Author Yvonne Wilson , Abhishek Hingnikar
Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building ....
Release Date 2022/11 -
Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition
Author Michael G. Solomon , Sean-Philip Oriyano
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous....
Release Date 2022/11 -
Internet and Web Application Security, 3rd Edition
Author Mike Harwood , Ron Price
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive explanati....
Release Date 2022/11 -
Designing and Developing Secure Azure Solutions
Author Michael Howard , Simone Curzi , Heinrich Gantenbein
Plan, build, and maintain highly secure Azure applications and workloadsAs business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across t....
Release Date 2022/11 -
Author Darren R. Hayes , Robin Abernathy
Learn, prepare, and practice for CISSP exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.Master the latest CISSP exam topicsAssess your knowledge with chapter-ending quizzesReview key concepts with exam preparation tasksPractice with realistic exa....
Release Date 2022/11 -
Ransomware and Cyber Extortion: Response and Prevention
Author Sherri Davidoff , Matt Durrin , Karen Sprenger
Protect Your Organization from Devastating Ransomware and Cyber Extortion AttacksRansomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after a....
Release Date 2022/11 -
Demystifying Cryptography with OpenSSL 3.0
Author Alexei Khlebnikov , Jarle Adolfsen
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, digital signatures, SSL/TLS connectivity, and PKI handlingKey FeaturesSecure your applications against common network security threats using OpenSSLGet to grips with the ....
Release Date 2022/10 -
Network Protocols for Security Professionals
Author Yoram Orzach , Deepanshu Khanna
Get to grips with network-based attacks and learn to defend your organization's network and network devicesKey FeaturesExploit vulnerabilities and use custom modules and scripts to crack authentication protocolsSafeguard against web, mail, database, DNS, voice, video, and collaboration server attac....
Release Date 2022/10 -
Author Thomas Kranz
A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to: Develop and incrementally improve your own cybersecurity strategyDetect rogue WiFi ....
Release Date 2022/10 -
Auditing IT Infrastructures for Compliance, 3rd Edition
Author Robert Johnson , Marty Weiss , Michael G. Solomon
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how t....
Release Date 2022/10 -
Author Bobby E. Rogers
This quick review study guide offers 100% coverage of every topic on the latest version of the CISSP examGet on the fast track to becoming CISSP certified with this affordable, portable study tool. Inside, cybersecurity instructor Bobby Rogers guides you on your career path, providing expert tips an....
Release Date 2022/10 -
CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition, 2nd Edition
Author Peter H. Gregory
Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, inf....
Release Date 2022/10 -
The Official (ISC)2 CCSP CBK Reference, 4th Edition
Author Aaron Kraus
The only official body of knowledge for CCSP—the most popular cloud security credential—fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the clo....
Release Date 2022/10 -
Author George Finney , John Kindervag
Implement Zero Trust initiatives efficiently and effectivelyIn Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Pr....
Release Date 2022/10 -
Cybersecurity - Attack and Defense Strategies
Author Yuri Diogenes , Dr. Erdal Ozkaya
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscapeKey FeaturesUpdated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and moreExplore the latest too....
Release Date 2022/09 -
Mastering Malware Analysis - Second Edition
Author Alexey Kleymenov , Amr Thabet
Learn effective malware analysis tactics to prevent your systems from getting infectedKey FeaturesInvestigate cyberattacks and prevent malware-related incidents from occurring in the futureLearn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much moreGet prac....
Release Date 2022/09 -
Author Dylan Shields
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new management approaches you need to create secure apps and infrastructure on AWS. In AWS Security you’ll learn how to: Securely grant access to AWS resources to coworkers and customersDevelop policies....
Release Date 2022/09