Atria Book, 2022. — 514 p. — ISBN 978-1-9821-6740-0 For the first time in history, we have instantaneous access to the world’s knowledge. There has never been a better time to learn, to contribute, and to improve ourselves. Yet, rather than feeling empowered, we are often left feeling overwhelmed by this constant influx of information. The very knowledge that was supposed to...
Elsevier Inc., 2014. — 327 p. — ISBN: 0128007435. Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security...
No Starch Press, 2008. - 488 pages. 2nd Edition. На англ. языке. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing...
Wiley, 2011 — 352 p.
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google search. But learning design isn't so simple.
Many design books try to teach design through lists of "do's"...
Little, Brown and Company, 2011. — ISBN: 0316037702; ISBN13: 9780316037709. Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping...
André Zingsheim, Dr Matthias Wübbeling, Frank Neugebauer, Klaus Gebeshuber, Markus Widl, Michael Kofler, Peter Kloep, Roland Aigner, Stefan Kania, Thomas Hackner, Tobias Scheible. — Rheinwerk Computing, 2023. — 1141 p. — ISBN-13: 978-1-4932-2426-5. Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning...
Little, Brown and Company, 2017. — 320 p. — ISBN: 0316380504. Новая книга от легендарного Кевина Митника! Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet...
Packt Publishing, 2017. — 456 p. — ISBN: 1788395158. With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and...
Second Edition. — Syngress, 2013. — ISBN: 0124116442. На англ. языке. The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking...
Addison-Wesley, 2005. — 632 p. The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques. Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has...
Addison-Wesley Professional, 2018. — 800 р. — ISBN: 978-0134772806. The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards...
М.: Полиграфкнига, 1996. — Авторы книги в увлекательной и доступной форме рассказывают о трех хакерах: Кевине Митнике, Пенго и Роберте Моррисе. Кевин Митник — легендарный хакер, который не нуждается в представлении. Берлинец Пенго одним из первых проник в ЦЕРН (Европейский центр ядерных исследований), во время холодной войны сотрудничал с советской разведкой. Роберт Моррис –...
Independently published, 2020. — 151 p. — ISBN B084GXG1QC. If you are searching for the fastest way to learn the secrets of a professional hacker, then keep reading… You are about to begin a journey into the deepest areas of the web, which will lead you to understand perfectly the most effective strategies to hack any system you want, even if you have zero experience and you...
No Starch Press, 2019. — 448 р. — ISBN: 9781492071259. Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from...
Пер. с англ. Евгений Бурмакин. — Victoria, British Columbia, Canada; leanpub.com, 2016. — 201 с. "Основы веб-хакинга" рассказывает об этичном использовании софта для поиска уязвимостей в безопасности и о том, что научиться взламывать не всегда легко. С небольшими исключениями, существующие книги являются чрезмерно технологическими, посвящая лишь одну главу уязвимостям в сайтах...
Wiley, 2015. — 816 p. — ISBN13: 978-1118958506. The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone...
Cyberpunk University, 2017. — 94 p. — ISBN: 154279367X. What if you could learn how to stop attackers from hacking into your website or personal accounts. Imagine finding leaks inside large corporate companies and you can help them protecting their data (and make money). What if you had access to everything on the internet by leveraging your superior hacking skills? Sounds...
Wiley, 2019. — 288 p. — ISBN13: 978-1119552932. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean...
Massachusetts, Press Cambridge, 2015. — 107 p. — ISBN: 0262029731, 978-0-262-33132-6 With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. C the collection of our data by governments, corporations, advertisers, and hackers....
М.: Эксмо, 2016. — 320 с. — (Темные стороны Интернета. Расследование-сенсация). — ISBN: 978-5-699-88403-2. В последние десятилетия технологии коммуникации развивались так бурно, что большинству из нас трудно сейчас представить свою жизнь без мобильной связи и интернета. Всемирная паутина — это огромная территория без границ и почти без правил. И как и в реальном мире, эту...
СПб.: Питер, 2022. — 400 с. — ISBN 978-5-4461-1938-7. Цифровая среда — Интернет, социальные сети, приложения – является неотъемлемой частью той «мультиреальности», в которой существует современный человек. Естественно, что вместе с неоспоримой пользой виртуальность приносит в нашу жизнь и огромные риски. Сейчас цифровой мир – это джунгли, подчас населённые не самыми приятными...
Boston (Massachusetts, USA): Harvard Business Review Press, 2019. — 166 p. No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you may think your company has taken all the precautionary steps to prevent an attack, no individual, company, or country is safe. Cybersecurity can no...
М.: Инфра-Инженерия, 2020. — 692 с. — ISBN 978-5-9729-0486-0. Книга по широте охвата проблемы, новизне и практической значимости является фактически энциклопедией по кибербезопасности. Здесь вы найдете многочисленные примеры применения информационных атак, а также наиболее эффективные методы защиты от их воздействия. В доступной форме изложены теоретические основы...
Forefront Books, 2019. — 192 p. — ISBN: 1948677083. Cybercrimes are a threat and as dangerous as an armed intruder—yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It's 2 a.m.—do you know who your child is online with? According to...
Apress, 2018. - 709p. - ISBN: 978-1484232576 Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense...
Wiley, 2017. — 320 p. — ISBN: 978-1-119-39621-5. Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with...
Amazon Digital Services LLC, 2018. — 17 p. — ASIN B07FLFRKYY. This book has the answer for you! With only 2 hours of daily dedication, you can become an ethical hacker. Inside you will found step-by-step practical information about how the hackers act, what are the hacking phases, what are the tools they use and how they exploit vulnerabilities. You will learn also how to write...
BPB Publications, 2022. — 472 р. — ISBN-13: 978-9355512154. Discover security posture, vulnerabilities, and blind spots ahead of the threat actor Key Features Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning,...
BPB Publications, 2023. — 282 р. — ISBN 978-93-5551-150-8. A Guide to Enter the Journey of a Digital Forensic Investigator. Description Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to...
Packt Publishing, 2018. — 384 p. Enhance your organization’s secure posture by improving your attack and defense strategies The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience...
Wiley, 2017. — 522 p. — ISBN10: 1119231507. — ISBN13: 978-1119231509. A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
W. W. Norton & Company, 2023. — 304 p. It’s not just computers—hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about your life and the world. A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a...
John Wiley & Sons, Inc., 2019. — 352 p. — ISBN: 978-1119085171. This book examines the governance challenges of cybersecurity. In 12 detailed case studies, this edited collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. In weaving together these disparate cases, the...
No Starch Press, 2022. — 291 р. — ISBN-13: 978-1-7185-0149-2. A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll...
Packt, 2018. — 330 p. Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization. This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware...
6th ed. — McGraw-Hill Education, 2022. — 701 p. Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and...
Independently published, 2020. — 385 p. — ISBN B087H939RV. 3 Books in 1! Would you like to learn more about the World of Hacking and Linux? Then keep reading… Included in this book collection are: N. 1 Hacking for Beginners : A Step by Step Guide to Learn How to Hack Websites, Smartphones, Wireless Networks, Work with Social Engineering, Complete a Penetration Test, and Keep...
Manning Publications, 2022. — 250 p. — ISBN: 978-1617298202. Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You’ll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that’s based on research and interviews with hundreds of hiring managers. Practical self-analysis...
Б.м., б.и, 2020. — 343 p. — ISBN: 979-8558420203. This book includes 3 manuscripts: Book 1 - How to prevent Phishing & Social Engineering Attacks Book 2 - Incident Management Best Practices Book 3 - Cybersecurity Awareness for Employees In this book you will learn over 200 terms and concepts related to Cybersecurity. This book is designed for beginners or employees to have a...
Wiley, 2022. — 240 p. — ISBN 978-1-119-85070-0. Discover an up-to-date and authoritative exploration of Python cybersecurity strategies Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack...
CRC Press; Taylor & Francis Group, 2020. — 614 p. — (Internal Audit and IT Audit). — ISBN13: 978-0-367-90094-6. The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that...
СПб.: Питер, 2020. — 272 с.: ил. — (Библиотека программиста). — ISBN: 978-5-4461-1708-6. «Чтобы чему-то научиться, надо применять знания на практике. Именно так мы освоили ремесло взлома» - Майкл Принс и Йоберт Абма, соучредители HackerOne. «Ловушка для багов» познакомит вас с белым хакингом — поиском уязвимостей в системе безопасности. Неважно, являетесь ли вы новичком в...
BookBaby, 2020. — 224 p. A single data breach can put an organization out of business within a few short months. An unprepared organization may be unable to handle the unexpected expenses, loss of customer confidence, loss of current and future sales, and the many other disruptive effects associated with a data breach. Small and midsize businesses should take steps to ensure...
Harvard University Press, 2020. — 268 p. — ISBN: 978-0-674-24598-3. “One of the finest books on information security published so far in this century―easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” ―Thomas Rid, author of Active Measures “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the...
2nd Edition. — CreateSpace Independent Publishing Platform, 2016. — 68 p. — (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security). — ISBN: 978-1539860723 If you are aspiring to be a hacker, then you came to the right page! However, this book is for those who have good intentions, and who wants to learn the in’s and out of...
Orange Education Pvt Ltd, 2023. — 338 p. — ISBN: 978-81-19416-46-2. Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to. Book Description In today’s digital landscape, web apps evolve rapidly, demanding enhanced security. This Ultimate Web Authentication Handbook offers a comprehensive journey into this realm. Beginning with web...
3rd Edition. — Packt Publishing, 2022. — 570 p. — ISBN 9781803248776. Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about...
The Didactic Intelligentsia, 2018. — 196 р. — ASIN B07MKH54S1. This is one of the best books available in cyber-security and ethical hacking for beginners. This books is written in a highly organized manner and involves rich use of text and graphics. This books covers all the basics that are taught in a standard ethical hacking course. In addition to that this book also shows...
Amazon Digital Services LLC, 2016. — 365 p. — ASIN: B01M59TGT0.
The Essential Cyber Security Handbook is a great resource anywhere you go; it presents the most current and leading edge research on system safety and security. You do not need to be a cyber-security expert to protect your information. There are people out there whose main job it is trying to steal personal and...
Packt Publishing, 2019. — 404 р. — ISBN: 978-1788627962. Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a...
John Wiley & Sons, Inc., 2019. — 368 p. — ISBN: 978-1-119560-32-2. Protect your business and family against cyber attacks. Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both...
O’Reilly Media, 2019. — 300 р. — ISBN: 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This...
СПб.: Питер, 2024. — 544 с.: ил. — (Библиотека программиста). — ISBN: 978-5-4461-2125-0. Как обеспечить надежную защиту в эпоху, когда кибератаки становятся всё более продвинутыми? Каковы последствия уязвимости цифровых систем? Пётр Левашов, экс-хакер с богатым бэкграундом, рассматривает все грани кибербезопасности, начиная с базовых принципов и заканчивая новейшими...
Wiley, 2018. — 416 p. Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of...
Packt Publishing - ebooks Account, 2014. — 115 p. — ISBN10: 1783559020. — ISBN13: 978-1783559022 Receive step-by-step guidance on conducting computer investigations Explore the functionality of FTK Imager and learn to use its features effectively Conduct increasingly challenging and more applicable digital investigations for generating effective evidence using the FTK platform...
John Wiley & Sons, Inc., 2020. — 320 p. — ISBN: 978-1119643777. Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies...
2nd Edition. — Hoboken, NJ, USA: Pearson Education, 2020. — 492 p. — (Rough Cuts). – ISBN13: 978-0-7897-5991-7. Now extensively updated, this authoritative, intensely practical guide to digital forensics draws upon the author's wide-ranging experience in law enforcement, including his pioneering work as a forensics examiner in both criminal and civil investigations. Writing for...
Cutrain Ltd, 2015. — 190 p. — ISBN10: 1483431231, ISBN13: 978-1-4834-3123-9. This book provides an easy insight into the essentials of cybersecurity, even if you have a nontechnical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the...
BPB Publications, 2023. — 564 p. — ISBN 978-93-55513-137. Security is a shared responsibility, and we must all own it. Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks,...
London: Quintessence Pub Co, 2018. — 28 p. Social media hacking course in this course i will teach you the methods by that you can hack any social media accounts facebook,instagram,whats app,twitter and many more this course best to track your gf,friends and childrens and also to prevent your account from hackers
CRC Press, 2021. — 224 p. Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book...
Packt Publishing, 2023. — 330 p. — ISBN 9781804619476. Machine learning in security is harder than other domains because of the changing nature and abilities of adversaries, high stakes, and a lack of ground-truth data. This book will prepare machine learning practitioners to effectively handle tasks in the challenging yet exciting cybersecurity space. The book begins by...
BPB Publications, 2025. — 308 p. — ISBN-13 978-9365893755. This book comprehensively covers essential topics ranging from the fundamentals of cybersecurity to advanced hacking concepts, cyber law, malware detection, wireless networking, and strategies for staying secure in the digital world. This book starts with networking and security basics, covering network models,...
5th ed. — McGraw-Hill Education, 2018. — 640 p. — ISBN: 1260108414. Cutting-edge techniques for finding and fixing critical security flaws. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's...
Elsevier, 2016. — 254 p. — ISBN: 0124166504. The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at...
Independently Published, 2020. — 98 p. If you are a complete beginner to Informational Technology or Information Security in the realm of Ethical Hacking, the contents in this book will deliver all the answers you have in mind on topics revolving around hacking mobile devices. Considering that you are preparing to become an Ethical Hacker, IT Security Analyst, IT Security...
McGraw-Hill Education, 2016. — 455 p. — (Hacking Exposed). — ISBN10: 1259589714. — ISBN13: 978-1259589713. This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and...
Business Expert Press, 2020. — 282 p. — ISBN: 9781952538438. This book provides a unique perspective into the mindset of psychology and cybersecurity. It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our behavior as well, and to realize that some of...
Koehler Books, 2022. — 274 p. Securing an organization's assets and understanding the cybersecurity blueprint goes beyond the technical scope. Hackers are sharing information and gaining an informational advantage. It's time to modernize our defensive tactics and deploy a "Cybersecurity Mindset." The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode is a...
3rd edition. — Jones & Bartlett Learning, 2022. — 476 p. — ISBN 9781284199840. Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an...
Mike Miller (author), 2020, Cybersecurity Awareness for Employees, Volumes 3 In this book, you will learn over 100 terms and concepts related to cybersecurity. This book is designed for beginners or employees to have a better understanding and awareness of threats and vulnerabilities. This book will teach you how to protect yourself and your business from the most common...
Independently published, 2024. — 252 p. — (Python Trailblazer’s Bible). — ASIN: B0D5VXZ1GB. Cybersecurity Crash Course: From Digital Chump to Cyber Champion in One Sitting Feeling like a sitting duck in a digital world crawling with hackers? Does the mere mention of “phishing” send shivers down your spine? You’re not alone. In today’s hyper-connected world, everyone – from...
Palgrave Macmillan, 2017. — 208 p. — (Palgrave Studies in Cybercrime and Cybersecurity). — ISBN10: 3319538551, 13 978-3319538556. This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK. This book offers up-to-date perspectives on Cybercrime...
4th Edition. — McGraw-Hill Education, 2015. — 941 p. — ISBN: 978-0-07-183850-4. На англ. языке. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and...
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
For Dummies, 2020. - 256p. - ISBN: 1119577489 Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses...
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-56034-0 (EPUB). Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both...
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
Editors. — TIME, 2018. — 96 р. — ISBN: 978-1547842407. Mysterious and dark, the many dangers of the internet lurk just below the sunny surface of social media, online shopping and cat videos. Now, in a new Special Edition from the Editors of TIME, comes Cybersecurity: Hacking, the Dark Web and You to help you understand the dangers posed by hackers, cyber criminals and other...
The MIT Press, 2021. — 160 p. — (The MIT Press Essential Knowledge series). — ISBN 9780262542548. An accessible g uide to cybersecurity for the everyday user, covering cryptography and public key infrastructure, malware, blockchain, and other topics. It seems that everything we touch is connected to the internet, from mobile phones and wearable technology to home appliances and...
Kogan Page Limited, 2020. — 256 p.— ISBN 1789663407, 9781789663402. The world is more digitally connected than ever before, and with this connectivity, comes vulnerability. It is therefore vital that all professionals understand cyber risk and how to minimize it. This means that cyber security skills are in huge demand, and there are vast career opportunities to be taken....
Princeton University Press, 2012. - 264 pages ISBN: 0691144613 , 0691144605 Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software-and to hacking as a technical, aesthetic, and moral project-reveal about the values of contemporary liberalism? Exploring the rise and political...
No Starch Press, 2024. — 500 р. — ISBN-13: 978-1718503267. Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and...
Signal, 2013. — 320 p. Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital...
Amazon.com Services LLC, 2020. — 128 p. — ASIN B08464KYZ4. Cybersecurity can be defined as a set of methods used to safeguard the integrity of data, networks, and programs from damage, attacks, and unauthorized access. Security can be classified into two sub-categories: physical security and cybersecurity. Both of these securities are essential to protect the computerized...
No Starch Press, 2021. — 219 p. — ISBN 9781718501287. Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks. You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need...
No Starch Press, 2023. — 514 p. — ISBN 978-1-7185-0312-0, 978-1-7185-0313-7. Data-science investigations have brought journalism into the 21st century, and — guided by The Intercept’s infosec expert Micah Lee — this book is your blueprint for uncovering hidden secrets in hacked datasets. In the current age of hacking and whistleblowing, the internet contains massive troves of...
CreateSpace Independent Publishing Platform, 2018. — 176 р. Cyber Security has become an absolute necessity. Today no device can be connected to the Internet without proper security in place. Every year millions of users fall victim of malware and cyber attacks. How should we ensure our cyber security then? The best way to prevent an attack is to understand how the attack...
Syber Risk, 2019. — 127 p. — ASIN B07MKJJ99Z. This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad...
Pearson IT Certification, 2018. — 672 p. — ISBN: 0789759403. All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work. Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals...
Addison-Wesley; Pearson, 2023. — 550 p. — ISBN-13: 978-0-13-792923-8. 175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them. Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our...
Dana Publishing, 2019. — 72 p. — ISBN: 1698238533. Are you interested in pursuing a career in cyber security? Did you know that the average starting ENTRY salary of a cyber security professional ranges from $65,000 to $80,000 and jumps to multiple figures in a few years, depending on how far you want to go? The state of cyber security Threat Landscape Data encryption Preventing...
Packt Publishing, 2016. — 412 p. — ISBN: 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and...
O’Reilly Media, Inc., 2021. — 168 p. — ISBN 978-1-492-07621-6. If you're a cybersecurity professional, then you know how it often seems that no one cares about--or understands--information security. Infosec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are underresourced. There must be a...
Wiley, 2022. — 416 p. Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and...
BPB Publications, 2020. — 331 p. — ISBN-13: 978-9389328646. Understand Cybersecurity fundamentals and protect your Blockchain systems for a scalable and secured automation Key Features Understand the fundamentals of Cryptography and Cybersecurity and the fundamentals of Blockchain and their role in securing the various facets of automation. Also understand threats to Smart...
Amazon Digital Services LLC, 2017. — 30 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature...
John Wiley & Sons, Inc., 2019. — 337 p. — ISBN: 978-1-79346-418-7. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry,...
O’Reilly Media, Inc., 2024. — 292 p. — (Final). — ISBN 978-1-098-14567-5. Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From...
Pearson Education, Ins., 2012. — 576 p. — ISBN: 978-0-13-256471-7. “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this...
Springer Nature Switzerland AG 2019. — 239 p. — ISBN: 978-3-030-02109-2. This textbook surveys the knowledge base in automated and resilient cyber deception. It features four major parts: cyber deception reasoning frameworks, dynamic decision-making for cyber deception, network-based deception, and malware deception. What Is Cyber Deception? Cyber deception has emerged as an...
Springer, 2019. — 314 p. — ISBN: 978-3030168360, 3030168360. This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and...
Wiley, 2024. — 240 p. Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process. Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze...
Manning Publications, 2022. — 288 р. — ISBN: 978-161728004. A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to. Develop and incrementally improve your own cybersecurity strategy Detect rogue Wi-Fi networks and safely...
Amazon Digital Services LLC, 2017. — 161 p. — ASIN B073M87664. This book is geared for people that want to learn ethical hacking, penetration testing, and network security. As the title implies this book is for beginners, so there are no preconceived assumptions that you know network routing, firewall rules, Group policies, etc. This book is laid out with several simple tutorials...
CRC Press, 2022. — 1057 p. — ISBN 978-1-003-05788-8. Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics...
John Wiley and Sons, 2011. — 577 p. The world′s most infamous hacker offers an insider′s view of the low–tech threats to high–tech security. Kevin Mitnick′s exploits as a cyber–desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998,...
2nd Edition. — Apress, 2019. — 1136 р. Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network...
Legend Times Group, 2018. — 250 p. — ISBN: 9781787198913, 178719891X. The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses. The book was an important...
Pearson, 2018. — 704p. ALL YOU NEED TO KNOW TO SECURE Linux SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals
The Institution of Engineering and Technology, 2022. — 714 p. — ISBN 978-1-83953-321-1. Aircraft are becoming increasingly reliant on computing and networking technologies, with the advent of the Internet of Things, but this makes them vulnerable to cyber-attacks. This multidisciplinary book is at the cross section of aircraft systems, cybersecurity, and defence technologies....
BPB Publications, 2024. — 414 р. — ISBN 978-93-5551-7180. Empowering you to investigate, analyze, and secure the digital realm. Key Features: Comprehensive coverage of all digital forensics concepts. Real-world case studies and examples to illustrate techniques. Step-by-step instructions for setting up and using essential forensic tools. In-depth exploration of volatile and...
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
М.: Альпина ПРО, 2023. — 128 с. — ISBN 978-5-2060-0170-9. «Шифровальщики» – это программы, которые находят уязвимости в сетях предприятий, чтобы потом с помощью этих уязвимостей внедриться в сеть, завладеть ценной для предприятия информацией и далее вымогать деньги из руководства компании. Разумеется, программы эти создаются людьми, которые могут как объединяться в преступные...
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
O’Reilly Media, Inc., 2024. — 220 р. — ISBN-13: 978-1-098-14779-2. Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk...
Packt Publishing, 2017. — 258 p. — ISBN13: 9781787288744. Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how...
Apress Media LLC., 2020. — 359 p. — ISBN13: (electronic): 978-1-4842-5952-8. Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will...
Independently published, 2023-07-31. — 158 p. — ASIN: B0CDF6GX74. In today’s digital age, safeguarding your organization’s assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with “Cyber Security Program and Policy Using NIST Cybersecurity Framework” by seasoned cybersecurity professionals. This guide steers you through the process of...
ITGP, 2020. — 54 p. — ISBN: 978-1787782099. Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations...
IT Governance Publishing, 2020. — 297 p. — ISBN B08QJJZS3R. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Start your cyber security journey and...
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-64344-9 (ebk). Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems...
Wiley, 2021. — 220 p. — ISBN 978-1119700739. Add cybersecurity to your value proposition and protect your company from cyberattacks Cybersecurity is now a requirement for every company in the world regardless of size or industry. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit covers everything a founder, entrepreneur and venture capitalist should...
Atlantic Monthly Press, 2018. — 164 p. — ISBN10: 0802127932, 13 978-0802127938. The most dangerous threat we-individually and as a society and country-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events...
McGraw-Hill Education, 2013. — 560 p. — ISBN: 978-0-07-179877-8. Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy...
Syngress, 2015. — 76 p. — ISBN13: 978-0128027325. How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web...
Addison-Wesley Professional, 2019. — 489 p. — ISBN13: 978-0134506784. Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical...
Oxford University Press, 2022. — 304 p. The universe of actors involved in international cybersecurity includes both state actors and semi- and non-state actors, including technology companies, state-sponsored hackers, and cybercriminals. Among these are semi-state actors--actors in a close relationship with one state who sometimes advance this state's interests, but are not...
Independently published, 2023. — 234 р. — ISBN-13: 978-1088210093. Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you’ve come to the right place. Unlike malicious hacking, ethical hacking is a...
2nd Edition. — Apress, 2020. — 419 p. — ISBN13: (electronic): 978-1-4842-5914-6. See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors...
Qian Han, Sai Deep Tetali, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Yanhai Xiong. — No Starch Press, 2024. — 328 p. — ISBN-13: 978-1-7185-0330-4. This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a comprehensive introduction to detecting...
Wiley, 2023. — 401 p. Since the 1970s, infosec practitioners have been incrementally improving the overall security landscape without ever taking a moment to consider if they were going in the right strategic direction in the first place. The author makes the case that they weren't. The general direction wasn't wrong per se, but the thought leaders in the space never got to the...
Independently published, 2019. — 303 p. — ISBN 9781071038185. This workbook covers all the information you need to pass the Certified Cloud Security Professional Exam. The workbook is designed to take a practical approach to learning with real-life examples and case studies
Packt Publishing Ltd, 2019. — 358 p. Investigate network attacks and find evidence using common network forensic tools. Gain basic skills in network forensics and learn how to apply them effectively. Key Features Investigate network threats with ease Practice forensics tasks such as intrusion detection, network analysis, and scanning Learn forensics investigation at the network...
Independently published, 2021. — 293 p. — ISBN 978-1-7774990-2-0. As cyberattacks dominate headlines, cybersecurity experts are increasingly becoming among the most sought-after professionals. Cybersecurity is one of the hottest jobs on the market today, with comparatively high wages and unparalleled growth opportunities. With the organic move to the cloud, digital-first...
O’Reilly Media, Inc., 2023. — 163 р. — ISBN-13: 978-1-098-13189-0. Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and co__cpLocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and...
Independent, 2023. — 21 p. — ASIN: B0C3827CF3. "The Algorithm Hack: The Secret to Social Media Success" is a must-read for anyone looking to enhance their social media presence and gain more visibility online. In today's digital age, social media has become a powerful tool for businesses, entrepreneurs, and individuals alike, but with so many users and so much content being...
Packt Publishing, 2018. — 402 p. Investigate, analyze, and report iOS, Android, and Windows devices Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial...
Wiley-IEEE Press, 2023. — 339 p. Explains how the latest technologies can advance policing and security, identify threats, and defend citizens from crime and terrorism. Scientific innovation in the area of security solutions for citizen safety has leapt ahead following the exponential increase in the capability to collect, store, and process information from various sources....
TSO, The Stationery Office, 2022. — 113 p. — ISBN-13 978-0117093706. Fundamentals of Adopting the NIST Cybersecurity Framework takes cybersecurity and business professionals on a journey into the world where the ever-changing threat landscape intersects with digital business risk. The DVMS Institute CPD Model represents a scalable digital value management system (DVMS) that...
Nelson C. First Line of Defense: The Beginners Book of Cyber Security Independently published, 2020. ― 97 p. ― ISBN: 979-8642907276. As cyber and data breaches continue to grow exponentially, corporations continue to depend on cybersecurity professionals to detect threats and protect sensitive data. Experts predict that the demand for cybersecurity specialist will continue to...
Apress, 2019. — 215 р. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming...
Springer, 2022. — 336 р. — ISBN 978-3-031-05752-6. This book presents a collection of state-of-the-art Artificial Intelligence (AI) and Big Data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive countermeasures. It also introduces...
Kavis Web Designer, 2023-10-16. — 239 p. — ASIN: B0CL72QSS8. Ethical Hacking Tutorial For Beginners Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated. In this tutorial, we will...
Wiley, 2021. — 480 p. — ISBN-13 978-1119809555. Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is...
Wiley, 2021. — 304 p. — ISBN 9781119805465. Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book...
2nd Edition. — For Dummies, Wiley, 2022. — 419 p. — ISBN-13 9781119867180. CYBERSECURITY UNLOCKED Cybersecurity For Dummies, 2nd Edition provides an informational primer on cybersecurity, whether you’re concerned about your own information or your company’s. So much of our private information lives online or in the Cloud and can be at risk for hacking or mis-use. Learn how to...
Business Expert Press, 2018. — 168 p. — ISBN10: 1947441469, 13 978-1947441460. Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyber-attacks are now an everyday occurrence, and it is becoming clear that the impact of these...
Independently published, 2023. — 139 p. Защита цифрового рубежа: введение в кибербезопасность для начинающих "Securing the Digital Frontier: An Introduction to Cybersecurity for Beginners" is your essential guide to understanding the ever-evolving world of cybersecurity. Written for the everyday person, this book provides a comprehensive guide to the basics of cybersecurity,...
Apress, 2018. — 184 p. — ISBN: 1484238699. Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the...
Yale University Press, 2018. — 336 p. A seasoned diplomat with deep knowledge of Islamist politics and digital innovation draws the first clear picture of the unprecedented impact of online networks. Social media has dominated the discourse of recent events in the Muslim world—from the Arab Spring and its aftermath to ISIS’s online recruitment. Yet the roles of social media in...
IGI Global, 2023. — 344 p. — ISBN 9781668490204. Cybersecurity, or information technology security (I/T security), is the protection of computer systems and networks from information disclosure; theft of or damage to their hardware, software, or electronic data; as well as from the disruption or misdirection of the services they provide. The field is becoming increasingly...
CRC Press, 2025. — 251 p. — ISBN 978-1-032-74498-8. Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using cryptocurrency such as Bitcoin, to regain access. Ransomware attacks pose a significant threat to national security, and there has...
Independently published, 2021. — 181 p. — ASIN B092XW9S1Q. A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated,...
Packt Publishing, 2015. — 292 p. — ISBN13: 978-1783988525. Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will...
Wiley, 2023. — 272 р. — ISBN 978-1119582311. A classroom tested introduction to cyber investigations with real-life examples included. Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence,...
Emerald Publishing, 2021. — 944 p. Digital technologies have led to many important social and cultural changes worldwide, but they are also implicated in the facilitation of violence and abuse. While cybercriminality is often described as one of the greatest threats to nation states and global security, the wide range of interpersonal crimes. comprising technology-facilitated...
McGraw-Hill Companies, 2012. — 352 p. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and divert attackers, configure honeypots, mitigate encrypted crimeware, and identify malicious software groups. The expert...
University of Georgia Press, 2016. — 240 p. — ISBN10: 0820349208. — ISBN13: 978-0820349206. — Studies in Security and International Affairs Ser Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic...
Springer, 2021. — 168 p. — ISBN 978-981-33-6725-8. Кибербезопасность Have you ever received a phone call informing you that you have a virus on your computer, or a slow Internet connection? Have you ever wondered why you get so much SPAM? Are you concerned your computer might end up with a virus and you'll lose all your files? Does anyone know what the Cloud actually is? This...
Apress Media LLC, 2022. — 150 р. — ISBN-13: 978-1-4842-8628-9. Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions...
Apress 2021. — 457 p. — ISBN 9781484266540. he cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity. In engaging and...
Addison-Wesley Professional, 2022-11-28. — 352 p. — ISBN-13: 978-0-13-745033-6. Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks. Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after...
2nd Edition. — Packt Publishing, 2020. — 595 p. — ISBN: 978-1-83882-779-3. Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and...
John Wiley & Sons Ltd., 2024. — 672 p. — ISBN 978-1394250196. Understand and respond to a new generation of cybersecurity threats. Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity...
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
No Starch Press, 2021. — 265 p. — ISBN 978-1-7185-0126-3. How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to...
BPB Publications, 2021. — 260 p. — ISBN 978-93-90684-731. Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of 'Cybersecurity' as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to...
CRC Press, 2020. — 170 p. — ISBN13: 978-0-367-36770-1. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures (Security, Privacy, and Trust in Mobile Communications) Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect...
Apress, 2020. — 190 p. — ISBN13: (electronic): 978-1-4842-5165-2. Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage...
Amazon Digital Services LLC, 2017. — 31 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
Routledge, 2017. — 754 p. — ISBN: 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as...
London: Quintessence Pub Co, 2015. — 44 p. As we digress further into the digital age of computers, the skill of hacking and the knowledge of hack protection from unexpected enemies and government has become an essential skill every citizen needs to learn. Hacking is an art and thus needs to be treated as such. As artist, we hackers solve problems and build things using our...
CTS GMBH, 2017. — 26 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on...
USA, Walzone Press, 2025. — 166 p. — ISBN 9798230775591. Овладение искусством программирования ART-сборок: раскройте секреты навыков экспертного уровня ARM Assembly programming represents a special skillset within the field of computer science, embodying both precision and depth of understanding. This book, "Mastering the Art of ARM Assembly Programming: Unlock the Secrets of...
Springer, 2021. — 193 p. — ISBN 978-3-030-79914-4. This book uncovers the idea of understanding cybersecurity management in FinTech. It commences with introducing fundamentals of FinTech and cybersecurity to readers. It emphasizes on the importance of cybersecurity for financial institutions by illustrating recent cyber breaches, attacks, and financial losses. The book delves...
IGI Global, 2023. — 465 p. Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering,...
Amazon Digital Services LLC, 2016. — 100 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
BPB Publications, 2025. — 210 p. — ISBN: 978-93-65891-218. Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the...
De Gruyter, 2023. — 160 р. — ISBN 978-3-11-076676-9. Cyber threats today are one of the expensive losses that an organization can face. Today, it is impossible to deploy effective cybersecurity technology without relying heavily on advanced techniques like Machine Learning and Deep Learning. Cybersecurity is a growing challenge in the era of Internet. This book addresses...
Wiley, 2023. - 288 p. - ISBN: 978-1-394-22622-1 In Cyber Guardians: Empowering Board Members for Effective Cybersecurity, veteran cybersecurity advisor Bart McDonough delivers a comprehensive and hands-on roadmap to effective cybersecurity oversight for directors and board members at organizations of all sizes. The author includes real-world case studies, examples, frameworks,...
Packt Publishing, 2016. — 248 p. — ISBN: 978-1-78712-613-8. We will be leveraging the latest credit-card sized Raspberry Pi 3 and teach you how to create a portable, low cost hacking tool using Kali Linux 2. This book will start with installing and tuning Kali Linux 2 on Raspberry Pi 3 so that you can get started with penetration testing. You will be exposed to various network...
Addison-Wesley Professional, 2016. — 296 p. — (SEI Series in Software Engineering). — ISBN10: 0134189809. — ISBN13: 978-0134189802. This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition....
Springer, 2021. — 410 p. — ISBN 978-3-030-74895-1. This book encompasses a systematic exploration of Cybersecurity Data Science (CSDS) as an emerging profession, focusing on current versus idealized practice. This book also analyzes challenges facing the emerging CSDS profession, diagnoses key gaps, and prescribes treatments to facilitate advancement. Grounded in the management...
Austin Macauley Publishers, 2023. - 238 p. - ISBN: 9789948789215 It's a bitter truth that we live in an age of vulnerable systems, where our existence is completely dependent on them. Cyber attacks can cause greater damage than actual war losses for a country that is unprepared for them. After several incidents that impacted social order, governments have realized this fact....
Apress, 2023. — 447 p. — ISBN-13 978-1-4842-9559-5. The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the...
Syngress, 2013. — 160 р. — ISBN: 978-0124166004. The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm...
Routledge, 2025. — 186 p. — ISBN 978-1-032-94466-1. Within the organization, the cyber security manager fulfils an important and policy-oriented role. Working alongside the risk manager, the Information Technology (IT) manager, the security manager and others, the cyber security manager's role is to ensure that intelligence and security manifest in a robust cyber security...
Apress, 2019. — 455 p. — ISBN13: (electronic): 978-1-4842-4460-9. Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your...
Apress, 2021. — 221 p. — ISBN 978-1-4842-7219-0. Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an intelligence-led approach...
Apress, 2021. — 327 p. — ISBN 978-1-4842-7035-6. Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner,...
Packt Publishing, 2018. — 564 p. — ISBN: 1788622057. Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of...
New York, USA: Business Expert Press, LLC, 2019. — 94 p. — (Business Law and Corporate Risk Management Collection). — ISBN13: 978-1-94897-618-3. Cyber security could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing...
McGraw-Hill Education, 2018. — 592 p. — ISBN: 978-1260118179. Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain...
Weldon Owen, 2017. — 272 p. — ISBN10: 1681881756, 13 978-1681881751. As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and...
Gatorbytes, 2017. — 74 p. — (Gatorbytes). — ISBN10: 1942852134, 13 978-1942852131. Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices-everything from computers and mobile phones to traffic cameras and pacemakers-will reach 50 billion by 2050. That number is...
Notion Press, 2015. — 158 р. — ISBN: 978-9352061273. Authors and ardent techies, Sahil Baghla and Arun Soni share their innate wisdom on protecting yourself and your family from certain vices of technology. They also show us how to make the most of it! With just a little help from our trusty computers and smart phones, the duo educate us on a variety of practical applications...
Reaktion Books, 2020. — 336 p. — ISBN 9781789142853. “Brilliantly researched and written.”—Jon Snow, Channel 4 News “A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades...Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was...
Independently published, 2021. — 176 p. — ISBN 979-8703830253. Modern day web applications are a complicated mix of client and server-side programming languages, frameworks, cloud infrastructure, proxies and caches. Additionally, web applications are protected and monitored by several defense in-depth tools including web application firewalls, intrusion detection and prevention...
IGI Global, 2023. — 476 p. The field of cybersecurity is becoming increasingly important due to the continuously expanding reliance on computer systems, the internet, wireless network standards such as Bluetooth and Wi-Fi, and the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the Internet of Things (IoT). Cybersecurity is...
Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh. — CRC Press, 2019. — 331 p. — ISBN13: 978-0-8153-6145-9. Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs...
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
2nd edition. — Springer, 2023. — 803 p. — ISBN 978-3-031-21651-0. This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency- Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE...
IOP Publishing Ltd, 2023. — 357 p. — ISBN 978-0-7503-5245-1. Industry 4.0 is all about making a drastic change, a revolution in the industrial production, organization, and process in years to come. Industry 4.0 combines concepts like computer vision, machine learning, artificial intelligence (AI), cloud computing, the Internet of Things (IoT), etc., in order to make...
Kogan Page, 2024. — 304 р. — ISBN-13: 978-1-3986-1428-4. To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and...
James Bacigalupo, Janine Fodor, John Bambenek, Kevin Borgeson, Matthew Thierry, Michael Hoffman, Michael Loadenthal, Robin Maria Valeri, Samantha Hausserman. — Lexington Books, 2022. — 186 p. — ISBN-13: 978-1793606983. Cyberhate: The Far Right in the Digital Age explores how right-wing extremists operate in cyberspace by examining their propaganda, funding, subcultures,...
Kogan Page, 2024. — 304 р. — ISBN 978-1-3986-1-3713. When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hackedoffers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and...
Springer, 2023. — 169 p. — (Synthesis Lectures on Information Security, Privacy, and Trust). — ISBN 978-3-031-28258-4. This book explores Machine Learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network...
CRC Press, 2021. — 276 p. Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to...
Sold by: Amazon Digital Services LLC, 2016. — 8 p. — ASIN: B01CWG04L4
This article really outlines issues of security that have cost even lives as well as the loss of security because of vulnerabilities of the Internet. There are simple cost effective solutions that stop the hacks and the attacks. This article outlines the constant problems of Internet security that even the...
Apress Media LLC, 2024. — 388 p. — ISBN-13: 979-8-8688-0094-8. This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years...
SAGE Publications, Inc, 2021. — 337 p. — ISBN 978-1071837337. Cybersecurity has traditionally been the purview of information technology professionals, who possess specialized knowledge and speak a language that few outside of their department can understand. In our current corporate landscape, however, cybersecurity awareness must be an organization-wide management competency...
Springer, 2018. — 295 p. — (Advances in Information Security 72). — ISBN: 3319976427. Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or...
Springer, 2021. — 497 p. — ISBN 978-3-030-71380-5. This book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies,...
Independently published, 2023-08-29. — 55 р. — ASIN: B0CSYTKDFK. Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing the security of computer systems, networks, applications, and other digital environments in order to identify vulnerabilities and weaknesses that could potentially be exploited by malicious...
The Institution of Engineering and Technology, 2019. — 480 p. — ISBN 978-1785616389. With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality...
The Rowman & Littlefield Publishers, 2021. — 149 p. — (PracticalL Career Guides). — ISBN 9781538145135. Welcome to the cybersecurity (also called information security or InfoSec) field! If you are interested in a career in cybersecurity, you’ve come to the right book. So what exactly do these people do on the job, day in and day out? What kind of skills and educational...
Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc. — Springer, 2021. — 186 p. — (Studies in Big Data, 75). — ISBN 978-3030623111. This book accommodates the important thing findings associated to cybersecurity analysis evaluation for Europe and Japan collected throughout the EUNITY mission. A large-scope...
India: BPB Publications, 2022. — 571 p. — ISBN 978-93-89328-93-6. Этический взлом промышленной системы управления: анализ, использование, смягчение последствий и защита промышленных процессов для этичного хакера In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company's...
Naval Institute Press, 2022. — 327 p. In today's online attention economy, supply and demand have created a rapidly growing market for firms and entrepreneurs using the tactics, tools, and strategies of digital influence warfare to gain profit and power. This book focuses on the more malicious types of online activity such as deception, provocation, and a host of other dirty...
River Publishers, 2018. — 264 p. — ISBN 9788770220798. The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our...
Mercury Learning & Information, 2020. — 220 p. — ISBN: 978-1-68392-498-2. This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and...
2nd Edition. — Apress Media LLC., 2024. — 303 p. — ISBN-13: 979-8-8688-0233-1. Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities―whether human or...
Akram Press, 2023. — 84 р. — ASIN: B0C522DNCM. Even if you have no technological expertise, this book will give an accessible introduction to the fundamentals of cybersecurity. You may be a businessperson who wants to learn more about this critical topic or an information security professional who wants to brush up on your skills. Companies that employ technology intelligently...
Packt Publishing, 2024. — 350 p. In the rapidly evolving landscape of software development, the integration of continuous testing, quality, security, and feedback has become pivotal for organizations aiming to achieve successful digital transformations. Continuous Testing, Quality, Security, and Feedback is a comprehensive guide that delves into the core strategies necessary...
CRC Press, 2025. — 113 p. — ISBN: 978-1-032-86750-2. Анализ программ-вымогателей: извлечение и классификация знаний для расширенной разведки киберугроз This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semantic annotation of...
Red Globe Press, 2020. — 265 p. This new textbook offers a systematic introduction to a wide array of cybercrimes, exploring their diversity and the range of possible responses to them. Combining coverage of theoretical perspectives with more technical knowledge, the book is divided into ten chapters which first lay the foundations of the topic and then consider the most...
John Wiley & Sons, Inc., 2023. — 307 p. — ISBN 978-1119861768. Информация о киберугрозах CYBER THREAT INTELLIGENCE “Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when...
No Starch Press, 2024. — 200 р. — ISBN-13: 978-1-7185-0383-0. The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their...
Packt Publishing, 2024. — 168 p. Key Features: Gain guidance for setting up a diverse password-cracking environment across multiple platforms Explore tools such as John the Ripper, Hashcat, and techniques like dictionary and brute force attacks for breaking passwords Discover real-world examples and scenarios to navigate password security challenges effectively Book...
Syngress, 2016. — 226 p. — ISBN: 978-0-12-803306-7. DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the...
Maleh Y., Baddi Y., Alazab M., Tawalbeh L., Romdhani L. — Springer, 2021. — 379 p. — (Studies in Big Data, 90). — ISBN 978-3-030-74574-5. This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models...
ABC-CLIO, LLC., 2020. — 485 p. — 978-1-4408-5735-5 (ebook). This important reference work is an extensive, up-to-date resource for students wanting to immerse themselves in the world of cybercrime, or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless...
Lulu Publishing Services, 2016. — 43 p. — ISBN10: 1483446344. — ISBN13: 978-1483446349. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? This dictionary began life...
Wiley, 2017. — 344 p. — ISBN: 978-1-119-32828-5. Intensively hands–on training for real–world network forensics. Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands–on all the way by dissecting packets, you gain fundamental knowledge that only comes from experience....
Springer, 2021. — 467 p. — ISBN 978-3-030-72235-7. This book provides stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation results (using several analytics tools), and an application-oriented approach that can be demonstrated with respect to data analytics using artificial intelligence to make systems stronger (i.e.,...
Packt Publishing Ltd., 2020. — 418 p. — ISBN: 978-1-83898-992-7. Plan and design robust security architectures to secure your organization’s technology landscape and the applications you develop Cybersecurity architects work with others to develop a comprehensive understanding of the business’ requirements. They work with stakeholders to plan designs that are implementable,...
Packt Publishing, 2018. — 426 p. Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side...
Packt Publishing, 2020. — 368 p. — ISBN: 978-1-83864-817-6. Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an...
Springer, 2022. — 60 p. This book discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks. Most...
Packt Publishing, 2019. — 534 p. — ISBN: 978-1-78961-619-4. It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO’s like Satya Nadella, McAfee’s CEO Chris Young, Cisco’s CIO Colin...
Packt Publishing Ltd, 2019. — 308 p. Identify vulnerabilities and secure your financial services from security breaches. A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats. Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and...
John Wiley & Sons, Inc., 2022. — 339 p. — ISBN 978-1-119-83367-3 (ebk.). Land the perfect cybersecurity role—and move up the ladder—with this insightful resource. Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In...
Packt Publishing, 2019. — 518 p. — ISBN: 978-1-83864-016-3. Get up to speed with various penetration testing techniques and resolve security threats of varying complexity Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you’ll learn crucial penetration testing...
Amazon Digital Services LLC, 2017. — 51 p. — ASIN B0736HZRSC6. Cyber crime is the biggest threat that every organization on the planet faces today! And it's not just the organizations that are vulnerable. People too are at risk of being targeted by hackers. Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it is...
Routledge, 2017. — 238 p. This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of...
Packt Publishing, 2020. — 506 p. — ISBN: 978-1-83882-886-8. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage It’s now more important than ever for organizations to be ready to detect and respond to security events and breaches....
4th Edition. — Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. — Packt Publishing, 2020. — 525 p. — ISBN: 978-1-83864-752-0. Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Mobile phone forensics is the science of retrieving data from a mobile phone under...
Springer, 2023. — 291 p. — ISBN 978-3-031-27764-1. Новые ИКТ-технологии и кибербезопасность: от искусственного интеллекта и машинного обучения к другим футуристическим технологиям This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally...
Springer, 2020. — 336 p. This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more...
Independently published, 2021. — 258 p. — ASIN B095TSRD6T. Ever found yourself being fascinated by the idea of being able to hack into any system? While modern culture has pushed hacking to a screen-based villainous role that can do miracles, there is much more to hacking that remains untold. Hardly anyone feels it necessary to mention how hacking can be an illustrious career...
Apress Media LLC., 2024. — 334 p. — ISBN-13: 979-8-8688-0785-5. The digital age has ignited a new era of opportunity and efficiency. However, this interconnected world has also created a rapidly evolving landscape of cyber threats. In 2023 alone, cybercrime caused an estimated $6 trillion in global damages, a staggering figure that showcases the immense financial risk...
West Levi, 2020. — 33 p. You’ve protected your loved ones. Now it’s time to protect your data. You know the dangers of Coronavirus for you and your family, but do you know the threats the virus places on cybersecurity? Keep reading to find out how to protect cybersecurity now… As the global pandemic gains a foothold in places large and small, smart consumers and businesses are...
Wiley-IEEE Press, 2023. — 147 р. — ISBN 978-1119784128. Cybersecurity in Intelligent Networking Systems Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social...
2-e изд. — Астана: Спринт Бук, 2025. — 432 с. — ISBN 978-601-08-4270-0. Во втором издании Эндрю Хоффман рассматривает десятки смежных тем, от новейших типов атак и средств защиты до моделирования угроз, жизненного цикла безопасной разработки ПО (SSDL/SDLC) и архитектуры нулевого доверия. Вы получите подробную информацию об эксплойтах и средствах защиты от атак с использованием...
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
Bloomsbury Professional, 2021. — 227 p. — ISBN 978-1-52651-413-4. Full of tips, case studies, tables and checklists this new title sets out the parameters of liability in respect of potential and actual cyber insurance claims and examines the significant areas where such claims will have the greatest impact. Covering First and Third party insurance, it provides the answers to...
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
2nd edition. — Springer, 2021. — 229 p. — ISBN 9783662621561. This book explains how to see one’s own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting,...
U.S. Army War College Press, 2016. — 69 p. — ASIN: B01HUE9SHY The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were...
John Wiley & Sons, Inc., 2019. — 224 p. — ISBN: 978-1119442134 (EPUB). The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity―but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity...
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
LUX, 2016. — 520 p. Il y a presque dix ans avant WikiLeaks, Occupy Wall Street et le Printemps arabe , l anthropologue Gabriella Coleman se plongeait dans l étude d un phénomène mondial alors en pleine expansion: la communauté de hackers au masque désormais célèbre, Anonymous. Après quelques mois, elle était devenue si étroitement liée au groupe tantôt confidente, tantôt...
John Wiley & Sons, Inc., 2024. — 320 p. — ISBN-13: 978-1119712091. A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the...
Wiley, 2022. — 227 p. — ISBN 978-1-119-81123-7. Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the...
Independently published, 2020. — 300 p. — ISBN B08JQB65SR. 5 Books in 1 What is Hacking? Hacking is a Skill. Hacking is a practice. Hacking is a passion. To be a hacker you need not build things but you need to crack them. Hackers are always decipted as evil in popular cultural references. However, there are good hackers called as ” Ethical hackers “ also known as ” Penetration...
Manning Publications, December 29th 2020. — 307 p. — ISBN: 978-1617296826. Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The...
Biden Dum., 2021. — 48 p. — ASIN B097S1RWZ1. A security analyst is a financial professional who studies various industries and businesses, provides research and valuation reports, and makes buy, sell, and/or hold recommendations. This situation has resulted in a surge in demand for security analysis. Introduction Understanding Security Analyst Data and Estimates Security...
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
O’Reilly Media, Inc., 2025. — 588 p. — ISBN 978-1-098-16508-6. Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system...
Packt Publishing, 2021. — 623 p. — ISBN 9781800569218. Learn to identify a security incident and build a series of best practices to stop an attack before it creates serious consequences Key Features Discover the entire spectrum of Incident Response (IR), from its evolution to recovery in general as well as in the cloud Understand IR best practices through real-world phishing...
Syngress Publishing, Inc., 2007. — 482 p. — ISBN 978-1597491549. A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming...
Apress, 2018. — 247 p. See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the...
Amazon Digital Services LLC, 2017. — 18 p. — ASIN B071DZC8K7. In this short tome, the authors will give a brief synoptic of several approaches to profiling the hacker. The goal of this review is to offer individuals in Cognitive Science, Neuroscience, and Cyber Counter Intelligence different research ideas for studying and applying hacker profiling toward the identification of...
Leaders Press, 2019. — 224 р. — ISBN 978-1-943386-41-3 Even with over $100 billion spent each year on security, attackers break in. They stay hidden and steal data or disrupt with ransomware. Can anything be done to stop the hack? The answer is yes. Intensive reviews of the world’s largest hacks uncovered the secret: detect attackers’ signals early. This book reveals what those...
CreateSpace Independent Publishing Platform, 2015. — 27 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN10: 1517599334. — ISBN13: 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
Direct IT Inc., 2020. — 116 p. The Game Has Changed gives the story of small business cybersecurity from 2004-2019, with a particular focus on dark web marketplaces and cryptocurrency and how they have allowed massive growth in the global cybercriminal economy. The author is a small business IT expert who also gives a lot of advice and resources to help businesses defend...
2nd edition. — Packt Publishing, 2020. — 432 p. — ISBN 183864900X, 9781838649005. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life...
Independently published, 2021. — 496 p. — ISBN 979-8719777528. Cyber Forensics is an electronic discovery technique used to determine and reveal technical criminal evidence. It often involves electronic data storage extraction for legal purposes. The goal is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing...
Greenhaven Publishing, 2018. — 138 p. Many Americans became aware of Russia's web brigades during the 2016 presidential election, during which allegations of Russian interference came to light. However, Russia's history of online meddling extends back to the early 2000s and far beyond just the United States. This volume explores the little known history of Russia's troll...
Springer, 2024. — 473 p. — ISBN 9819712483. Highlights the latest advancements in AI, ML, and blockchain technology and their applications in cybersecurity Includes examples and case studies illustrating the use of AI, ML, and blockchain in real-world situations Provides practical advice and guidelines for businesses and organizations looking to adopt these technologies
John Wiley & Sons, Inc., 2024. — 224 p. — ISBN-13: 978-1394189076. A guide for insurance and other industries to staying on customers’ radars Attention Hacking: The Power of Social Media Selling in Insurance and Finance shows how you can make insurance go viral on social media. It might sound too good to be true, but think about it―products that enhance wealth accumulation,...
Springer, 2023. — 468 p. — (Advances in Information Security). This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is...
Springer Nature, 2023. — 1120 р. — (International Series in Operations Research & Management Science No. Volume 342). — ISBN 13: 978-3-031-30190-2. This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too...
Springer, 2021. — 407 p. — (Crime and Justice in Digital Society, 1). — ISBN 978-3-030-60526-1. This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human...
University of Toronto Press, 2021. — 432 p. — ISBN 978-1-4875-3125-6. Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, the...
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong. — CRC Press, 2020. — 230 p. — ISBN: 978-0-367-81643-8 (ebk). Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one...
Yale University Press, 2017. — 240 p. — ISBN: 0300227442. A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers. New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone...
2nd Edition. — Apress Media LLC, 2023. — 245 p. — ISBN-13: 978-1-4842-9319-5. Понимание, управление и измерение кибер-рисков: практические решения для создания устойчивой кибербезопасности When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components,...
Apress Media LLC, 2025. — 150 p. — ISBN-13 979-8-8688-0823-4. Безопасность и конфиденциальность в современных сетях: стратегии и идеи по защите цифровых инфраструктур This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense...
Springer, 2019. — 255 p. This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest...
No Starch Press, 2021. — 264 p. — ISBN 978-1718500549. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a...
Independently published, 2023. — 118 p. — ISBN: 978-3986536312. NEW 2022 UPDATE! THE NEW EDITION INCLUDES ALL OF THE READERS’ SUGGESTIONS. The books have been appropriately updated, edited, and proofread, and new information has been added. Most of us associate hacking with individuals with a lot of programming abilities and lose morality, and it is too difficult for us to...
CRC Press, 2025. — 199 p. — (The Human Element in Smart and Intelligent Systems). — ISBN 978‑1‑032‑61051‑1. Анализ человеческого фактора 23 кибератаки As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are...
Independently published, 2023-05-05. — 152 р. — ISBN-13: 979-8393656386. "APIs Unlocked: Defending Against Hackers and Threats" is a comprehensive guide to securing APIs in the modern digital landscape. APIs have become an essential component of modern software development, but they are also increasingly targeted by hackers looking to exploit vulnerabilities and gain access to...
2nd Edition. — Apress Media LLC, 2024. — 235 p. — ISBN-13: 979-8-8688-0339-0. Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will...
Apress Media LLC., 2024. — 319 р. — ISBN-13: 979-8-8688-0174-7. There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the...
Packt Publishing, 2021. — 352 p. — ISBN 978-1-83921-293-2. Azure для тестирования на проникновение для этичных хакеров Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches Key Features Understand the different Azure attack techniques and methodologies used by hackers Find out how you can ensure end-to-end cybersecurity...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
Outskirts Press, 2025. — 539 p. — ISBN-13 978-1977256737. The first edition of Cybersecurity Data Protection and Strategies offers a wide range of topics related to data protection strategies. Information Technology (IT) students, practitioners, scholars, management and readers who are seeking deeper insight into cybersecurity strategies will find this text most useful. The...
Independently published, 2021. — 235 p. — ASIN B0936QDBJZ. In the time of network enhancements, cloud-based services are everywhere. Many love the cloud and its ease of access, while others hate it. Despite what feelings you may have about the cloud, it is important to understand how to protect the information you store there. Tens of thousands of cyberattacks happen every day....
John Wiley & Sons, 2019. — 251 p. — ISBN: 978-1-119-61736-5. Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of...
Springer, 2023. — 374 p. This book provides theoretical background and state-of-the-art findings in Artificial Intelligence and cybersecurity for Industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine Learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers...
CRC Press, 2025. — 383 p. — ISBN 103262146X. Artificial Intelligence for Cyber Security and Industry 4.0 offers a comprehensive exploration of the intersection of artificial intelligence (AI) and cyber security, providing readers with a thorough understanding of both the advantages and risks posed by AI technologies in modern industries. Covering a wide array of topics, from...
Springer Cham, 2023. — 301 p. — eBook ISBN 978-3-031-15030-2. This book discusses artificial intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of artificial intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal...
CRC Press, 2020. — 102 p. — ISBN-13: 978-0-367-64278-5. Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals...
Independently published, 2020. — 117 p. Do you know what is hacking? Do you want to learn about cyber security? Are you unaware of mistakes made in cybersecutity? This book is for you! This book teaches cyber security, how to defend themselves and defend against cyber-attacks. This book covers the latest security threats and defense strategies. Cyber security starts with the...
Mercury Learning and Information, 2024. — 234 p. — eBook ISBN 9781501520556. This book explores in detail the AI-driven cyber threat landscape, including inherent AI threats and risks that exist in Large Language Models (LLMs), Generative AI applications, and the AI infrastructure. The book highlights hands-on technical approaches to detect security flaws in AI systems and...
Amazon Digital Services LLC, 2017. — 106 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
2nd Edition. — BCS, The Chartered Institute for IT, 2022. — 333 p. Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of...
Amazon Digital Services LLC, 2017. — 56 p. — ASIN B073S5QV5V. Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest. What does this app do? Well, if you think about the way technology is moving, it does not do much for you but you can use it for chatting with...
Wiley, 2025. — 489 p. — ISBN 9781394289790. Comprehensive forensic reference explaining how file systems function and how forensic tools might work on particular file systemsFile System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. It provides a...
CRC 2020. - 357p. - 9780367346010 Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just...
2nd edition. — Packt Publishing, 2021. — 800 p. — ISBN 978-1-80020-209-2. Get up and running with industrial cybersecurity monitoring with this hands-on book, and explore ICS cybersecurity monitoring tasks, activities, tools, and best practices Key Features Architect, design, and build ICS networks with security in mind Perform a variety of security assessments, checks, and...
Springer, 2023. — 210 p. Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated...
ReferencePoint Press, 2021. — 80 p. As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.Online gamers consider themselves among the most tech-savvy people in the world. Yet many of them have been snared by a game-related online scam....
IGI Global, 2025 — 326 p. — ISBN13 9798369371657. The convergence of quantum artificial intelligence and blockchain technology has the potential to transform industries by enhancing efficiency, security, and decision-making processes. Quantum AI's ability to process vast datasets rapidly allows for optimized blockchain operations, improving transaction validation and enabling...
RAND Corporation, 2001. — 370 p. Networks and Netwars: The Future of Terror, Crime, and Militancy by John Arquilla and David Ronfeldt demonstrates that Netwar―like cyberwar―describes a new spectrum of conflict that is emerging in the wake of the information revolution. What distinguished netwar is the networked organizational structure of its practitioners and their quickness...
Packt Publishing, 2021. — 280 p. — ISBN 978-1-80107-356-1. Get started with cybersecurity and progress with the help of expert tips to get certified, find a job, and more Key Features Learn how to follow your desired career path that results in a well-paid, rewarding job in cybersecurity Explore expert tips relating to career paths and certification options Access informative...
IGI Global, 2022. — 265 p. — ISBN 9781668434505. Межотраслевые применения каркасов кибербезопасности This book examines alternative solutions thoroughly, beginning with an awareness of ICS security advancements in terms of cyber threats, vulnerabilities, assaults and patterns, agents, risks, and the impact of all of these on the industrial environment and the companies that...
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
Packt Publishing, 2021. — 247 p. — ISBN 978-1-80107-620-3. Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition. Key Features Gain an advantage against live hackers in a competition or real computing environment Understand advanced red team...
CRC Press; Taylor & Francis Group; Auerbach Publications, 2019. — 226 p. — ISBN13: 978-1-138-59040-3. Human Dimensions of Cybersecurity explores social science influences on cybersecurity. It demonstrates how social science perspectives can enable the ability to see many hazards in cybersecurity. It emphasizes the need for a multidisciplinary approach, as cybersecurity has...
John Wiley & Sons, Inc., 2024. — 240 р. — ISBN-13: 978-1394254941. Discover how to navigate the intersection of tech, cybersecurity, and commerce In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and...
Cambridge University Press, 2024. — 411 p. The Cyber Predators. Dark Personality and Online Misconduct and Crime by Aaron Cohen is focusing on dark personalities perpetrating cybercrime and deviance. This incredible academic and practical handbook provides valuable awareness of this growing phenomenon. Ever wondered who lurks in the shadows of the internet's vast landscape,...
Palgrave Macmillan, 2023. — 273 p. Critical Security Studies in the Digital Age - Social Media and Security by Joseph Downing demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is...
Syngress, Elsevier, 2013., - 213 p., ISBN: 1597497401 Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of cybercrime is analyzed from the impact of multiple. Written by an exceptional author team, they...
Wiley, 2016. — 120 р. This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems...
Apress, 2019. — 218 p. — ISBN: 978-1-4842-4254-4. Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware...
2nd edition. — Independently published, 2020. — 397 p. — ISBN B08P94H263. This book was written to help protect every person who uses a computer, mobile phone or tablet. Cyber security is not only about protecting governments or companies from spies. It’s so much more, and also so much more persona l. Cyber security is about: - stopping trolls from stealing you or your loved...
IGI Global, 2020. — 645 p. — ISBN 9781799815600ю Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what...
Shaun Kimmons, 2022-07-08. — 90 p. — ISBN-13: 978-3986535384. Protecting yourself and your data against online threats and hacking has never been more critical, and as the saying goes, knowledge is power. The Principles of Cybersecurity and Hacking seeks to equip you with such knowledge and power. Our complete, in-depth reference to the basics, ideas, and techniques of...
Infoblox, 2023. — 192 p. DNS is a foundational element of network communications. It’s also the starting point for countless cyberattacks. Threat actors abuse DNS to install malware, exfiltrate data, and perpetrate malware threats. Cyber threats that leverage DNS are widespread, sophisticated, and rapidly evolving. DNS is used by over 90 percent of malware and in an...
2nd Edition. — Springer Nature, 2024. — 208 p. — ISBN 978-981-99-4943-4. The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has...
Oxford University Press, 2023. — 273 p. — (Bridging The Gap). — ISBN 9780197550922. Динамика эскалации в киберпространстве To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly...
Oxford University Press, 2024. — 385 p. — ISBN 978–0–19–005813–5. Кибербезопасность, этика и коллективная ответственность The advent of the Internet, exponential growth in computing power, and rapid developments in artificial intelligence have raised numerous cybersecurity-related ethical questions in various domains. The dual use character of cybertechnology-that it can be...
John Wiley & Sons, Inc., 2022. — 208 p. — ISBN 978-1119863137. This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to...
Independently published, 2021. — 190 p. — ISBN B08SG67Q53. This book gives the reader an introduction into Artificial Intelligence (AI) and demonstrates its relationship to Cyber Security. Its discusses the past, present and future of how AI impacts Cyber Security and the various systems that use this technology. It evaluates some of the current market leading AI cyber security...
Skyhorse Publishing, 2023. — 240 p. Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime by Hari Ravichandran teaches how we can put our families’ online safety on autopilot and regain our peace of mind. It provides families with the tools and knowledge they need to create a personalized, proactive defense against cybercriminals. From identifying the...
Springer, 2016. — 334 р. — ISBN: 978-3-319-41187-3. This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features...
Packt Publishing, 2020. — 190 p. — ISBN: 978-1-78980-700-4. Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government. Shira Rubinoff’s Cyber Minds brings together the top authorities in cyber security to discuss the emergent threats that face industries,...
Mercury Learning and Information, 2024. — 150 p. — ISBN: 978-1-50152-312-0. Surviving a Cyberattack: Securing Social Media and Protecting Your Home is a roadmap to protecting your homeagainst cybercrime. This comprehensive guide addresses the ever-growing challenges users face from the potential of cybercrime in the technology-connected world. It explores various online risks,...
Springer, 2023. — 244 p. — (Advances in Information Security 103). — ISBN 978-3-031-28149-5. Безопасность и анализ рисков для интеллектуальных граничных вычислений This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this...
3rd Edition. — For Dummies, 2025. 565 p. Get the know-how you need to safeguard your data against cyber attacks. Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security—shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more,...
Packt Publishing, 2017. — 330 p. — ISBN: 978-1787120365. Learn the art of preventing digital extortion and securing confidential data About This Book Get acquainted with multiple cyber extortion attacks and techniques to mitigate them Learn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloud A concise,...
М.: ДМК Пресс, 2020. — 326 с. — ISBN 978-5-97060-709-1. Когда ландшафт угроз постоянно расширяется, возникает необходимость иметь надежную стратегию в области безопасности, т.е. усиление защиты, обнаружения и реагирования. На протяжении этой книги вы будете изучать методы атак и шаблоны, позволяющие распознавать аномальное поведение в вашей организации, используя тактические...
Комментарии