Springer, 2021. — 180 p. — ISBN 978-3-030-81411-3ю Преобразование CISO: лидерство в области безопасности в условиях высокой угрозы The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they...
Springer, 2017. — 445 p. — ISBN10: 3319685104, 13 978-3319685106. This book, for the first time, provides comprehensive coverage on malicious modification of electronic hardware, also known as, hardware Trojan attacks, highlighting the evolution of the threat, different attack modalities, the challenges, and diverse array of defense approaches. It debunks the myths associated...
Elsevier, 2023. — 356 p. — ISBN 978 0443152306. Функциональная безопасность с нуля: Практическое руководство по применению в обрабатывающей промышленности Functional safety is the task of developing and implementing automatic safety systems used to manage risks in many industries where hazardous processes and machinery are used. Functional Safety from Scratch: A Practical Guide...
Independently published, 2024. — 408 p. — ASIN: B0D3CWVYZC. "Mastering CMMC 2.0: A Comprehensive Guide to Implementing Cybersecurity Maturity in Defense Contracting" is the ultimate resource for IT professionals and organizations seeking to understand and implement the Cybersecurity Maturity Model Certification (CMMC) framework. This book comprehensively explores CMMC 2.0,...
2nd Ed. — Apress, 2016. — 223 p. — ISBN10: 1484214560, 13 978-1484214565. This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience about how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the...
O’Reilly Media, 2020. — 325 p. — ISBN: 978-1-492-05311-8. While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security...
2nd Edition. — O’Reilly Media, Inc., 2023 — 99 p. — (Second Early Release) In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat...
2nd Edition. — Wiley, 2023. — 366 p. — ISBN 9781119892328. Как измерить любые риски кибербезопасности A start-to-finish guide for realistically measuring cybersecurity risk. In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition , a pioneering information security professional and a leader in quantitative analysis methods delivers yet another...
2nd Edition. — Packt, 2022. — 572 p. — ISBN 1803240245, 9781803240244. Learn effective malware analysis tactics to prevent your systems from getting infected Key Features Investigate cyberattacks and prevent malware-related incidents from occurring in the future Learn core concepts of static and dynamic malware analysis, memory forensics, decryption, and much more Get practical...
Packt Publishing Ltd, 2019. — 784 p. — ISBN: 978-1-78961-078-9. Master malware analysis to protect your systems from getting infected With the ever-growing proliferation of technology, the risk of encountering malicious code or malware has also increased. Malware analysis has become one of the most trending topics in businesses in recent years due to multiple prominent...
No Starch Press, 2020. — 196 p. — ISBN13: 978-1-59327-989-9 (ebook). A hands-on guide to improving an organization's computer security and developing scanning tools on a budget. Practical Vulnerability Management discusses the components of a vulnerability management program and shows the reader how to build a free or low-cost system to automatically handle the repetitive...
Manning Publications, 2024. — 334 p. — ISBN 978-1633438262. When you launch an application on the web, every hacker in the world has access to it. Are you sure your web apps can stand up to the most sophisticated attacks? Trying to teach yourself about web security from the internet can feel like walking into a huge disorganized library—one where you can never find what you...
Packt Publishing, 2021. — 398 p. — ISBN 9781838556372. Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat hunting Carry out atomic hunts to start the threat hunting process and...
Springer International Publishing, 2021. — 164 p. This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...
John Wiley & Sons, 2022. — 792 p. — ISBN 9781119782490. In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos “Rock” Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They...
Apress, 2019. — 177 p. — ISBN13: (electronic): 978-1-4842-5391-5. Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how...
2nd Edition. — BCS, The Chartered Institute for IT, 2021. — 240 р. Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the...
It Governance Ltd, 2016. — 94 p. — ISBN10: 1849288151. — ISBN13: 978-1849288156 This book will be particularly useful for anyone involved in the audit of information security and risk in all organizations that have related issues and concerns. It provides practical approaches to address information risk auditing, even for those with limited technical knowledge. This approach...
4-е изд., перераб. и доп. — СПб.: Страта, 2020. — 224 с. — (Просто). — ISBN 978-5-907314-12-2. Время энтузиастов-одиночек, создававших компьютерные вирусы на заре информационной эпохи, давно прошло: в наши дни разработкой и распространением вредоносных программ занимаются хорошо организованные преступные группировки, имеющие жесткую иерархию и напоминающие по своей структуре...
Комментарии