Cybersecurity in humanities and social sciences :, Hugo Loiseau, Daniel Ventre , Hartmut Aden
Автор: Bogachev Yuri a. Название: Cybersecurity For Beginners: Discover the Trade`s Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism ISBN: 3907269578 ISBN-13(EAN): 9783907269572 Издательство: Неизвестно Рейтинг: Цена: 12870.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book will help you to become more vigilant and protective of your devices and networks even if you`re an absolute beginner in the world of digital security. Learn how cybercriminals operate, which secret methods they use, what they look for in vulnerabilities, and learn how to avoid being their next victim.
Автор: Meeuwisse Raef Название: Cybersecurity Exposed: The Cyber House Rules ISBN: 1911452193 ISBN-13(EAN): 9781911452195 Издательство: Неизвестно Цена: 30640.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Iv?n Palomares Carrascosa; Harsha Kumara Kalutarag Название: Data Analytics and Decision Support for Cybersecurity ISBN: 3319594389 ISBN-13(EAN): 9783319594385 Издательство: Springer Рейтинг: Цена: 111790.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
The book illustrates the inter-relationship between several data management, analytics and decision support techniques and methods commonly adopted in Cybersecurity-oriented frameworks. The recent advent of Big Data paradigms and the use of data science methods, has resulted in a higher demand for effective data-driven models that support decision-making at a strategic level. This motivates the need for defining novel data analytics and decision support approaches in a myriad of real-life scenarios and problems, with Cybersecurity-related domains being no exception.
This contributed volume comprises nine chapters, written by leading international researchers, covering a compilation of recent advances in Cybersecurity-related applications of data analytics and decision support approaches. In addition to theoretical studies and overviews of existing relevant literature, this book comprises a selection of application-oriented research contributions. The investigations undertaken across these chapters focus on diverse and critical Cybersecurity problems, such as Intrusion Detection, Insider Threats, Insider Threats, Collusion Detection, Run-Time Malware Detection, Intrusion Detection, E-Learning, Online Examinations, Cybersecurity noisy data removal, Secure Smart Power Systems, Security Visualization and Monitoring.
Researchers and professionals alike will find the chapters an essential read for further research on the topic.
Автор: Qing Li, Gregory S Clark, Hugh Thompson, Jon DiMag Название: Decoding Cybersecurity: A Rosetta Stone for C(I)SOs, Analysts and Developers ISBN: 1119512891 ISBN-13(EAN): 9781119512899 Издательство: Wiley Рейтинг: Цена: 50160.00 T Наличие на складе: Невозможна поставка. Описание: The effective and proven techniques presented in this book combine a multi-layer defense-in-depth approach to cybersecurity. It illustrates how various technologies and algorithms are applied in practice to build real-world security solutions and it explains how these solutions fit into the different bands of the security spectrum, together, form a comprehensive layered defense. This layered defense includes:
Next generation endpoint techniques
Virtualization and isolation
Browser protection
Network protection
Integrating endpoint and network protection
Gathering and analyzing security data in a data lake
User behavior analysis
Cloud security
The security horizon with blockchain and quantum computing
Автор: Jeff Kosseff Название: Cybersecurity Law ISBN: 1119517206 ISBN-13(EAN): 9781119517207 Издательство: Wiley Рейтинг: Цена: 96090.00 T Наличие на складе: Невозможна поставка. Описание:
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments
The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation.
Topics covered reflect new laws, regulations, and court decisions that address financial sector cybersecurity, the law of war as applied to cyberspace, and recently updated guidance for public companies' disclosure of cybersecurity risks. This important guide:
Provides a new appendix, with 15 edited opinions covering a wide range of cybersecurity-related topics, for students learning via the caselaw method
Includes new sections that cover topics such as: compelled access to encrypted devices, New York's financial services cybersecurity regulations, South Carolina's insurance sector cybersecurity law, the Internet of Things, bug bounty programs, the vulnerability equities process, international enforcement of computer hacking laws, the California Consumer Privacy Act, and the European Union's Network and Information Security Directive
Contains a new chapter on the critical topic of law of cyberwar
Presents a comprehensive guide written by a noted expert on the topic
Offers a companion Instructor-only website that features discussion questions for each chapter and suggested exam questions for each chapter
Written for students and professionals of cybersecurity, cyber operations, management-oriented information technology (IT), and computer science, Cybersecurity Law, Second Edition is the up-to-date guide that covers the basic principles and the most recent information on cybersecurity laws and regulations.
JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He was a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
Автор: Robinson E. Pino Название: Network Science and Cybersecurity ISBN: 1489990658 ISBN-13(EAN): 9781489990655 Издательство: Springer Рейтинг: Цена: 88500.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.
Автор: Scott Donaldson; Stanley Siegel; Chris Williams; A Название: Enterprise Cybersecurity Study Guide ISBN: 1484232577 ISBN-13(EAN): 9781484232576 Издательство: Springer Рейтинг: Цена: 41920.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание:
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The guide can be used for self-study or in the classroom.
Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum--what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit--gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.
Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.
People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.
What You'll Learn
Know the methodology of targeted attacks and why they succeed
Master the cybersecurity risk management process
Understand why cybersecurity capabilities are the foundation of effective cyberdefenses
Organize a cybersecurity program's policy, people, budget, technology, and assessment
Assess and score a cybersecurity program
Report cybersecurity program status against compliance and regulatory frameworks
Use the operational processes and supporting information systems of a successful cybersecurity program
Create a data-driven and objectively managed cybersecurity program
Discover how cybersecurity is evolving and will continue to evolve over the next decade
Who This Book Is For
Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.
Blue Team defensive advice from the biggest names in cybersecurity
The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity.
Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.
Discover what it takes to get started building blue team skills
Learn how you can defend against physical and technical penetration testing
Understand the techniques that advanced red teamers use against high-value targets
Identify the most important tools to master as a blue teamer
Explore ways to harden systems against red team attacks
Stand out from the competition as you work to advance your cybersecurity career
Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.
Tribal Knowledge from the Best in Cybersecurity Leadership
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.
Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:
What's the most important decision you've made or action you've taken to enable a business risk?
How do you lead your team to execute and get results?
Do you have a workforce philosophy or unique approach to talent acquisition?
Have you created a cohesive strategy for your information security program or business unit?
Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.
The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more
Learn what it takes to secure a Red Team job and to stand out from other candidates
Discover how to hone your hacking skills while staying on the right side of the law
Get tips for collaborating on documentation and reporting
Explore ways to garner support from leadership on your security proposals
Identify the most important control to prevent compromising your network
Uncover the latest tools for Red Team offensive security
Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product.
Looking for real-world advice from leading cybersecurity experts? You've found your tribe.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.
Get the scoop on the biggest cybersecurity myths and misconceptions about security
Learn what qualities and credentials you need to advance in the cybersecurity field
Uncover which life hacks are worth your while
Understand how social media and the Internet of Things has changed cybersecurity
Discover what it takes to make the move from the corporate world to your own cybersecurity venture
Find your favorite hackers online and continue the conversation
Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.
Автор: Moller Dietmar P. F., Haas Roland E. Название: Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications ISBN: 331973511X ISBN-13(EAN): 9783319735115 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity.Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter.The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz