Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This …
This book—a sequel to Moschovitis’ well-received Cybersecurity Program Development for Business—explains which regulations apply in which regions, how they relate to the end goal of privacy, and how to build privacy into both new and existing cybersecurity programs. Keeping up with swiftly changing technology and business landscapes is no easy task. Moschovitis provides down-to-earth, act…
Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument…
Table of contents Copyright About the Author Acknowledgments We Want to Hear from You! Reader Services Introduction Intrusion Detection Primer IDSs Come in Different Flavors Methods of Detecting Intrusions Origin of Attacks Orchestrating an Attack The IDS Reality Summary Network Intrusion Detection with Snort Snort's Specifications Detecting Suspicious Traffic via Signat…
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphe…
A comprehensive guide designed to prepare any application security tester for participation in bug bounty programs. Beginning with a thorough overview of how to get started in the bug bounty industry, the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding with in-depth techniques for the experienced hacker. Bug Bounty Bootcamp teaches you how …
With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by d…
Table of contents: Ch. 1. Introduction to IPv6 Security Ch. 2. IPv6 Protocol Security Vulnerabilities Ch. 3. IPv6 Internet Security Ch. 4. IPv6 Perimeter Security Ch. 5. Local Network Security Ch. 6. Hardening IPv6 Network Devices Ch. 7. Server and Host Security Ch. 8. IPsec and SSL Virtual Private Networks Ch. 9. Security for IPv6 Mobility Ch. 10. Securing the Transition Mechanisms…
Termasuk bibliografi dan indeks. CONTENTS: 1. Risk 2. Vulnerability and Threat Identification 3. Risk Measurement 4. Quantifying and Prioritizing Loss Potential 5. Cost/Benefit Analysis 6. Other Risk Analysis Methodologies 7. The Security Survey 8. Management Audit Techniques and the Preliminary Survey 9. The Survey Report 10. Crime…
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new …