Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Go on a journey through the threat detection engineering lifecycle while enriching your skill set and protecting your organizationKey Features:- Gain a comprehensive understanding of threat validation- Leverage open-source tools to test security detections- Harness open-source content to supplement detection and testingBook Description:Threat validation is an indispensable component of every security detection program, ensuring a healthy detection pipeline. This comprehensive detection engineering guide will serve as an introduction for those who are new to detection validation, providing valuable guidelines to swiftly bring you up to speed.The book will show you how to apply the supplied frameworks to assess, test, and validate your detection program. It covers the entire life cycle of a detection, from creation to validation, with the help of real-world examples. Featuring hands-on tutorials and projects, this guide will enable you to confidently validate the detections in your security program. This book serves as your guide to building a career in detection engineering, highlighting the essential skills and knowledge vital for detection engineers in today's landscape.By the end of this book, you'll have developed the skills necessary to test your security detection program and strengthen your organization's security measures.What You Will Learn:- Understand the detection engineering process- Build a detection engineering test lab- Learn how to maintain detections as code- Understand how threat intelligence can be used to drive detection development- Prove the effectiveness of detection capabilities to business leadership- Learn how to limit attackers' ability to inflict damage by detecting any malicious activity earlyWho this book is for:This book is for security analysts and engineers seeking to improve their organization's security posture by mastering the detection engineering lifecycle.To get started with this book, you'll need a basic understanding of cybersecurity concepts, along with some experience with detection and alert capabilities.Table of Contents- Fundamentals of Detection Engineering- The Detection Engineering Life Cycle- Building a Detection Engineering Test Lab- Detection Data Sources- Investigating Detection Requirements- Developing Detections Using Indicators of Compromise- Developing Detections Using Behavioral Indicators- Documentation and Detection Pipelines- Detection Validation- Leveraging Threat Intelligence- Performance Management- Career Guidance for Detection Engineers
This book covers cybersecurity, privacy and control methods and technologies integrated with blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and video monitoring.
This contributed volume tells the story of the establishment of a cybersecurity awareness framework for organizations, and how it was piloted in two public sector municipal contexts. It presents a clear picture of cybersecurity issues in municipalities and proposes a socio-technical solution for creating cybersecurity awareness, how to build the solution and what the impact is on the municipal contexts. The 9 chapters for this book also provide information regarding the design, the deployment and the evaluation of the technology.This book builds on the success of the European Horizon 2020 research and innovation project CS-AWARE. The research proposes the first cybersecurity situational awareness solution for local public administrations based on an analysis of the context, provides automatic incident detection and visualization, and enables information exchange with relevant national and EU level authorities involved in legislation and network security.Cybersecurity is one of the most challenging security problems for commercial companies, NGOs, governmental institutions as well as individuals. Reaching beyond the technology focused boundaries of classical information technology (IT) security, cybersecurity includes organizational and behavioral aspects of IT systems and that needs to comply to legal and regulatory framework for cybersecurity. While large corporations might have the resources to follow those developments and bring their IT infrastructure and services in line with the requirements, the burden for smaller organizations like local public administrations will be substantial and the required resources might not be available. New and innovative solutions that would help local public administration to ease the burden of being in line with cybersecurity requirements are needed.This book targets researchers working in cybersecurity, computer scientists, social scientists and advanced level students studying computer science and other related disciplines. Cybersecurity professionals as well as professionals working in local government contexts, including policy makers, communication experts and system administrators will also benefit from this book.
Moderne Kraftfahrzeuge fahren heute schon in weiten Teilen automatisiert und vernetzt auf deutschen Straßen. Dabei sammeln und verarbeiten sie immer mehr personenbezogene Daten. Im Mittelpunkt dieser Arbeit steht die Frage, ob und wie die datenschutzrechtlichen Anforderungen der Europäischen Datenschutzgrundverordnung mit ihrem technologieneutralen Ansatz sinnvoll auf die in vernetzten und automatisierten Kfz stattfindenden Datenverarbeitungen angewendet werden können. Der Fokus wurde hierbei auf die Daten solcher Personen gelegt, die nicht mit den datenschutzrechtlich Verantwortlichen in einem direkten Näheverhältnis stehen, sog. Drittbetroffene.
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease.Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing. It includes the Internet of Things related areas, such as smart cities, blockchain, mobile networks, federated learning, cryptography and cybersecurity.This book is one of the first reference books covering security and risk analysis in Edge Computing Systems. Researchers and advanced-level students studying or working in Edge Computing and related security fields will find this book useful as a reference. Decision makers, managers and professionals working within these fields will want to purchase this book as well.
Discover how different QRadar components fit together and explore its features and implementations based on your platform and environmentPurchase of the print or Kindle book includes a free PDF eBookKey Features:Get to grips with QRadar architecture, components, features, and deploymentsUtilize IBM QRadar SIEM to respond to network threats in real timeLearn how to integrate AI into threat management by using QRadar with WatsonBook Description:This comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time.The book begins with a quick introduction to QRadar components and architecture, teaching you the different ways of deploying QRadar. You'll grasp the importance of being aware of the major and minor upgrades in software and learn how to scale, upgrade, and maintain QRadar. Once you gain a detailed understanding of QRadar and how its environment is built, the chapters will take you through the features and how they can be tailored to meet specifi c business requirements. You'll also explore events, flows, and searches with the help of examples. As you advance, you'll familiarize yourself with predefined QRadar applications and extensions that successfully mine data and find out how to integrate AI in threat management with confidence. Toward the end of this book, you'll create different types of apps in QRadar, troubleshoot and maintain them, and recognize the current security challenges and address them through QRadar XDR.By the end of this book, you'll be able to apply IBM QRadar SOC's prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise.What You Will Learn:Discover how to effectively use QRadar for threat managementUnderstand the functionality of different QRadar componentsFind out how QRadar is deployed on bare metal, cloud solutions, and VMsProactively keep up with software upgrades for QRadarUnderstand how to ingest and analyze data and then correlate it in QRadarExplore various searches, and learn how to tune and optimize themSee how to maintain and troubleshoot the QRadar environment with easeWho this book is for:This book is for security professionals, SOC analysts, security engineers, and any cybersecurity individual looking at enhancing their SOC and SIEM skills and interested in using IBM QRadar to investigate incidents in their environment to provide necessary security analytics to responsible teams. Basic experience with networking tools and knowledge about cybersecurity threats is necessary to grasp the concepts present in this book.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality. This book showcases examples of blockchain-based solutions implemented in different industries and connects them to use cases in hospitality and tourism (disintermediation, payments, loyalty programs, supply chain management, identity management etc.). Blockchain is one of the disruptive technologies that lays foundations for Web3.0, NFTs, Metaverse and other innovations. Despite many benefits, its adoption in the hospitality industry is very slow. Lack of awareness and connection to clear return-on-investment, coupled with many misconceptions and general perception of complexity is one of the main reasons why hospitality managers are reluctant to embark on the blockchain train.Blockchain for Hospitality and Tourism serves as a practical guide to the world of innovations, from the basics of blockchain to ¿how to start a project¿ with brief explanations of different technologies and capabilities. You'll review NFTs and Metaverse, along with current developments, tools, and platforms. After reading this book, you'll be equipped with enough knowledge to make strategic business decisions and able to discuss these topics within your organization and with vendors and suppliers in a comfortable way. As blockchain enters the next phase of its evolution, with more user-friendly interfaces and interoperability, see how it opens a world of opportunities in the space of tourism and hospitality. What You'll LearnBlockchain-based innovations ¿ cryptocurrencies and digital asset management, NFTs, Web3.0, Metaverse)Review applications of blockchain in selected industries Start a blockchain project Who This Book is ForHospitality professionals, including hotel managers and general managers, revenue management directors, operations directors, hotel IT managers, asset managers, brand strategy managers, marketing managers. Hospitality students will benefit as well. ·
"Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider."--
"A sweeping exposâe of the U.S. government's alliance with data brokers, tech companies, and advertisers, and how their efforts are reshaping surveillance and privacy as we know it. Our modern world is awash in surveillance. Most of us are dimly aware of this-ever get the sense that an ad is "following" you around the internet?-but we don't understand the extent to which the technology embedded in our phones, computers, cars, and homes is part of a vast ecosystem of data collection. Our public spaces are blanketed by cameras put up in the name of security. And pretty much everything that emits a wireless signal of any kind-routers, televisions, Bluetooth devices, chip-enabled credit cards, even the tires of every car manufactured since the mid-2000s-can be and often is covertly monitored. All of this surveillance has produced an extraordinary amount of data about every citizen-and the biggest customer is the U.S. government. Reporter Byron Tau has been digging deep inside the growing alliance between business, tech, and government for years, piecing together a secret story: how the whole of the internet and every digital device in the world have become a mechanism of intelligence, surveillance, and monitoring. Tau traces the unlikely tale of how the government came to view commercial data as a principal asset of national security in the years after 9/11, working with scores of anonymous companies, many scattered across bland Northern Virginia suburbs, to build a foreign and domestic surveillance capacity of such breathtaking scope that it could peer into the lives of nearly everyone on the planet. The result is a cottage industry of data brokers and government bureaucrats with one directive-"get everything you can"-and, as Tau observes, a darkly humorous world in which defense contractors have marketing subsidiaries, and marketing companies have defense contractor subsidiaries. Sobering and revelatory, Means of Control is our era's defining story of the dangerous grand bargain we've made: ubiquitous, often cheap technology, but at what price to our privacy?"--
The modern web is inherently global-and if we want to design successfully for it, we must be ready to meet the needs, perspectives, and expectations of multifaceted, multicultural audiences.With utmost timeliness, Senongo Akpem shares a clear and accessible methodology for designing across cultures: from performing socially conscious research, to building culturally responsive experiences, to developing meaningful internationalization and localization approaches. Expand your craft, and your mindset-and start creating a richer experience for everyone on the web, regardless of location, language, or identity.
We humans are messy, illogical creatures who like to imagine we're in control-but we blithely let our biases lead us astray. In Design for Cognitive Bias, David Dylan Thomas lays bare the irrational forces that shape our everyday decisions and, inevitably, inform the experiences we craft. Once we grasp the logic powering these forces, we stand a fighting chance of confronting them, tempering them, and even harnessing them for good. Come along on a whirlwind tour of the cognitive biases that encroach on our lives and our work, and learn to start designing more consciously.¿¿THIS BOOK EXPLORES:Why our brains take shortcuts-and why that matters in our workHow bias influences everything from user behavior to stakeholder decision-making to team dynamicsTechniques for noticing your own biases, and using them for good where you canMaking more humane and conscientious products and experiences
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, onlinefraud, etc.This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.
Millions of people each year find out the hard way that prepping is a necessary part of life. It can be overwhelming if you want to prep but are strapped for cash. Fortunately, there are still ways to make it work. This book goes into the origins of prepping, the science behind prepping, how to create a bug out bag for when SHTF, prepping on a budget, the pros and cons of prepping. By investing in this book, you can get a grasp of how to properly prep so that you are able to take care of you and your loved ones when they need it the most.Here's some of what you will learn in this easy to read guide:What being a prepper is all aboutEverything you need to know before becoming a prepperEssential prepping skillsAll about homesteadingHow to use natural resourcesWhat to expect when the SHTFWhat to put in your bug-out bagWhat food, medical, and other supplies you should be stockpiling...and much, much more!Now, you can survive the worst of conditions by creating a nurturing environment without the need of electricity. Come up with your own alternative source of energy and keep your house warm to survive a long winter without any central heating. Take care of your family and friends by implementing these thoughtful suggestions and never let a blackout cause a significant damage to your life.
Explore various digital forensics methodologies and frameworks and manage your cyber incidents effectivelyPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain red, blue, and purple team tool insights and understand their link with digital forensicsPerform DFIR investigation and get familiarized with Autopsy 4Explore network discovery and forensics tools such as Nmap, Wireshark, Xplico, and ShodanBook Description:Kali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. This third edition is updated with real-world examples and detailed labs to help you take your investigation skills to the next level using powerful tools.This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, memory, and operating systems.By the end of this digital forensics book, you'll have gained hands-on experience in implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation - all using Kali Linux's cutting-edge tools.What You Will Learn:Install Kali Linux on Raspberry Pi 4 and various other platformsRun Windows applications in Kali Linux using Windows Emulator as WineRecognize the importance of RAM, file systems, data, and cache in DFIRPerform file recovery, data carving, and extraction using Magic RescueGet to grips with the latest Volatility 3 framework and analyze the memory dumpExplore the various ransomware types and discover artifacts for DFIR investigationPerform full DFIR automated analysis with Autopsy 4Become familiar with network forensic analysis tools (NFATs)Who this book is for:This book is for students, forensic analysts, digital forensics investigators and incident responders, security analysts and administrators, penetration testers, or anyone interested in enhancing their forensics abilities using the latest version of Kali Linux along with powerful automated analysis tools. Basic knowledge of operating systems, computer components, and installation processes will help you gain a better understanding of the concepts covered.
Secure your business in a post-pandemic world: Master digital risk identification and defensePurchase of the print or Kindle book includes a free PDF eBookKey Features:Become well-versed with sophisticated system-level security risks and the zero-trust frameworkLearn about remote working risks, modern collaboration, and securing the digital data estateKeep up with rapidly evolving compliances and regulations and their impact on cyber risksBook Description:With the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet.This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof.In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed.What You Will Learn:Become aware of and adopt the right approach to modern digital transformationExplore digital risks across companies of all sizesStudy real-world cases that focus on post-pandemic digital transformationUnderstand insider threats and how to mitigate vulnerability exploitationGet to know how cyberwarfare targets infrastructure and disrupts critical systemsDiscover how implementing a regulatory framework can safeguard you in the current and future data landscapesWho this book is for:This book is for three categories of readers-those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area.Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.
This volume provides the basis for contemporary privacy and social media research and informs global as well as local initiatives to address issues related to social media privacy through research, policymaking, and education.Renowned scholars in the fields of communication, psychology, philosophy, informatics, and law look back on the last decade of privacy research and project how the topic will develop in the next decade. The text begins with an overview of key scholarship in online privacy, expands to focus on influential factors shaping privacy perceptions and behaviors - such as culture, gender, and trust - and continues with specific examinations of concerns around vulnerable populations such as children and older adults. It then looks at how privacy is managed and the implications of interacting with artificial intelligence, concluding by discussing feasible solutions to some of the more pressing questions surrounding online privacy.This handbook will be a valuable resource for advanced students, scholars, and policymakers in the fields of communication studies, digital media studies, psychology, and computer science.
This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).
Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced preventionPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand how malware evades modern security productsLearn to reverse engineer standard PE format program filesBecome familiar with modern attack techniques used by multiple red teamsBook Description:An Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive information. Preventing APTs requires a strong foundation of basic security techniques combined with effective security monitoring. This book will help you gain a red team perspective on exploiting system design and master techniques to prevent APT attacks. Once you've understood the internal design of operating systems, you'll be ready to get hands-on with red team attacks and, further, learn how to create and compile C source code into an EXE program file. Throughout this book, you'll explore the inner workings of how Windows systems run and how attackers abuse this knowledge to bypass antivirus products and protection.As you advance, you'll cover practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packers, UAC bypass, path parser vulnerabilities, and digital signature forgery, gaining expertise in keeping your system safe from this kind of malware.By the end of this book, you'll be well equipped to implement the red team techniques that you've learned on a victim's computer environment, attempting to bypass security and antivirus products, to test its defense against Windows APT attacks.What You Will Learn:Explore various DLL injection techniques for setting API hooksUnderstand how to run an arbitrary program file in memoryBecome familiar with malware obfuscation techniques to evade antivirus detectionDiscover how malware circumvents current security measures and toolsUse Microsoft Authenticode to sign your code to avoid tamperingExplore various strategies to bypass UAC design for privilege escalationWho this book is for:This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. A basic understanding of reverse engineering and C/C++ will be helpful.
Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and auditsKey Features:Get started as a cybersecurity executive and design an infallible security programPerform assessments and build a strong risk management frameworkPromote the importance of security within the organization through awareness and training sessionsBook Description:Ransomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your organization and be prepared for potential cyberattacks. This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks.This Executive's Cybersecurity Program Handbook explains the importance of executive buy-in, mission, and vision statement of the main pillars of security program (governance, defence, people and innovation). You'll explore the different types of cybersecurity frameworks, how they differ from one another, and how to pick the right framework to minimize cyber risk. As you advance, you'll perform an assessment against the NIST Cybersecurity Framework, which will help you evaluate threats to your organization by identifying both internal and external vulnerabilities. Toward the end, you'll learn the importance of standard cybersecurity policies, along with concepts of governance, risk, and compliance, and become well-equipped to build an effective incident response team.By the end of this book, you'll have gained a thorough understanding of how to build your security program from scratch as well as the importance of implementing administrative and technical security controls.What You Will Learn:Explore various cybersecurity frameworks such as NIST and ISOImplement industry-standard cybersecurity policies and procedures effectively to minimize the risk of cyberattacksFind out how to hire the right talent for building a sound cybersecurity team structureUnderstand the difference between security awareness and trainingExplore the zero-trust concept and various firewalls to secure your environmentHarden your operating system and server to enhance the securityPerform scans to detect vulnerabilities in softwareWho this book is for:This book is for you if you are a newly appointed security team manager, director, or C-suite executive who is in the transition stage or new to the information security field and willing to empower yourself with the required knowledge. As a Cybersecurity professional, you can use this book to deepen your knowledge and understand your organization's overall security posture. Basic knowledge of information security or governance, risk, and compliance is required.
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threatsPurchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesProtect your organization from cybersecurity threats with field-tested strategiesUnderstand threats such as exploits, malware, internet-based threats, and governmentsMeasure the effectiveness of your organization's current cybersecurity program against modern attackers' tacticsBook DescriptionTim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you'll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You'll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.What you will learnDiscover enterprise cybersecurity strategies and the ingredients critical to their successImprove vulnerability management by reducing risks and costs for your organizationMitigate internet-based threats such as drive-by download attacks and malware distribution sitesLearn the roles that governments play in cybersecurity and how to mitigate government access to dataWeigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and othersImplement and then measure the outcome of a cybersecurity strategyDiscover how the cloud can provide better security and compliance capabilities than on-premises IT environmentsWho this book is forThis book is for anyone who is looking to implement or improve their organization's cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.Table of ContentsIntroductionWhat to Know About Threat IntelligenceUsing Vulnerability Trends to Reduce Risk and CostsThe Evolution of MalwareInternet-Based ThreatsThe Roles Governments Play in CybersecurityGovernment access to dataIngredients for a Successful Cybersecurity StrategyCybersecurity StrategiesStrategy ImplementationMeasuring Performance and EffectivenessModern Approaches to Security and Compliance
The perfect introduction to the principles of information security management and ISO 27001:2022.
This book takes a holistic view of the roles of ICTs during the pandemic through the lens of social informatics, as it is critical to our understanding of the relations between society and technology.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.