A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves Imagine opening your computer only to find every document and every program locke...Loe edasi...
(Ilmumisaeg: 23-Mar-2026, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394285570)
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway pu...Loe edasi...
(Ilmumisaeg: 09-Mar-2026, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394340866)
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s cyber defenses to meet today’s evolving threat landscape In The AI Cybersecurity Handbook, author Caroline Wong exami...Loe edasi...
As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Based on the original print bestseller, Blue Team Handbook: Incident Response is now available for the fir...Loe edasi...
Ransomware attacks are no longer a question of if—its a matter of when. With hackers increasingly targeting backup and disaster recovery (DR) systems, organizations need more than prevention strategies; they need a battle-tested plan for minimizing...Loe edasi...
(Ilmumisaeg: 25-Dec-2025, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394395385)
Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran of the industry In Lessons From the Frontlines: Insights from a Career in Cybersecurity, a 25+ year veteran of cybers...Loe edasi...
(Ilmumisaeg: 02-Dec-2025, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394361090)
Practical guide to master the hidden, unspoken elements of career success FROM ONE OF THE WORLDS LEADING EXPERTS Greatness Code: The Formula Behind Unstoppable Success offers a practical, step-by-step guide to mastering the intang...Loe edasi...
(Ilmumisaeg: 02-Oct-2025, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394342631)
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In todays data-driven world, protecting personal information has become a critical priority for...Loe edasi...
(Ilmumisaeg: 02-Oct-2025, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394357277)
A compelling, first-hand account of the dark web, from its underground ecosystem, to the people responsible for committing data breaches and leaking data, 21st centurys most consequential data breaches, the responses to those attacks, and the...Loe edasi...
The Certified Ethical Hacker (CEH) exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing exam will either leave you better prepared to be the best cyber security professional you can be. But preparing for the exa...Loe edasi...
(Ilmumisaeg: 08-Jul-2025, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811287565)
Many of the words used to describe disease (infection, transmission, virus) are also used to characterize cyber security (for example: a computer is infected by a virus that can be transmitted to other current uninfected computers). This corr...Loe edasi...
(Ilmumisaeg: 17-Apr-2025, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394349586)
A transformative new approach to Internet security from an experienced industry expert Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet secu...Loe edasi...
(Ilmumisaeg: 17-Feb-2025, Paperback / softback, Kirjastus: De Gruyter, ISBN-13: 9781501523137)
This book describes common threats to your cybersecurity and practical steps you can take to avoid them. Threats explained include weak or reused passwords, malware, viruses, social engineering, outdated software, ransomware, the internet of thin...Loe edasi...
The autonomous supply chain is the attack surface of the next decade. This is the book that defends it. Download the ASCR Blueprint artifacts directly from the book. Deploy them. Customize them. Use them in client engagements. The blueprint is the b...Loe edasi...
(Ilmumisaeg: 05-May-2026, Hardback, Kirjastus: Institution of Engineering and Technology, ISBN-13: 9781807050672)
This book presents information on hardware trojan attacks and their countermeasures, using high level synthesis. It includes an introduction to hardware trojans, various attack strategies, as well as trojan detection and its countermeasures....Loe edasi...
Gain an up-to-date, practical understanding of Microsoft Defender for Endpoint and learn how to run it reliably in real environments with this expert-led practitioners guide. Purchase of the print or Kindle book includes a free PDF eBook ...Loe edasi...
A riveting account of major ransomware attacks and their devastating consequences, revealing how exposed we really are—and how we can protect ourselves Imagine opening your computer only to find every document and every program locke...Loe edasi...
Protect your iOS apps from evolving attacks with a complete, practical toolkit of defensive techniques, cryptographic foundations, and real-world app hardening techniques. Key Features Build a strong iOS security bas...Loe edasi...
Dive deep into Windows Privilege Escalation techniques, gain the knowledge to bypass security barriers, and unlock elevated access while navigating through the administrative controls Key Features Exploit vulnerabilities and co...Loe edasi...
Equip yourself with the knowledge and skills necessary to enhance the security and resilience of your organization against cyber threats Key Features Harness the latest tools and leverage them to determine the root cause of an...Loe edasi...
Build intelligent LLM-powered applications with agentic workflows and tool-based agents.AI-powered applications are rapidly becoming the new normal. Personal productivity assistants, coding agents, smarter search, and automated reporti...Loe edasi...
Learn the workflows professionals use to triage systems, uncover hidden activity, recover deleted evidence, crack encrypted containers, analyze Windows memory, and detect tampering using realistic hands-on forensic datasets. Free with you...Loe edasi...
Design for resilience in a digital world and explore how integrating human factors into cybersecurity reduces errors, fortifies defenses, and aligns protection strategies with authentic human behavior. Key Features Offers frame...Loe edasi...
Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience. Key Features Apply data-driven strategies to protect, detect, and r...Loe edasi...
(Ilmumisaeg: 23-Mar-2026, Hardback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394285570)
An incisive exploration of how cyberattacks are transforming geopolitics Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway pu...Loe edasi...
(Ilmumisaeg: 09-Mar-2026, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394340866)
An up-to-date exploration of how AI is transforming cybersecurity and how to implement AI in your organization’s cyber defenses to meet today’s evolving threat landscape In The AI Cybersecurity Handbook, author Caroline Wong exami...Loe edasi...
As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Based on the original print bestseller, Blue Team Handbook: Incident Response is now available for the fir...Loe edasi...