Ochrona danych osobowych
David J. Gee
As cyber threats become more complex, effective cybersecurity leadership calls for more than technical expertise; it requires strategic thinking, resilient leadership, and deft communication skills. A Day in the Life of a CISO brings together candid insights from some of the world’s most accomplished CISOs and cybersecurity executives.With invaluable guidance on managing emerging threats, balancing risk and business needs, leading through crisis, and building elite security teams, this book is a practical, real-world guide for professionals looking to elevate their cybersecurity careers or transition into leadership roles. You’ll benefit from the collective wisdom and hard-earned experiences of 29 contributors representing leading organizations worldwide, and learn how to craft cyber strategies, manage vulnerabilities, lead transformations, and develop long-lasting careers in cybersecurity.Whether you are an aspiring CISO, a current security leader, or a business executive seeking a deeper understanding of cybersecurity leadership, this book offers you the knowledge and inspiration to thrive in an increasingly challenging digital world.*Email sign-up and proof of purchase required
Gianluca Tiepolo, Dan Sorensen
Modern adversaries rely on stealth, living-off-the-land techniques, and zero-day exploitation to evade traditional security controls. This practical guide shows experienced defenders how to move beyond reactive alerts and build a proactive threat hunting capability driven by cyber threat intelligence.Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You’ll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise.Through hands-on exercises, you’ll apply behavioral analytics, detection engineering, and machine learning–based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration.By the end of this book, you’ll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.
Anom. Największa operacja FBI przeciwko światowej przestępczości
Joseph Cox
Reportaż śledczy obrawurowej akcji przeciwko zorganizowanej przestępczości Prace nad nienamierzalnym, całkowicie anonimowym systemem komunikacji to podziemny wyścig zbrojeń: kolejne start-upy od lat oferowały środowiskom przestępczym coraz lepsze oprogramowania, a służby infiltrowały je i niszczyły, jednak pozyskane informacje były zwykle szczątkowe, a aresztowania nieliczne. Do czasu. W 2018 roku FBI wpadło na zuchwały pomysł: a co, gdyby przygotować takie oprogramowanie samodzielnie i podsunąć przestępcom, by zaczęli z niego masowo korzystać? Tak powstał Anom aplikacja do szyfrowanej komunikacji, umożliwiająca pozornie bezpieczną wymianę informacji. Wpuszczono ją na czarny rynek. Rezultat przerósł najśmielsze oczekiwania. Anom stał się głównym kanałem komunikacji mafii na całym świecie. Skusili się na niego handlarze ludźmi, narkotykami i przemytnicy najbardziej poszukiwani kryminaliści, zupełnie nieświadomi, że wpadli w pułapkę. Zaangażowane w projekt służby z USA, Europy, Kanady i Australii korzystały z pozyskiwanych materiałów ostrożnie chodziło o to, aby uzyskać możliwie dużo informacji o funkcjonowaniu całego systemu. Operację ujawniono dopiero w2022 roku. Aresztowano ponad osiemset osób, przechwycono osiem ton kokainy, dwadzieścia dwie tony marihuany i haszyszu, dwie tony metamfetaminy i ponad czterdzieści osiem milionów dolarów. Joseph Cox stworzył pasjonujący reportaż o jednej z najbardziej spektakularnych prowokacji w historii, ale i o tym, co można zdziałać, gdy połączone siły międzynarodowe obiorą wspólny cel. Książka Josepha Coxa natychmiast weszła do kanonu true crime. Ta opowieść o największej w historii tajnej operacji, spisana przez człowieka, który poznał ją od wewnątrz, ukazuje fascynujący obraz nie tylko najnowocześniejszych technologii, lecz także metod działania przestępczości zorganizowanej w XXI wieku. Strony zaludniają gangsterzy i przemytnicy barwniejsi od postaci z filmów. To połączenie Miami Vice, Włamywaczy i Oceans Eleven. Będziecie ją czytać, szeroko otwierając oczy ze zdumienia. Garrett Graff Zapierająca dech w piersiach, wciągająca lektura, która wprawiła mnie w autentyczne przerażenie. Historia monitorowanej przez FBI aplikacji szyfrującej, wgrywanej na specjalnie zmodyfikowane telefony, zmrozi krew każdemu, komu leżą na sercu takie wartości jak prywatność i wolność. Julia Angwin Gęsta, głęboka, pięknie opowiedziana historia, świetnie nadawałaby się na technothriller gdyby nie fakt, że jest prawdziwa. Cory Doctorow Cox wykonał imponujący kawał reporterskiej roboty. Zabiera czytelnika tam, gdzie kryminaliści planują i organizują najbardziej zuchwałe przestępstwa, i tam, gdzie agenci FBI śledzą te działania. Książka porównywalna z serialem Prawo ulicy, ale bardziej prawdziwa, mroczniejsza, brutalniejsza. Andy Greenberg Jeden z najlepszych thrillerów z gatunku true crime, jaki czytałem w ostatnich latach. Opowieść z szalonymi postaciami i odjechaną fabułą. Bradley Hope
Confidence Staveley, Christopher Romeo
APIs have evolved into an essential part of modern applications, making them an attractive target for cybercriminals. Written by a multi-award-winning cybersecurity leader , this comprehensive guide offers practical insights into testing APIs, identifying vulnerabilities, and fixing them.With a focus on hands-on learning, this book guides you through securing your APIs in a step-by-step manner. You'll learn how to bypass authentication controls, circumvent authorization controls, and identify vulnerabilities in APIs using open-source and commercial tools. Moreover, you'll gain the skills you need to write comprehensive vulnerability reports and recommend and implement effective mitigation strategies to address the identified vulnerabilities. This book isn't just about hacking APIs; it's also about understanding how to defend them. You'll explore various API security management strategies and understand how to use them to safeguard APIs against emerging threats.By the end of this book, you'll have a profound understanding of API security and how to defend against the latest threats. Whether you're a developer, security professional, or ethical hacker, this book will ensure that your APIs are secure and your organization's data is protected.
Clint Bodungen, Aaron Crow
Are you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape.ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency.By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.
Hemang Doshi, Javen Khoo Ai Wee
Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.
Mark McGinley
Ace the globally recognized CompTIA Security+ SY0-701 certification exam by validating your expertise in essential cybersecurity concepts and practices through rigorously designed practice tests. Covering all the concepts tested in the CompTIA Security+ SY0-701 exam, this exam guide will help you evaluate your proficiency across five core security domains: general security concepts, threats and vulnerabilities with mitigations, security architecture, security operations, and program management.More than just another study guide, this book is a strategic preparation tool that focuses on assessing your retention of the material and evaluating your exam readiness rather than teaching theory. Packed with hundreds of expertly crafted questions, it mirrors the actual exam’s difficulty level and offers more than knowledge—you’ll develop the confidence and strategic thinking needed to excel on test day. To address the gaps in your knowledge, each question is paired with descriptive answers and in-depth explanations, transforming potential mistakes into powerful learning moments.By the end of this book, you’ll be primed to approach the CompTIA Security+ SY0-701 exam with the skills and expertise needed to succeed.
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
IT Governance Publishing, Alan Calder
In today’s rapidly evolving digital landscape, cybersecurity is essential for protecting organizations from cyber threats. This book provides a thorough guide to building cyber resilience, starting with an in-depth understanding of the ever-changing cyber threat landscape. It covers foundational principles such as risk management, security controls, and defense-in-depth strategies, giving readers the knowledge needed to secure digital systems effectively.The book then delves into actionable cybersecurity controls, offering insights on asset management, identity and access control, encryption, and incident response management. Each section includes practical tips for implementation, ensuring that readers can apply these strategies in real-world scenarios. The goal is to help organizations not only understand cybersecurity but also to establish robust security policies and protocols to prevent and mitigate potential risks.Finally, the book emphasizes the importance of continual improvement and monitoring to maintain a resilient cybersecurity framework. It highlights the need for regular audits, vulnerability scanning, and staff training to adapt to new threats. By the end, readers will be equipped to build and sustain a resilient cybersecurity strategy that ensures long-term protection and business continuity.