Ochrona danych osobowych

9
Loading...
EBOOK

Cybersecurity Beginner's Guide. Understand the inner workings of cybersecurity and learn how experts keep us safe

Joshua Mason

In today’s increasingly connected world, cybersecurity touches every aspect of our lives, yet it remains a mystery to most. This beginner’s guide pulls back the curtain on how cybersecurity really works, revealing what professionals do to keep us safe. Learn how cyber threats emerge, how experts counter them, and what you can do to protect yourself online.Perfect for business leaders, tech enthusiasts, and anyone curious about digital security, this book delivers insider knowledge without the jargon. This edition also explores cybersecurity careers, AI/ML in cybersecurity, and essential skills that apply in both personal and professional contexts.Air Force pilot turned cybersecurity leader Joshua Mason shares hard-won insights from his unique journey, drawing on years of training teams and advising organizations worldwide. He walks you through the tools and strategies used by professionals, showing how expert practices translate into real-world protection. With up-to-date information of the latest threats and defenses, this cybersecurity book is both an informative read and a practical guide to staying secure in the digital age.*Email sign-up and proof of purchase required.

10
Loading...
EBOOK

Cybersecurity Strategy for the AI-Driven Era. Proven strategies and data-driven tactics to disrupt attacks and strengthen enterprise defenses - Third Edition

Tim Rains, Jeff Jones

Designing a cybersecurity strategy that actually works is difficult when threats evolve faster than budgets, teams, and tools. This book helps security leaders cut through noise by focusing on how organizations are compromised, which strategies succeed, and how to measure outcomes.Written by Tim Rains, a former Global Chief Security Advisor at Microsoft and senior security leader at AWS and Fortune-scale enterprises, this edition expands on the previous editions with major updates and new chapters. You will learn how threat intelligence, attack-centric security, intrusion kill chains, and MITRE ATT&CK can help defenders design stronger strategies.New and expanded content covers ransomware, API security, “living off the land” attacks, resilience as a cybersecurity strategy, and the security of AI systems alongside practical guidance on using AI to improve security outcomes. This book takes a practical, evidence-based approach to cybersecurity strategy, helping you assess trade-offs, avoid costly missteps, and communicate clearly with executives and boards.By the end of this book, you’ll be able to evaluate cybersecurity strategies more effectively, improve enterprise defenses, and communicate security priorities clearly to executives and boards.

11
Loading...
EBOOK

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

12
Loading...
EBOOK

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.

13
Loading...
EBOOK

Human Factors in Cybersecurity. A field-tested framework for designing resilient, human-centered cybersecurity systems

Nikki Robinson, Calvin Nobles, Chris Cochran

Cybersecurity isn’t just a technical problem; it’s a human one. Human Factors in Cybersecurity equips you to tackle today’s digital threats by designing systems that respect how cybersecurity professionals actually think, behave, and make decisions.Despite billions spent on advanced technologies, human behavior remains cybersecurity’s greatest vulnerability. This book shows how to design defenses that work with people, not against them. Blending cybersecurity operations expertise with human factors science, it reveals that security failures are not inevitable. They’re design failures. Inside, you’ll learn how to shift from user-blaming policies to human-centered security engineering. Discover how to predict and influence user behavior, design controls that support cognitive realities, and embed human factors strategies at scale. Through actionable frameworks, real-world examples, and clear guidance, you will learn to reduce errors, build trust, and design systems resilient to human limitations.Authored by experts in cybersecurity, machine learning, and human factors engineering, this book delivers the interdisciplinary insight needed to lead the shift toward systems that are not only secure but genuinely usable. It transforms human factors from cybersecurity’s biggest blind spot into its most powerful driver of resilience.

14
Loading...
EBOOK

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.

15
Loading...
EBOOK

ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing

IT Governance Publishing, Bridget Kenyon

This guide offers a comprehensive approach to implementing and auditing ISO 27001 controls, providing clear steps for establishing a robust Information Security Management System (ISMS). It is designed to help organizations navigate the complexities of meeting international security standards while ensuring the protection of sensitive information. The book covers every aspect of ISO/IEC 27001, from the foundational principles to practical applications of organizational, physical, and technological controls.Each chapter is carefully structured to explain the implementation of specific controls, focusing on real-world scenarios and offering actionable advice for security professionals. With detailed instructions and clear examples, readers will gain a deep understanding of the ISO 27001 framework and how to align their organizations with best practices. In addition to control implementation, the book emphasizes ongoing compliance and risk management strategies. It highlights critical areas such as incident management, supplier relationships, and data protection, ensuring readers can address security challenges at all levels. Whether new to ISO 27001 or looking to refine an existing ISMS, this book provides the tools necessary for successful information security management and compliance auditing.

16
Loading...
EBOOK

ISO 27001/ISO 27002. A guide to information security management systems

IT Governance Publishing, Alan Calder

This comprehensive guide demystifies the ISO 27001 and ISO 27002 standards, offering a clear roadmap to understanding, implementing, and managing an Information Security Management System (ISMS). It begins with foundational concepts, a history of ISO 27001, and introduces the ISO 27000 family. The book proceeds to cover the PDCA cycle, Annex SL structure, and the significance of shall vs. should in compliance language.Core chapters walk through ISO 27001’s clauses and requirements, from organizational context and leadership to performance evaluation and continual improvement. Annex A's security controls are explored in detail, linking theory with practical application. ISO 27002 is also thoroughly reviewed to offer guidance on selecting and implementing appropriate controls.By the end of the book, readers gain a strong understanding of ISMS design, certification processes, and control mapping. This resource supports IT managers, compliance officers, and auditors seeking to align with international security standards.