Network security Books

315 products


  • Cloud Defense Strategies with Azure Sentinel

    APress Cloud Defense Strategies with Azure Sentinel

    1 in stock

    Book SynopsisUse various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender''s many security layers.This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden maTable of ContentsPart I (page count 100) Goals: Introduction to Azure Sentinel es with technical featurthat benefit the business. Initial configuration using Azure subscription data connectors, discuss 3rd party integration and alignment with other Azure Security Services. XDR introduction, why it is an industry standard and how to use it in Sentinel. Sub-Topics 1. Overview of Technical Features 2. Benefit and cost support for the business, initial configuration 3. Azure Defender support into Azure Sentinel 4. Azure Security Center support into Azure Sentinel Chapter 1 Azure Sentinel OverviewPlatform benefits, SOC security reference, alignment to Cyber framework, Log Analytics planning, cost structure Chapter 2 Other Azure Security Services Azure Monitor, Azure Security Center, Azure Defender, working together to support Azure Sentinel Chapter 3 Azure Sentinel XDR Capabilities Integration with Azure Security standards, protection for additional Azure workloads, guidance for XDR and how it should be used to modernize security operations. Part II (page count 100) Goals: Deployment best practices, platform integration and support for AWS Sub - Topics 1. Enable integration with 3rd party security appliances 2. Configure support for AWS 3. Multi-Azure Tenant deployment best practices Chapter 4 Data Connection Single Tenant: Data connectors native, Log Analytics storage options, 3rd party data, KQL validation processes, AWS connection, Service NOW integration Chapter 5 Threat Intelligence (TI) TI connectors and feeds, Sentinel Workbooks introduction, Sentinel Notebook usage, Python integration Chapter 6 Multi-Tenant Architecture Challenges and cost of Azure log analytics workspace, KQL modification requirements, SOC alignment needed Part III (page count 100) Goals: Improve Cyber Security Threat Hunting Techniques Sub - Topics: 1. Threat Hunting with KQL Language deep dive with examples 2. Integration with MITRE attack Matrix and support for TAXII 3. Data flow examples: User logon, track and validate. Stop network connection to China, etc. 4. Configuration changes needed for multiple Sentinel deployments Chapter 7 Threat Hunting with Azure Sentinel KQL Hunting introduction, custom queries, Sentinel bookmarks, Sentinel notebooks Chapter 8 Introduction to MITRE Matrix MITRE Attack Matrix overview and usage, STIX defined, TAXII defined, free TI -vs- service SLA Chapter 9 Azure Sentinel Operations Daily, Weekly, Monthly tasks, SOC engineer alignment, Continued SOC operations support from official Microsoft supported forum Chapter Appendix: Chapter Goal: Where to gain additional knowledge for Azure Sentinel No of pages: 20 Sub - Topics: 1. Guidance to continue Azure Sentinel skill improvement 2. Relating information to Cyber Security standards

    1 in stock

    £41.24

  • Azure Security Handbook

    APress Azure Security Handbook

    2 in stock

    Book SynopsisChapter 1. Introduction to Cloud Security Architecture.- Chapter 2. Identity and Access Management .- Chapter 3. Logging and Monitoring .- Chapter 4. Network Security.- Chapter 5. Workload Protection- Data.- Chapter 6. Workload Protection- Platform-as-a-Service.- Chapter 7. Workload Protection- Containers.- Chapter 8. Workload Protection- IaaS.Table of Contents1. Introduction to Cloud Security Architecture 2. Identity and Access Management 3. Logging and Monitoring 4. Network Security 5. Workload Protection- Data 6. Workload Protection- Platform-as-a-Service 7. Workload Protection- Containers8 Workload Protection- IaaS

    2 in stock

    £41.24

  • Snowflake Security

    APress Snowflake Security

    5 in stock

    Book SynopsisThis book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling rolehierarchy, buildTable of ContentsChapter 1. Introduction to Snowflake What’s happening to data Where Snowflake fits in Building your first Snowflake Data Warehouse Chapter 2. Account Security Security Best Practices for Snowflake Private Link Connection Chapter 3. Authentication Authentication in Snowflake overview Setting Up MFA Setting Up OAuth Setting Up SSO Connecting through a 3rd party SSO Connecting through a custom OAuth Authentication Service Network Access Control Managing Roles Through SCIM Chapter 4. Data Access Control Introduction to Data Access Controls Snowflake Security Model Designing roles architecture Custom Data Access Control Column Based Access Control Using Abstraction Using Dynamic Masking Row Based Access Control Using Abstraction Using Row Based Policies Custom Access Control Chapter 5. Logging & Monitoring Introduction Snowflake Metadata Account Usage vs Information Schema Main Views for Security Limitations SnowAlert Building a Custom Security Dashboard Setting Things Up Dashboard Incident Response Chapter 6. Epilogue Recap What’s Coming Up

    5 in stock

    £37.99

  • Phishing and Communication Channels

    APress Phishing and Communication Channels

    1 in stock

    Book SynopsisMitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication. Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon's 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack. This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations fromphishing attacks. WhaTrade Review“It covers a wide range of topics. … Each chapter tackles a very different angle on phishing, which means the topics are covered in a succinct, telegraphic way: many concepts are presented as one or two paragraphs, very often fitting several of them on the same page. … The intended audience is intermediate; experts in different areas of computing will benefit from reading about their respective interests, but the book assumes an introductory to intermediate level throughout.” (Gunnar Wolf, Computing Reviews, January 12, 2023)Table of Contents1: Introduction to Phishing.- 2: Types of Phishing.- 3: Communication Channels.- 4: What Does a Phishing URL Look Like?.- 5: Characteristics of a Phishing Website.- 6: Phishing Kits.- 7: Training Methods for Phishing Detection.- 8: Legal Solution: Phishing is Prohibited Under a Number of Laws.- 9: Phishing Detection Based on Technology.

    1 in stock

    £29.99

  • Azure Cloud Security for Absolute Beginners

    APress Azure Cloud Security for Absolute Beginners

    3 in stock

    Book SynopsisImplement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure.Author Pushpa Herath begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configuratTable of ContentsChapter 1: Understanding the Importance of Data/Application Security Chapter Goal: Give general overview on importance of data security No of pages: 5 Sub -Topics 1. Introduction to security 2. Introduction to Azure security fundamentals Chapter 2: Overview of Basic Azure Security Components Chapter Goal: Introduction to various security components in Azure and how to utilize them. No of pages: 15 Sub - Topics 1. Introduction to Azure Management groups and subscriptions 2. Azure Management locks 3. Introduction to Azure policies Chapter 3: Introduction to Azure Active Directory Chapter Goal: Lessons to provide hand-on guidance on user access control of the organization using Azure Active Directory. No of pages : 30 Sub - Topics: 1. Adding users and groups to the AD 2. Manage External Identities 3. Enable two factor authentications 4. Roles and Administrative units in Azure AD 5. Managing Enterprise applications 6. Introduction to AD devices 7. Azure AD app registration 8. Adding custom domains Chapter 4: Working with Azure Key vault Chapter Goal: Step by step guidance to setting up and using azure key vault to achieve several security requirements in the organization. No of pages: 15 Sub - Topics: 1. Setting up Key vault 2. Key vault access control 3. Using KV to save Keys 4. Using KV to secure Secrets 5. Using KV to keep certificates 6. Key vault access policies 7. KV networking and security Chapter 5: Ensure Azure Application security Chapter Goal: Step by step guidance to setting up various security components which helps to secure application hosted in Azure No of pages: 40 Sub - Topics: 1. Keep configurations in central location using Azure Configuration 2. Authentication and authorization in Azure App Service 3. How to secure application with web application firewall in Azure 4. Application Security groups Chapter 6: Ensure Data Security with Azure Storages Chapter Goal: Overview on how data storage security works in Azure No of pages: 30 Sub - Topics: 1. Setting up azure storage 2. Azure storage encryption 3. Azure defender for azure storage Chapter 7: Ensure Security using Azure Virtual Networks Chapter Goal: Step by step guide on how to setup virtual networks to enhance the security of the data and infrastructure. No of pages: 40 Sub - Topics: 1. Network security groups 2. Azure VPN gateways 3. Azure Load balancer 4. Azure Subnets Chapter 8: Working with Azure Application Gateway Chapter Goal: Hands on lessons on implementing Azure Application gateway to enhance the security of the data Sub - Topics: 1. Setting up Azure Application gateway 2. Secure Web App using App gateway 3. Secure Virtual Machine using App gateway Chapter 9: Securing data with Azure Firewall Chapter Goal: Step by step guidance to setting up azure firewall and configure it to secure data No of pages: 40 Sub - Topics: 1. Setting up Azure Firewall 2. Setting up policies 3. Setting up rules Chapter 10: Creating App Service Environment to enhance security Chapter Goal: Step by step guidance to setting up App service environment and using it to secure applications No of pages: 50 Sub - Topics: 1. Setting up Azure Application service environment 2. Deploy applications to app service environment Chapter 11: Secure Infrastructures in Azure Chapter Goal: Explains different security features available with few of the azure resources No of pages: 30 Sub - Topics: 1. Secure Azure Virtual machine using Bastian 2. Secure Azure Virtual machine using encrypted firewall rules 3. Azure SQL server security components

    3 in stock

    £42.49

  • Solving Identity Management in Modern

    APress Solving Identity Management in Modern

    5 in stock

    Book SynopsisKnow how to design and use identity management to protect your application and the data it manages. At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and the value it provides when building applications. This book takes you from account provisioning to authentication to authorization, and covers troubleshooting and common problems to avoid. The authors include predictions about why this will be even more important in the future. Application best practices with coding samples are provided. Solving Identity and Access Management in Modern Applications gives you what you need to design identity and access management for your applications and to describe it to stakeholders with confidence. You will be able to explain account creation, session and access management, account termination, and more.This expanded editionTable of Contents

    5 in stock

    £46.74

  • Winning the National Security AI Competition

    APress Winning the National Security AI Competition

    3 in stock

    Book SynopsisIn introducing the National Security Commission on AI''s final report, Eric Schmidt, former Google CEO, and Robert Work, former Deputy Secretary of Defense, wrote: The human talent deficit is the government''s most conspicuous AI deficit and the single greatest inhibitor to buying, building, and fielding AI-enabled technologies for national security purposes. Drawing upon three decades of leading hundreds of advanced analytics and AI programs and projects in government and industry, Chris Whitlock and Frank Strickland address in this book the primary variable in the talent deficit, i.e., large numbers of qualified AI leaders.The book quickly moves from a case for action to leadership principles and practices for effectively integrating AI into programs and driving results in AI projects. The chapters convey 37 axioms - enduring truths for developing and deploying AI - and over 100 leader practices set among 50 cases and examples, 40 of which focus on AI iTable of ContentsForewordIntroduction Chapter 1. The Three Imperatives to Develop AI Leaders Chapter 2. How Leaders Should Think and Talk About AI Chapter 3. Leading the Program Chapter 4. Government Programming and Budgeting for AI Leaders Chapter 5. Leading the Project Chapter 6. Data Science for AI Leaders Chapter 7. Leading the People Chapter 8. Leading the Technology Endnotes About AI Leaders

    3 in stock

    £46.74

  • Connecting the Internet of Things

    APress Connecting the Internet of Things

    1 in stock

    Book SynopsisNavigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also be able to understand the essentials of connectivity including, hardware, software, and business models.?IoT is essential for increasing productivity of many industries and quality of life (making the world smart and autonomous). Both wired and wireless connectivity technologies are essential ingredients in an IoT product. Writtenby Intel engineers and architects, Connecting the Internet of ThingsunTable of ContentsChapter 1: Introduction to IoT ConnectivityChapter Goal: This chapter provides an overview of key IoT use cases and key connectivity elements of IoT solutions. The reader will get an understanding of the breadth of the IoT landscape.• Purpose of this book• Background and Terminology• Key IoT use caseso Smart citieso Asset trackingo Smart factorieso Industrialo Transportationo Digital surveillance systemso Retailo Medical o Indoor location• End-to-end IoT building blockso Things/devices/sensorso Edge/Gateway/Fogo Cloud• IoT Stakeholders/Value Chaino Chip Vendorso Module Vendorso System Integratorso ODMso ISVso End CustomersChapter 2: Considerations in choosing a connectivity technologyChapter Goals: This chapter highlights the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies and also discusses the tradeoffs between different wireless technologies and network topologies. Also, this chapter provides the motivation for using wireless technologies in IoT products as well as challenges.• Compute and connect are integral functions that are fully integrated in single SoC-for lower cost and low power solutions• Benefits of wireless• Seamless wireless connectivity for mobility applications• Remote Commissioning, ease of deployment, OTA update, device identification• Challenges of Wireless Connectivity• Fragmentation of the IoT Ecosystemo Discussion of IoT Framework Open Connectivity Foundation etc.o Interoperability (open standards)• Coexistence and interference• Wireless security is vital• Certification (Industry, regulatory, operator)o Certified labs• Antenna design challenges• Considerations in choosing a connectivity technologyo Energy/power/cost tradeoffso Selection of network architectures and topologieso Wireless standards and alignment to use cases-how to choose the right wireless protocol for the jobo Selection criteria-range, data rate, power, security, latency, capacity, etc.• Wireless Standard BodiesSubchapter Goal: Overview of Connectivity standards including 15.4, ZigBee, Thread, 6LoWPAN, wi-fi, BT, LTE, 5G etc. and which is appropriate for each use case; include cost considerationso WiFi Allianceo BT SIGo ZigBee Allianceo Thread Groupo Dot doto Z-Waveo 3GPP (ITU-T)Chapter Goals: The following chapters (3 to 10) provide a deep dive on each connectivity technology and considerations on selecting it for the IoT use casesChapter 3: Wi-Fi • Wi-Fi mesh• WiFi 802.11a/b/g/n/ac• WiFi 6Chapter 4: Bluetooth• BLE• BT mesh• BT direction finding• BT beaconsChapter 5: 802.15.4 (unlicensed)• ZigBee• ThreadChapter 6: LPWAN• Lora• SigFoxChapter 7: Cellular Technologies • NB IoT• 3G• 4G LTE• CBRS (Private LTE) / OnGoChapter 8: 5G• eMBB• mMTC• urLLC• 5G TSNChapter 9: Ethernet• TSN• Industrial Ethernet TechnologiesChapter 10: GNSSChapter 11: IoT Connectivity Frameworks and StacksChapter Goal: This chapter goes into detail on how to assemble all of the components of a working solution and discusses how to scale your solution to a product• Software stacks, drivers, operating systems, RTOS• Gateway architecture including protocolso IoT protocols CoAP MQTT OPCUA• RF: antenna, PA, etc.• Coexistence• Environmental considerations, reliability, long life etc.• Security and privacy• Managing the network• Certification• Putting it together• How to integrate and validate (chip vs pre-certified module)• Scaling from project to product • Putting it together: Sample Projects• Go through the earlier examples and discuss the complete productsChapter 12: The Future of IoT ConnectivityChapter Goal: This chapter discusses emerging connectivity technologies for addressing new use cases as well as advancing and optimizing the performance of existing technologies• Things/sensors (low power, battery powered, low compute, need wireless connectivity, small memory footprint, small RTOS footprint)• Software defined radio• What is coming next?• Future technologies: Wi-Fi 7, etc.• Next steps for the reader• Where to get more informationReferencesIndex

    1 in stock

    £41.24

  • Wireshark for Network Forensics

    APress Wireshark for Network Forensics

    Out of stock

    Book SynopsisWith the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, Table of ContentsChapter 1: Wireshark Primer· Introduction to Wireshark Architecture· Wireshark Package installation and Usage· Wireshark Cloud Services· Version and feature parity· Basic Analysis and filtering· Data stream and Graphs· Summary Chapter 2: Packet Capture and Analysis§ Native Tool based Traffic Capture§ Wireshark tool based Traffic Capture§ Wireless Capture Modes and Configurations· High volume packet analysis (size based, capture filters)· Wireshark command line tool· Mobile devices Traffic Capture Chapter 3: Capturing Secured Application for Analysis· Introduction to Secured Applications· Secure DNS· HTTPS· mTLS· IPsec, ISAKMP, Kerberos· SNMPv3· WEP, and WPA/WPA2/WPA3 Chapter4: Wireless Packet Capture and Analysis· Basics of Wireless Technology· Wireless packet types (data, control, auth)· Wireless operational aspects and effect on wireshark capture· Effect of Wireshark modes (monitor, promiscuous) on wireless capture · Setting up Wireshark 802.11 captures for various OS types· Decoding beacons/WEP/WPA/WPA2· Wireless packet analysis Chapter 5: Multimedia Capture and Analysis· Introduction to Multimedia Applications· Export Objects (file, images applications) from data stream· video content extraction and replay (RTP / RTSP)· mpeg live streams capture and replay· VoIP call analysis and replay Chapter 6: Cloud and Cloud-Native Traffic Capture· Introduction and Cloud and Cloud Native Applications· Native and Wireshark Captures in AWS· Native and Wireshark Captures in GCP· Native and Wireshark Captures in Azure· LXC and Namespace based capture· Kubernetes POD capture Chapter 7: Bluetooth Protocol Capture and Analysis· Introduction to Bluetooth and Usecase· HCIDump captures· Bluetooth protocol analysis Chapter 8: Wireshark Analysis and Network Forensic· Networking protocol operation analysis· Analyzing network throughput issues, performance degradations· Network security attack identification , post mortems, prevention· Discovering malwares, covert communications· Packet replaysChapter 9: Writing your own dissector · Wireshark Dissectors· Use Case Example· Dissector Example

    Out of stock

    £33.74

  • Firewalls Dont Stop Dragons

    APress Firewalls Dont Stop Dragons

    1 in stock

    Book SynopsisRely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. Shop and bank online with maximum security and peace of mind. Block online tracking, data mining and malicious online ads.Table of Contents

    1 in stock

    £31.34

  • EmployeeCentric IT

    APress EmployeeCentric IT

    1 in stock

    Book Synopsis Global surveys from McKinsey, BCG, Gartner, and others show that less than 30% of digital transformation programs succeed in their missions to improve a company''s performance and employee productivity. This is due to the fact that IT efforts within the company do not center around the employee. This book will provide concrete steps to allow both IT professionals and business leaders to transform the way they deliver IT to employees - with the employee (the human) centered in their transformation. The concepts, models, checklists, and playbook you''ll review are based on the author''s many years of experience, lessons learned, and proven outcomes. IT organizations want to improve their employee experience but don''t know how and this is the must have book for those who don''t know where to start. More than two-thirds of today''s jobs require good digital and IT skills from employees. The expectations&nTable of ContentsIntroduction (introduction to the topic and why Employee centric IT is needed) ○ Chapter 1: From Technology Centric to Employee Centric IT ■ Dysfunctions of IT ■ Understanding Employees as Humans and not data points ○ Chapter 2: Employee Experience and its core pillar – Employee Centric IT■ Why Employees are Forgotten ■ Dimensions of Employee Centric IT ■ Trust Equation Part 1: Winning Employees’ Hearts (Covering the activities to achieve the first part of the trust equation which is winning the hearts) ○ Chapter 3: Winning the Engagement ■ Employee Engagement ■ Community Engagement ■ Summary and Self-Assessment ■ Checklist for Winning the Engagement ○ Chapter 4: Winning the Support ■ Focused and employee-centered “care” ■ Listening ■ Summary and Self-Assessment ■ Checklist for Winning the Support ○ Chapter 5: Winning the Culture ■ Communication■ Collaboration ■ Technology ■ Summary and Self-Assessment ■ Checklist for Winning the Culture Part 2: Winning Employees’ Minds (Covering the activities to achieve the second part of the trust equation which is winning their minds) ○ Chapter 6: Winning the Operations ■ Data Driven ■ Education Driven ■ Personas ■ Productivity Driven ■ Summary and Self-Assessment■ Checklist for Winning the Operations ○ Chapter 7: Winning the Transformation ■ Priming of the change ■ Change Impact Analysis ■ Summary and Self-Assessment ■ Checklist for Winning the Transformation ○ Chapter 8: Winning the Innovation ■ Incremental ■ Radical ■ Summary and Self-Assessment ■ Checklist for Winning the Innovation Part 3: Winning your IT Team (steps to take to win IT team’s acceptance of the change needed towards employee-centricity and how to achieve it) ○ Chapter 9: Winning the IT Team’s Structure ■ Summary and Self-Assessment ■ Checklist for Winning the Structure ○ Chapter 10: Winning the IT Team’s processes ■ Summary and Self-Assessment ■ Checklist for Winning the Processes ○ Chapter 11: Winning the IT Talent & Skills ■ Summary and Self-Assessment ■ Checklist for Winning the Talent & Skills○ Chapter 12: Winning the IT Leadership & Culture ■ Collaboration ■ Psychological Safety ■ Summary and Self-Assessment ■ Checklist for Winning the Leadership & Culture Part 4: Evangelizing Employee Centric IT in your organization (Putting all the steps together in a playbook to be used in implementing Employee centricity in an organization) ○ Chapter 13: Implementing & Scaling Employee Centric IT for your Company ■ Preparation ■ Implementation ■ Lessons Learnt and Pitfalls ○ Chapter 14: How to deal with the Hybrid Way of working and Employee Centricity ○ Chapter 15: There is no End in Sight ● Conclusion

    1 in stock

    £37.49

  • Tactical Wireshark

    APress Tactical Wireshark

    1 in stock

    Book SynopsisTake a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest.Next, you''ll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial click through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level.In the final part of the book, you''ll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forenTable of ContentsChapter 1: Customization of the Wireshark Interface Chapter Goal: - Learn how to edit the columns of the Wireshark user interface. Explore important items to include in the interface for performing intrusion and malware analysis No of pages - 18 Sub -Topics 1. Identifying columns to delete from the default displays 2. Adding the source and destination ports for easy traffic analysis 3. Specialty column customization for malware analysis Intrusions Chapter 2: Capturing Network Traffic Chapter Goal: Setup a network capture in Wireshark No of pages: - 24 Sub - Topics 1. Prerequisites for capturing live network data 2. Working with Network Interfaces 3. Exploring the network capture options 4. Filtering While Capturing Chapter 3: Interpreting Network Protocols Chapter Goal: A deep understanding of the network protocols at the packet level No of pages : 30 Sub - Topics: 1. Investigating IP, the workhorse of the network 2. Analyzing ICMP and UDP 3. Dissection of TCP traffic 4. Reassembly of packets 5. Interpreting Name Resolution Chapter 4: Analysis of Network Attacks Chapter Goal: Understand the hacking mindset and leverage that to identify attacks No of pages: 30 Sub - Topics: 1. Introducing a Hacking Methodology 2. Examination of reconnaissance network traffic artifacts 3. Leveraging the statistical properties of the capture file 4. Identifying SMB based attacks 5. Uncovering HTTP/HTTPS based attack traffic Chapter 5: Effective Network Traffic Filtering Chapter Goal: Use of the complex filtering capability of Wireshark to extract attack data No of pages: 35 Sub - Topics: 1. Identifying filter components 2. Investigating the conversations 3. Extracting the packet data 4. Building Filter Expressions 5. Decrypting HTTPS Traffic Chapter 6: Advanced Features of Wireshark Chapter Goal: A fundamental review and understanding of the advanced features of Wireshark No of pages: 35 Sub – Topics: 1. Working with cryptographic information in a packet 2. Exploring the protocol dissectors of Wireshark 3. Viewing logged anomalies in Wireshark 4. Capturing traffic from remote computers 5. Command line tool tshark 6. Creating Firewall ACL rules Chapter 7: Scripting and interacting with Wireshark Chapter Goal: Using scripts to extract and isolate data of interest from network capture files No of pages: 30 Sub – Topics: 1. Lua scripting 2. Interaction with Pandas 3. Leveraging PyShark Malware Chapter 8: Basic Malware Traffic Analysis Chapter Goal: Develop an understanding of the different stages of a malware infection No of pages: 36 Sub – Topics: 1. Customization of the interface for malware analysis 2. Extracting the files 3. Recognizing URL/Domains of an infected site 4. Determining the connections as part of the infected machine 5. Scavenging the infected machine meta data 6. Exporting the data objects Chapter 9: Analyzing Encoding, Obfuscated and ICS Malware Traffic Chapter Goal: Identify the encoding or obfuscated method in network traffic No of pages: 40 Sub – Topics: 1. Investigation of njRAT 2. Analysis of Wanna Cry 3. Exploring Cryptolocker 4. Dissecting TRITON 5. Examining Trickbot 6. Understanding exploit kits Chapter 10: Dynamic Malware Network Activities Chapter Goal: Review and understand malware network activity as it happens No of pages: 40 Sub – Topics: 1. Setting up network and service simulation 2. Monitoring malware communications and connections at run time and beyond 3. Detecting network evasion attempts 4. Investigating Cobalt Strike Beacons 5. Exploring C2 backdoor methods 6. Identifying Domain Generation Algorithms Forensics Chapter 10: Extractions of Forensics Data with Wireshark Chapter Goal: Learn different methods of extracting different types of case related and potential forensics evidence No of pages: 30 Sub – Topics: 1. Interception of telephony data 2. Discovering DOS/DDoS 3. Analysis of HTTP/HTTPS Tunneling over DNS 4. Carving files from network data Chapter 11: Network Traffic Forensics Chapter Goal: An understanding of extraction of potential forensics data No of pages: 30 Sub – Topics: 1. Isolation of conversations 2. Detection of Spoofing, port scanning and SSH attacks 3. Reconstruction of timeline network attack data 4. Extracting compromise data Chapter 12: Conclusion Chapter Goal: Review and summary of covered content No of pages: 10

    1 in stock

    £49.49

  • Beginning AWS Security

    APress Beginning AWS Security

    1 in stock

    Book SynopsisImprove cloud security within your organization by leveragingAWS's Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment.You'll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization's needs. You'll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization's business, technicalTable of ContentsChapter 1: Why Do I Care About Security? Isn’t that AWS’s problem?Chapter Goal: Identify why security is important in the cloud.No of pages: 40 -50 pagesSub -Topics1. Introduce some real life security breaches and outcomes that have happened in the cloud.2. Describe how AWS provides resources to build a cloud architecture but it’s important to understand the tradeoffs of each service.3. Introduce the Shared Responsibility Model (covered more in Chapter 2)4. Introduce the Well-Architected Framework (will be used as reference throughout the book)5. Describe the similarities and differences between cloud and traditional computing.Chapter 2: Who is Responsible Again?Chapter Goal: Develop an understanding of the Shared Responsibility Model and the tradeoffs of responsibilities based on services used.No of pages: 40 -50Sub - Topics 1. Detailed overview of the Shared Responsibility Model2. Elaborate what is meant by “tradeoffs” and why understanding this is important.3. Review of AWS’s security precautions 4. Align how the Well-Architected Framework supports the Shared Responsibility Model5. Describe the purpose and responsibilities for Identity and access managementChapter 3: How Do I Build a Secure Architecture?Chapter Goal: Dive deeper into the differences of responsibility of managed services and those that allow customers more control. Identify tradeoffs on specific categories.No of pages : 40 - 50Sub - Topics: 1. Identify and understand services, responsibilities, and tradeoffs for computing services.2. Identify and understand services, responsibilities, and tradeoffs for storage services.3. Identify and understand services, responsibilities and tradeoffs for networking services.4. Identify and understand services, responsibilities and tradeoffs for database services.6. Identify and understand services to protect data at rest and in transit.7. Identify and understand services to monitor access and notifications.Chapter 4: Security is Not Built in a DayChapter Goal: Develop an understanding that security is not “one and done” and that updates and monitoring is a continued part of AWS security.No of pages: 40 - 50Sub - Topics: 1. Identify and describe what it means to be proactive and reactive in security.2. Identify and implement monitoring services into architecture 3. Identify and understand the costs of the monitoring services4. Identify how to make updates and patches to software - and who is responsible for what.Chapter 5: Is This the End?Chapter Goal: Reinforce the need for lifelong learning. Just as security is not a “one and done”, learning should be continuous as well. No of pages: 10 - 20Sub - Topics: 1. Identify resources available to continue learning from AWS (AWS Educate, AWS Academy, AWS Skillbuilder)2. Identify resources available to continue learning from the publisher3. A final review of the Shared Responsibility Model.4. A final review of the Well-Architected Framework

    1 in stock

    £23.79

  • Sharing Big Data Safely

    O'Reilly Media Sharing Big Data Safely

    Out of stock

    Book SynopsisMany big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away.

    Out of stock

    £15.99

  • Arista Warrior

    O'Reilly Media Arista Warrior

    5 in stock

    Book SynopsisIn this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista's products. You'll learn why the company's network switches, software products, and Extensible Operating System (EOS) are so effective.

    5 in stock

    £47.99

  • Learning HTTP2

    O'Reilly Media Learning HTTP2

    Out of stock

    Book SynopsisWhat can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance.

    Out of stock

    £23.99

  • Cyber Threats and Nuclear Weapons

    Stanford University Press Cyber Threats and Nuclear Weapons

    15 in stock

    Book SynopsisThe technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively. With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers? Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.Trade Review"Perhaps the only thing more frightening than nuclear weapons is the thought of those weapons being connected to modern software systems. Herbert Lin, an expert in both realms, has written a sobering, enlightening book that should be required reading for all those thinking about the security of these weapons in the internet age."—Jim Waldo, Former Distinguished Engineer, Sun Labs"Herbert Lin is one of this country's leading experts on nuclear and cyber issues. In this important book, he provides a careful but chilling analysis of the risks we face in efforts to modernize the nuclear enterprise. Cyber Threats and Nuclear Weapons should be read carefully in Washington." —Joseph S. Nye, Jr, Harvard University"In this wide-ranging and well-crafted book, Herbert Lin wisely encapsulates his careful analysis in a series of easy-to-digest observations, with the policy imperatives that flow from them. The result is a guide for policy makers as they cope with the hair-raising prospect of nuclear modernization amidst increasing cyber risk."—Rose Gottemoeller, Former Deputy Secretary General of NATO"Lin's purpose in writing this excellent book is to acknowledge the new and sobering reality that computerization makes nuclear weapons much less secure than readers might assume. Highly recommended."—J. A. Stever, CHOICE June 2022"an informative read for novices and experts alike."—Melissa K. Griffith, Survival: Global Politics and StrategyTable of Contents1. Introduction and Background 2. The Cyber-Nuclear Connection 3. The U.S. Nuclear Enterprise 4. Cybersecurity Lessons for Nuclear Modernization 5. Cyber Risks in Selected Nuclear Scenarios 6. Designing the Cyber-Nuclear Future: Observations and Imperatives 7. Moving Forward

    15 in stock

    £19.79

  • Constructing Cybersecurity: Power, Expertise and

    Manchester University Press Constructing Cybersecurity: Power, Expertise and

    Out of stock

    Book SynopsisConstructing cybersecurity adopts a constructivist approach to cybersecurity and problematises the state of contemporary knowledge within this field. Setting out by providing a concise overview of such knowledge this book subsequently adopts Foucauldian positions on power and security to highlight assumptions and limitations found herein. What follows is a detailed analysis of the discourse produced by various internet security companies demonstrating the important role that these security professionals play constituting and entrenching this knowledge by virtue of their specific epistemic authority. As a relatively new source within a broader security dispositif these security professionals have created relationships of mutual recognition and benefit with traditional political and security professionals.Trade Review'Theoretically astute and empirically detailed. Whiting's timely contribution will be beneficial for future generations of critical cybersecurity scholars.'Myriam Dunn Cavelty, Senior Lecturer in Security Studies, ETH Zürich'A sophisticated yet accessible exploration of an under-researched site of expert discourse. Empirically robust, methodologically rigorous and rich in theoretical insights.'Stuart Macdonald, Professor of Legal Studies, Swansea University'Whiting offers a sophisticated, urgent, and rich exploration of the construction of cyberthreats. Whiting’s focus on the internet security industry enables him to break significant new theoretical and empirical ground. A tremendous achievement.'Lee Jarvis, Professor of International Politics, University of East Anglia -- .Table of ContentsIntroduction1 Cybersecurity knowledge: Cohesion, contestation and constructivism2 Security dispositifs and security professionals3 Constructing the milieu4 Constructing cyber-threats5 Constructing cybersecurityConclusionNotesBibliography

    Out of stock

    £76.50

  • Cisco IOS Access Lists

    O'Reilly Media Cisco IOS Access Lists

    Out of stock

    Book SynopsisCisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: *Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. * *Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. *The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.Table of ContentsPreface 1. Network Policies and Cisco Access Lists Policy sets The policy toolkit 2. Access List Basics Standard access lists Extended access lists More on matching Building and maintaining access lists Named access lists 3. Implementing Security Policies Router resource control Packet filtering and firewalls Alternatives to access lists 4. Implementing Routing Policies Fundamentals of route filtering Implementing routing modularity Implementing route preferences Alternatives to access lists 5. Debugging Access Lists Router resource access control lists Packet-filtering access control lists Route-filtering access control lists 6. Route Maps Other access list types Generic route map format Interior routing protocols and policy routing BGP Debugging route maps and BGP 7. Case Studies A WAN case study A firewall case study An Internet routing case study A. Extended Access List Protocols and Qualifiers B. Binary and Mask Tables C. Common Application Ports Index

    Out of stock

    £26.99

  • Computer and Intrusion Forensics

    Artech House Publishers Computer and Intrusion Forensics

    15 in stock

    Book SynopsisA comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.Table of ContentsComputer Crime. Computer Forensics and Computer Security. Current Practice. Computer Forensics in Law Enforcement and National Security. Computer Forensics in Forensic Accounting. Case Studies. Intrusion Detection and Intrusion Forensics. Research Directions and Future Developments.

    15 in stock

    £87.31

  • Investigating the Cyber Breach: The Digital

    Pearson Education (US) Investigating the Cyber Breach: The Digital

    15 in stock

    Book SynopsisInvestigating the Cyber Breach The Digital Forensics Guide for the Network Engineer · Understand the realities of cybercrime and today’s attacks · Build a digital forensics lab to test tools and methods, and gain expertise · Take the right actions as soon as you discover a breach · Determine the full scope of an investigation and the role you’ll play · Properly collect, document, and preserve evidence and data · Collect and analyze data from PCs, Macs, IoT devices, and other endpoints · Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence · Analyze iOS and Android devices, and understand encryption-related obstacles to investigation · Investigate and trace email, and identify fraud or abuse · Use social media to investigate individuals or online identities · Gather, extract, and analyze breach data with Cisco tools and techniques · Walk through common breaches and responses from start to finish · Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that. Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You’ll learn how to make the most of today’s best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more. Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving intelligence, rooting out dormant malware, and responding effectively to breaches underway right now. This book is part of the Networking Technology: Security Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.Table of ContentsIntroduction xix Chapter 1 Digital Forensics 1 Defining Digital Forensics 3 Engaging Forensics Services 4 Reporting Crime 7 Search Warrant and Law 9 Forensic Roles 13 Forensic Job Market 15 Forensic Training 16 Summary 23 References 24 Chapter 2 Cybercrime and Defenses 25 Crime in a Digital Age 27 Exploitation 31 Adversaries 34 Cyber Law 36 Summary 39 Reference 39 Chapter 3 Building a Digital Forensics Lab 41 Desktop Virtualization 42 VMware Fusion 43 VirtualBox 44 Installing Kali Linux 44 Attack Virtual Machines 52 Cuckoo Sandbox 56 Virtualization Software for Cuckoo 58 Installing TCPdump 58 Creating a User on VirtualBox for Cuckoo 59 Binwalk 60 The Sleuth Kit 61 Cisco Snort 62 Windows Tools 67 Physical Access Controls 68 Storing Your Forensics Evidence 71 Network Access Controls 72 Jump Bag 74 Summary 74 References 75 Chapter 4 Responding to a Breach 77 Why Organizations Fail at Incident Response 78 Preparing for a Cyber Incident 80 Defining Incident Response 81 Incident Response Plan 82 Assembling Your Incident Response Team 84 When to Engage the Incident Response Team 85 Outstanding Items that Often Get Missed with Incident Response 88 Phone Tree and Contact List 88 Facilities 89 Responding to an Incident 89 Assessing Incident Severity 91 Following Notification Procedures 92 Employing Post-Incident Actions and Procedures 93 Identifying Software Used to Assist in Responding to a Breach 93 Trend Analysis Software 94 Security Analytics Reference Architectures 94 Other Software Categories 97 Summary 97 References 98 Chapter 5 Investigations 99 Pre-Investigation 100 Opening a Case 102 First Responder 105 Device Power State 110 Search and Seizure 113 Chain of Custody 118 Network Investigations 121 Forensic Reports 127 Case Summary 129 Example 129 Acquisition and Exam Preparation 129 Example 129 Findings 130 Example 130 Conclusion 130 Example 131 List of Authors 131 Example 131 Closing the Case 132 Critiquing the Case 136 Summary 139 References 139 Chapter 6 Collecting and Preserving Evidence 141 First Responder 141 Evidence 144 Autopsy 145 Authorization 147 Hard Drives 148 Connections and Devices 150 RAID 152 Volatile Data 153 DumpIt 154 LiME 154 Volatility 156 Duplication 158 dd 161 dcfldd 161 ddrescue 162 Netcat 162 Guymager 163 Compression and Splitting 164 Hashing 166 MD5 and SHA Hashing 168 Hashing Challenges 169 Data Preservation 170 Summary 172 References 172 Chapter 7 Endpoint Forensics 173 File Systems 174 Locating Data 178 Unknown Files 180 Windows Registry 182 Deleted Files 185 Windows Recycle Bin 187 Shortcuts 189 Printer Spools 190 Slack Space and Corrupt Clusters 191 Alternate Data Streams 196 Mac OS X 198 OS X Artifacts 199 Log Analysis 202 IoT Forensics 207 Summary 210 References 211 Chapter 8 Network Forensics 213 Network Protocols 214 Security Tools 215 Firewall 219 Intrusion Detection and Prevention System 219 Content Filter 219 Network Access Control 220 Packet Capturing 223 NetFlow 224 Sandbox 225 Honeypot 226 Security Information and Event Manager (SIEM) 228 Threat Analytics and Feeds 229 Security Tool Summary 229 Security Logs 229 Network Baselines 233 Symptoms of Threats 235 Reconnaissance 235 Exploitation 238 Malicious Behavior 242 Beaconing 244 Brute Force 249 Exfiltration 250 Other Indicators 254 Summary 255 References 255 Chapter 9 Mobile Forensics 257 Mobile Devices 258 Investigation Challenges 258 iOS Architecture 259 iTunes Forensics 261 iOS Snapshots 263 How to Jailbreak the iPhone 265 Android 266 PIN Bypass 270 How to Brute Force Passcodes on the Lock Screen 271 Forensics with Commercial Tools 272 Call Logs and SMS Spoofing 274 Voicemail Bypass 275 How to Find Burner Phones 276 SIM Card Cloning 278 Summary 279 Reference 279 Chapter 10 Email and Social Media 281 A Message in a Bottle 281 Email Header 283 Social Media 288 People Search 288 Google Search 293 Facebook Search 297 Summary 304 References 305 Chapter 11 Cisco Forensic Capabilities 307 Cisco Security Architecture 307 Cisco Open Source 310 Cisco Firepower 312 Cisco Advanced Malware Protection (AMP) 313 Cisco Threat Grid 319 Cisco Web Security Appliance 322 Cisco CTA 323 Meraki 324 Email Security Appliance 326 Cisco Identity Services Engine 328 Cisco Stealthwatch 331 Cisco Tetration 335 Cisco Umbrella 337 Cisco Cloudlock 342 Cisco Network Technology 343 Summary 343 Reference 343 Chapter 12 Forensic Case Studies 345 Scenario 1: Investigating Network Communication 346 Pre-engagement 347 Investigation Strategy for Network Data 348 Investigation 350 Closing the Investigation 355 Scenario 2: Using Endpoint Forensics 357 Pre-engagement 357 Investigation Strategy for Endpoints 358 Investigation 359 Potential Steps to Take 360 Closing the Investigation 362 Scenario 3: Investigating Malware 364 Pre-engagement 364 Investigation Strategy for Rogue Files 365 Investigation 365 Closing the Investigation 369 Scenario 4: Investigating Volatile Data 370 Pre-engagement 371 Investigation Strategy for Volatile Data 372 Investigation 373 Closing the Investigation 375 Scenario 5: Acting as First Responder 377 Pre-engagement 377 First Responder Strategy 377 Closing the Investigation 379 Summary 381 References 382 Chapter 13 Forensic Tools 383 Tools 384 Slowloris DDOS Tool: Chapter 2 385 Low Orbit Ion Cannon 386 VMware Fusion: Chapter 3 386 VirtualBox: Chapter 3 387 Metasploit: Chapter 3 388 Cuckoo Sandbox: Chapter 3 389 Cisco Snort: Chapter 3 389 FTK Imager: Chapters 3, 9 390 FireEye Redline: Chapter 3 391 P2 eXplorer: Chapter 3 392 PlainSight: Chapter 3 392 Sysmon: Chapter 3 393 WebUtil: Chapter 3 393 ProDiscover Basics: Chapter 3 393 Solarwinds Trend Analysis Module: Chapter 4 394 Splunk: Chapter 4 394 RSA Security Analytics: Chapter 4 395 IBM’s QRadar: Chapter 4 396 HawkeyeAP: Chapter 4 396 WinHex: Chapters 6, 7 396 OSForensics: Chapter 6 397 Mount Image Pro: Chapter 6 397 DumpIt: Chapter 6 398 LiME: Chapter 6 398 TrIDENT: Chapter 7 398 PEiD: Chapter 7 399 Lnkanalyser: Chapter 7 399 Windows File Analyzer: Chapter 7 399 LECmd: Chapter 7 401 SplViewer: Chapter 7 401 PhotoRec: Chapter 7 402 Windows Event Log: Chapter 7 402 Log Parser Studio: Chapter 7 403 LogRhythm: Chapter 8 403 Mobile Devices 404 Elcomsoft: Chapter 9 404 Cellebrite: Chapter 9 404 iPhone Backup Extractor: Chapter 9 405 iPhone Backup Browser: Chapter 9 405 Pangu: Chapter 9 405 KingoRoot Application: Chapter 9 405 Kali Linux Tools 406 Fierce: Chapter 8 406 TCPdump: Chapter 3 406 Autopsy and Autopsy with the Sleuth Kit: Chapters 3, 6 406 Wireshark: Chapter 8 406 Exiftool: Chapter 7 407 DD: Chapter 6 407 Dcfldd: Chapter 6 408 Ddrescue: Chapter 6 408 Netcat: Chapter 6 408 Volatility: Chapter 6 408 Cisco Tools 408 Cisco AMP 408 Stealthwatch: Chapter 8 409 Cisco WebEx: Chapter 4 409 Snort: Chapter 11 409 ClamAV: Chapter 10 409 Razorback: Chapter 10 410 Daemonlogger: Chapter 10 410 Moflow Framework: Chapter 10 410 Firepower: Chapter 10 410 Threat Grid: Chapter 10 410 WSA: Chapter 10 410 Meraki: Chapter 10 411 Email Security: Chapter 10 411 ISE: Chapter 10 411 Cisco Tetration: Chapter 10 411 Umbrella: Chapter 10 411 Norton ConnectSafe: No Chapter 412 Cloudlock: Chapter 10 412 Forensic Software Packages 413 FTK Toolkit: Chapter 3 413 X-Ways Forensics: Chapter 3 413 OSforensics: Chapter 6 414 EnCase: Chapter 7 414 Digital Forensics Framework (DFF): Chapter 7 414 Useful Websites 414 Shodan: Chapter 1 414 Wayback Machine: Chapter 3 415 Robot.txt files: Chapter 2 415 Hidden Wiki: Chapter 2 415 NIST: Chapter 4 416 CVE: Chapter 4 416 Exploit-DB: Chapter 4 416 Pastebin: Chapters 4, 10 416 University of Pennsylvania Chain of Custody Form: Chapter 6 417 List of File Signatures: Chapter 9 417 Windows Registry Forensics Wiki: Chapter 7 417 Mac OS Forensics Wiki: Chapter 7 417 Miscellaneous Sites 417 Searchable FCC ID Database 418 Service Name and Transport Protocol Port Number Registry 418 NetFlow Version 9 Flow-Record Format 418 NMAP 418 Pwnable 418 Embedded Security CTF 419 CTF Learn 419 Reversing.Kr 419 Hax Tor 419 W3Challs 419 RingZer0 Team Online CTF 420 Hellbound Hackers 420 Over the Wire 420 Hack This Site 420 VulnHub 420 Application Security Challenge 421 iOS Technology Overview 421 Summary 421 9781587145025 TOC 1/10/2017

    15 in stock

    £33.29

  • Integrated Security Technologies and Solutions -

    Pearson Education (US) Integrated Security Technologies and Solutions -

    Out of stock

    Book SynopsisThe essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation Table of Contents Introduction xixPart I Knock, Knock! Who’s There? 1Chapter 1 Who and What: AAA Basics 3 Fundamentals of AAA 3 Understanding the Concept of Triple-A in the Real World 4 Compare and Select AAA Options 4 TACACS+ 7 RADIUS 12 Comparing RADIUS and TACACS+ 15 Summary 16Chapter 2 Basic Network Access Control 17 What Is Cisco ISE? 17 ISE Architecture for Network Access AAA 18 Configuring ISE for Single/Standalone and Multinode Deployments 23 ISE Configuration for Network Access 32 802.1X and Beyond 54 Configuring Wired Network Access with ISE 71 Configuring Wireless Network Access with ISE 115 Verifying Dot1X and MAB 140 Summary 148Chapter 3 Beyond Basic Network Access Control 149 Profiling with ISE 149 ISE Profiler and CoA 175 Profiles in Authorization Policies 178 Passive Identities and EasyConnect 180 Summary 191Chapter 4 Extending Network Access with ISE 193 Get Ready, Get Set, Prerequisites 194 BYOD Onboarding with ISE 197 MDM Onboarding and Enforcement with ISE 236 Posture Assessment and Remediation with ISE 244 Guest Access with ISE 265 TrustSec with ISE 287 Summary 306Chapter 5 Device Administration Control with ISE 307 The Case for Centralized AAA 307 RADIUS Versus TACACS+ for Device Administration 308 Using TACACS+ for Device Administration 309 Using RADIUS for Device Administration 343 Summary 352Part II Spread the Love! 353Chapter 6 Sharing the Context 355 The Many Integration Types of the Ecosystem 356 pxGrid in Depth 361 Summary 406Chapter 7 APIs in Cisco Security 407 APIs 101 407 Firepower Management Center APIs 413 Identity Services Engine APIs 424 Advanced Malware Protection APIs 428 Threat Grid APIs 433 Umbrella APIs 435 Summary 437 References 437Part III c2889775343d1ed91b 439Chapter 8 Security Connectivity 441 Hashing, Ciphers, Cryptography, and PKI 441 Virtual Private Networks 461 Layer 2 Encryption: IEEE 802.1AE/MACsec 470 Summary 474 References 474Chapter 9 Infrastructure VPN 477 IPsec with IKEv1 478 IPsec with IKEv2 484 EzVPN 492 DMVPN 500 FlexVPN 514 GETVPN 532 Summary 541 References 541Chapter 10 Remote Access VPN 543 Remote Access VPN Overview 543 Cisco AnyConnect Secure Mobility Client 546 Client-Based Remote Access VPN 554 Clientless Remote Access VPN 586 Summary 595 References 595Part IV The Red Pill 597Chapter 11 Security Virtualization and Automation 599 Cisco Virtual Solutions and Server Virtualization 599 Virtualization and Automation Solutions 602 Summary 613 References 61497815877147074, TOC, 2/28/19

    Out of stock

    £56.99

  • Cyber Warfare and Cyber Terrorism

    IGI Global Cyber Warfare and Cyber Terrorism

    1 in stock

    Book SynopsisCyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems.

    1 in stock

    £123.00

  • Spam & Internet Privacy

    Nova Science Publishers Inc Spam & Internet Privacy

    1 in stock

    Book Synopsis

    1 in stock

    £64.49

  • Cybersecurity & Homeland Security

    Nova Science Publishers Inc Cybersecurity & Homeland Security

    Out of stock

    Book Synopsis

    Out of stock

    £52.49

  • Long-Term & Dynamical Aspects of Information

    Nova Science Publishers Inc Long-Term & Dynamical Aspects of Information

    Out of stock

    Book SynopsisThe first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?

    Out of stock

    £129.74

  • Surviving Cyberwar

    Government Institutes Inc.,U.S. Surviving Cyberwar

    Out of stock

    Book SynopsisMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: ·begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; ·follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; ·moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; ·provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and ·finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs. Trade ReviewRichard Stiennon's Surviving Cyberwar is not only a valuable primer on the alarmingly advanced state of the art of cyber conflict but a much-needed guide for companies, governments, and others on how to think about protecting themselves. -- Joseph Menn, author of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.Table of ContentsChapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions

    Out of stock

    £71.10

  • Surviving Cyberwar

    Government Institutes Inc.,U.S. Surviving Cyberwar

    Out of stock

    Book SynopsisMilitary and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. The book: ·begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs; ·follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world; ·moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries; ·provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and ·finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs. Trade ReviewRichard Stiennon's Surviving Cyberwar is not only a valuable primer on the alarmingly advanced state of the art of cyber conflict but a much-needed guide for companies, governments, and others on how to think about protecting themselves. -- Joseph Menn, author of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down the Internet.Table of ContentsChapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions

    Out of stock

    £43.20

  • Cybersecurity, Cyberanalysis & Warning

    Nova Science Publishers Inc Cybersecurity, Cyberanalysis & Warning

    1 in stock

    Book SynopsisCyber analysis and warning capabilities are critical to thwarting computer-based (cyber) threats and attacks. The Department of Homeland Security (DHS) established the United States Computer Emergency Readiness Team (US-CERT) to, among other things, co-ordinate the nation''s efforts to prepare for, prevent, and respond to cyber threats to systems and communications networks. The authors'' objectives were to (1) identify key attributes of cyber analysis and warning capabilities, (2) compare these attributes with US-CERT''s current capabilities to identify whether there are gaps, and (3) identify US-CERT''s challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability. To address these objectives, the authors identified and analysed related documents, observed operations at numerous entities, and interviewed responsible officials and experts.

    1 in stock

    £39.74

  • Computer Security: Intrusion, Detection &

    Nova Science Publishers Inc Computer Security: Intrusion, Detection &

    Out of stock

    Book SynopsisThe objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. This makes computer security particularly challenging because it is hard enough just to make computer programs do everything they are designed to do correctly. Furthermore, negative requirements are deceptively complicated to satisfy and require exhaustive testing to verify, which is impractical for most computer programs. Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. This book presents the latest research from around the globe in this ever-changing field.

    Out of stock

    £129.74

  • Interperetable AI

    Manning Publications Interperetable AI

    15 in stock

    Book SynopsisAI models can become so complex that even experts have difficulty understanding them—and forget about explaining the nuances of a cluster of novel algorithms to a business stakeholder! InterpretableAI is filled with cutting-edge techniques that will improve your understanding of how your AI models function. InterpretableAI is a hands-on guide to interpretability techniques that open up the black box of AI. This practical guide simplifies cutting edge research into transparent and explainable AI, delivering practical methods you can easily implement with Python and opensource libraries. With examples from all major machine learning approaches, this book demonstrates why some approaches to AI are so opaque, teaches you toidentify the patterns your model has learned, and presents best practices for building fair and unbiased models. How deep learning models produce their results is often a complete mystery, even to their creators. These AI"black boxes" can hide unknown issues—including data leakage, the replication of human bias, and difficulties complying with legal requirements such as the EU's "right to explanation." State-of-the-art interpretability techniques have been developed to understand even the most complex deep learning models, allowing humans to follow an AI's methods and to better detect when it has made a mistake.Trade Review“I think this is a valuable book both for beginners as well for more experienced users.”Kim Falk Jørgensen “This book provides a great insight into the interpretability step of developing a structured learning robust AI systems.” IzharHaq “Really great introduction to interpretability of ML models as well asgreat examples of how you can do it to your own models.” JonathanWood “Techniques are consistently presented with excellent examples.” JamesJ. Byleckie “A fine book towards making ML models less opaque.” AlainCouniot “Read this to understand what the model actually says about the underlying data.” Shashank Polasa “Everybody working with ML models should be able to interpret (and check) results. This book will help you with that.” KaiGellien

    15 in stock

    £36.09

  • Cyber Defenders' Career Guide

    Manning Publications Cyber Defenders' Career Guide

    10 in stock

    Book SynopsisKickstart a career in cyber security by learning how to adapt your existing technical and non-technical skills with Cyber Defenders' CareerGuide. Cyber Defenders' Career Guide unlocks your pathway to becoming a great security practitioner. You'll learn how toreliably enter the security field and quickly grow into your new career, following clear, practical advice that's based on research and interviews with hundreds of hiring managers. Author Alyssa Miller has spent over adecade in cyber security leadership and talent development, and she shares her unique perspective in this revealing industry guide. By some estimates, there are over 4 million unfilled jobs in cybersecurity. This important field is growing fast, with a huge demand for skilled recruits. But where do you start? How can you know you're ready? This book isyour invaluable guide to starting and navigating a rewarding security career.Trade Review“Alyssa Miller brilliantly explains the intricacies of cybersecurity and helps the reader navigate this complex moving landscape.” MarcRoulleau “A comprehensive guide on getting started in the field of Cybersecurity.” Dipen N. Kumar “Recommended for anyone wanting to work in security, no matter what part of security that is.” Jan Vinterberg “A highly recommended book for those looking to start their career in Cybersecurity, as well as those who are already part of the industry.” HarshRaval “An interesting guide to introduce yourself to the cybersecurity world.” Emanuele Origgi “A tremendous work in terms of the number of real-world examples.More than once I found myself smiling and nodding because the things the author described mirrored my experiences in being a mentor to a cybersecurity-focused community.” Rob Goelz “Very smart and definitely worth reading. I particularly loved thepart about mentoring.” Rafik Naccache “It's the most complete written introduction to a successful career approach I know.” Joerg Discher “Even if you decide that cyber security is not the right career path for you, it's full of good advice for taking charge of your career intech.” Amanda Debler

    10 in stock

    £37.99

  • Federal Cybersecurity Planning: Human Capital &

    Nova Science Publishers Inc Federal Cybersecurity Planning: Human Capital &

    1 in stock

    Book Synopsis

    1 in stock

    £46.49

  • Federal Information Security: Select Protection &

    Nova Science Publishers Inc Federal Information Security: Select Protection &

    1 in stock

    Book Synopsis

    1 in stock

    £106.49

  • Trust Extension as a Mechanism for Secure Code

    Morgan & Claypool Publishers Trust Extension as a Mechanism for Secure Code

    15 in stock

    Book SynopsisAs society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted.In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today.Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner.Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

    15 in stock

    £51.00

  • The Target Store Data Breaches: Examination and

    Nova Science Publishers Inc The Target Store Data Breaches: Examination and

    1 in stock

    Book Synopsis

    1 in stock

    £122.99

  • ACE - CISSP - Essential Approach To The Exam

    White Falcon Publishing ACE - CISSP - Essential Approach To The Exam

    1 in stock

    Book Synopsis

    1 in stock

    £47.50

  • Information Technology Protection and Homeland

    Rowman & Littlefield Information Technology Protection and Homeland

    Out of stock

    Book SynopsisThe eleventh volume of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Information Technology Protection and Homeland Security is an eye-opening account of a diverse and complex sector. This book describes the processes needed to identify assets, assess risk, implement protective programs and resilience strategies, and measure their effectiveness. While the IT sector can never be made immune to all possible intrusions or hacks, a concerted, well thought out effort to incorporate security upgrades along with careful planning for facilities can help minimize attacks. Although Information Technology Protection and Homeland Security was written to serve information technology (IT) personnel, project designers, communications technicians, and all computer operators who have an interest in the IT sector, the text is accessible to those who have no experience with the IT sector. While working through the text systematically, the reader will gain an understanding of the need for a heightened sense of awareness of the present threat facing the IT sector. Moreover, the reader will gain knowledge of security principles and measures that can be implemented—adding a critical component to not only the reader's professional knowledge but also providing them the tools needed to combat terrorism. Other books in the Critical Infrastructure and Homeland Security Series include: Dam Sector Protection and Homeland Security Energy Infrastructure Protection and Homeland Security Food Supply Protection and Homeland Security Transportation Protection and Homeland Security Government Facilities Protection and Homeland Security

    Out of stock

    £79.20

  • Goodheart-Wilcox Publisher Security Essentials

    Out of stock

    Book Synopsis

    Out of stock

    £147.60

  • Goodheart-Wilcox Publisher Security Essentials

    Out of stock

    Out of stock

    £38.76

  • Cybersecurity: What You Need to Know About

    Bravex Publications Cybersecurity: What You Need to Know About

    1 in stock

    Book Synopsis

    1 in stock

    £26.99

  • Current Trends in Cyber Security

    Academica Press Current Trends in Cyber Security

    Out of stock

    Book SynopsisThis groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors—all leaders in their fields—have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify patterns of analytical error that may guide security officials and policymakers as they examine the issue of cyber security before them today. French military academy instructor Thomas Flichy de La Neuville suggests another historical parallel, locating an important precursor to current debates about internet freedom in the waning control of information during the French Revolution. Italian academics Alessandro Guarino and Emilio Iasiellotake up an industrial case study, that of self-driving motor vehicles, to examine how cyberthreats might effect business and industry as they become ever more dependent on technology in the twenty-first century. Finally, the Indian scholar Sushma Devi presents a national case study, that of her native India, to assess how one of the world’s most dynamic emerging economies is facing up to what was originally a first world problem. This collection anticipates endless analysis of the rapidly expanding nexus of cyber security and intelligence. It will be of undoubted use to anyone concerned with technology, the security of online business presences, national security, communications, and any other field of endeavor that will benefit from the knowledge of experts in the field.

    Out of stock

    £164.05

  • Cyber-Physical Threat Intelligence for Critical

    now publishers Inc Cyber-Physical Threat Intelligence for Critical

    1 in stock

    Book SynopsisModern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.Table of Contents Preface Part I: Securing Critical Infrastructures of the Financial Sector Security Challenges for the Critical Infrastructures of the Financial Sector A Reference Architecture for Securing Infrastructures in the Finance Sector FINSTIX: A Security Knowledge Base for the Finance Sector Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach Automated Assistance to the Security Assessment of APIs for Financial Services Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and ServicesPart II: Securing Critical Infrastructures of the Health Sector Security Challenges for the Critical Infrastructures of the Healthcare Sector Security Systems in the Healthcare Sector Integrated Cyber-Physical Security Approach for Healthcare Sector Vulnerability and incident propagation in cyber-physical systems Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare SectorPart III: Securing Critical Infrastructures of the Energy Sector Security Challenges for the Critical Infrastructures of the Energy Sector Securing CEI by-design Securing CEI by-innovationPart IV: Securing Critical Infrastructures of the Communications Sector Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector Resilience enhancement and risk control Platform for Communication Infrastructure Operators Managed Security on 5G communication networks: the Software Defined Security paradigmPart V: Sector Agnostic Issues in Critical Infrastructures Protection Detection of innovative low-rate denial of service attacks against critical infrastructures Resilience analysis and quantification for Critical Infrastructures CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support Modern innovative detectors of physical threats for Critical Infrastructures The Ethical Aspects of Critical Infrastructure Protection

    1 in stock

    £77.40

  • Cyber Attack Survival Manual: From Identity Theft

    Weldon Owen Cyber Attack Survival Manual: From Identity Theft

    10 in stock

    Book SynopsisAs we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves.  Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.  But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target - along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.  Packaged in a durable, wipe-clean flexicover with metallic corner-guards, this practical manual withstands heavy-duty use indoors and out.With all the surrounding threats, what better person to prepare the public, than a team of internationally known cybersecurity experts? Nick Selby is a police detective specializing in sharing intelligence and busting cybercriminals. He knows how these crimes happen, who does them, and how to make your life safer. In The Cyber Attack Survival Manual he and a veritable brain trust of experts from the world of intelligence, digital currency, vehicle-hacking, and sophisticated crimeware, share the best techniques for everyone. This indispensable, step-by-step guide to cyber defense includes: Everyday security: How to keep your identity from being stolen, protect your kids, protect your cards and much more. Big Stories: Silk Road, Ashley Madison, FBI vs. Apple, WikiLeaks, BitCoins, and what they mean to individuals and society at large. Global issues: the NSA, how hackers can crash your car, and is China really planning to crash Google? Crucial to surviving the worst the Internet can throw at you, The Cyber Attack Survival Manual is the must-have book of the 21st century. Think you don’t need this book because, “I have nothing to hide”? Selby and Vescent, along with Eric Olson, Moeed Siddiui, and John Bear, show you why you’re wrong (everyone now has something to hide) - and how lack of security can endanger your finances, your safety, and your reputation.

    10 in stock

    £21.38

  • Foundations Of Information Security: A

    No Starch Press,US Foundations Of Information Security: A

    2 in stock

    Book SynopsisFoundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.Trade Review“This book is an excellent starting point for future security professionals but also network and system administrators.”—Help Net Security"A thorough overview for many different areas within security. The author explains what and more importantly why, then illustrates each concept with concrete, realistic examples. Definitely a great addition to any security engineer's library, but also less technical people who want to learn more about common topics like defense in depth."—Seth Foley"If you’re new to info security or are looking to refresh your knowledge, then this is an ideal book. It’s easy to read and makes the information fun to consume."—HaXez, Blogger and YouTuberTable of ContentsIntroductionChapter 1: What is Information Security?Chapter 2: Indentification and AuthenticationChapter 3: Authorization and Access ControlChapter 4: Auditing and AccountabilityChapter 5: CryptographyChapter 6: Compliance, Laws, and RegulationsChapter 7: Operations SecurityChapter 8: Human Element SecurityChapter 9: Physical SecurityChapter 10: Network SecurityChapter 11: Operating System SecurityChapter 12: Mobile, Embedded, and Internet of Things SecurityChapter 13: Application SecurityChapter 14: Assessing SecurityNotes

    2 in stock

    £28.49

  • Computer & Internet Security: A Hands-on Approach

    1 in stock

    £56.99

  • Technocreep: The Surrender of Privacy and the

    Greystone Books,Canada Technocreep: The Surrender of Privacy and the

    3 in stock

    Book Synopsis"Technology is rapidly moving into our bodies," writes cyber expert Keenan, "and this book gives a chilling look ahead into where that road may lead us -- on a one way trip to the total surrender of privacy and the commoditization of intimacy." Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door. Take, for example, "Girls Around Me": a Russian-made iPhone App that allowed anyone to scan the immediate vicinity for girls and women who checked in on Foursquare and had poorly secured Facebook profiles. It combined this information in a way never intended by the original poster. Going to a Disney theme park? Your creepy new "MagicBand" will alert Minnie Mouse that you're on the way and she'll know your kid's name when you approach her. Thinking about sending your DNA off to Ancestry.com for some "genetic genealogy"? Perhaps you should think again: your genetic information could be used against you. "This masterful weaving of the negatives and positives of technology makes for a book that is realistic about technology's perils yet optimistic about it's great potential." --Foreword ReviewsTrade Review"This book should be read by anyone who uses a smartphone, computer or other device connected to the internet. It won't make you feel better, but at least you'll know what you're up against." Ron Jacobs, CounterPunch "Keenan lays out the evidence calmly, methodically and without polemics: he lets the evidence speak for itself. This is not to say the book is devoid of humour--far from it! But his wit, like his politics, takes a back seat to the civil and civic-minded purpose of his endeavor."— The Rumpus "This masterful weaving of the negatives and positives of technology makes for a book that is realistic about technology's perils yet optimistic about it's great potential."—Barry Silverstein, Foreword Reviews

    3 in stock

    £11.99

  • Security Operations in Practice

    BCS Learning & Development Limited Security Operations in Practice

    Out of stock

    Book SynopsisSecurity operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and develop a highly effective security operations team. This requires more than just purchasing a series of information security tools, plugging them in and hoping for the best. As you will learn, it's about hiring the right people to work together, understanding the business the team is working to protect, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.Trade Review'Mike masterfully combines a coverage of the fundamental building blocks of a security operations program with the tactical insight he has gained from his experience in the trenches. This book holds valuable insights for both the budding security engineer and the seasoned veteran.' -- Chad Butler * Director - Application Security, Disney *'A good read and food for thought for Security Operations professionals.' -- David King * Regional Information Security Officer EMEA, Omnicom Media Group *'Beginners and veterans alike will learn from a professional who has clearly earned his wisdom. This sensible and practical guide to security operations is on my desktop, not in my bookshelf.' -- Jeff Costlow * Deputy CISO, ExtraHop Networks *Table of Contents Introduction Establishing A Security Operations Team Monitoring Networks and Clouds Managing Endpoint Devices Protecting Data Identity and Access Management Incident Detection and Response Vulnerability Management Building Relationships and Trust Beyond the Enterprise Red Teaming and Threat Hunting Building Bespoke Tools Physical Security Conclusion

    Out of stock

    £34.99

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account