Catalog Search Results
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Publisher
Packt Publishing
Pub. Date
2022.
Language
English
Description
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence Key Features Understand best practices for detecting, containing, and recovering from modern cyber threats Get practical experience embracing incident response using intelligence-based threat hunting techniques Implement and orchestrate different incident response, monitoring, intelligence, and investigation platforms Book...
Author
Publisher
BCS, The Chartered Institute for IT
Pub. Date
[2022]
Language
English
Description
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Author
Publisher
Greenleaf Book Group Press
Pub. Date
[2020]
Language
English
Description
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge the author has acquired during two decades...
Author
Publisher
Apress
Pub. Date
[2022]
Language
English
Description
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner's guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available-many with sound advice, management approaches, and technical solutions-but few with one common theme that pulls together management and technology, with...
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
[2023]
Language
English
Description
"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On...
Author
Series
Publisher
Springer
Pub. Date
[2019]
Language
English
Description
Understand critical cybersecurity and risk perspectives, insights, and tools for the leaders of complex financial systems and markets. This book offers guidance for decision makers and helps establish a framework for communication between cyber leaders and front-line professionals. Information is provided to help in the analysis of cyber challenges and choosing between risk treatment options. Financial cybersecurity is a complex, systemic risk challenge...
Series
Publisher
IBM
Pub. Date
2022.
Language
English
Description
The focus of this Blueprint publication is to highlight the early threat detection capabilities of IBM® QRadar® and to show how to proactively start a cyber-resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM's Copy Services Manager as orchestration software to start IBM Spectrum Virtualize for Public Cloud (SV4PC) Safeguarded Copy functions. The IBM SV4PC Safeguarded Copy function creates an immutable...
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022.
Language
English
Description
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisions Key Features Build the analytics skills and practices you need for analyzing, detecting, and preventing cyber threats Learn how to perform intrusion analysis using the cyber threat intelligence (CTI) process Integrate threat intelligence into...
Publisher
Syngress is an imprint of Elsevier
Pub. Date
[2017]
Language
English
Description
"Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible...
11) The art of cyberwarfare: an investigator's guide to espionage, ransomware, and organized cybercrime
Author
Publisher
No Starch Press Inc
Pub. Date
2022.
Language
English
Description
"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"--
Author
Publisher
Rowman & Littlefield
Pub. Date
[2016]
Language
English
Appears on list
Description
Examines the ongoing cybersecurity attacks on government and business sites in the United States and describes the internal power struggles within the Obama administration, Congress, and the business community to contain and prevent them.
Author
Series
Publisher
IBM Corporation, IBM Redbooks
Pub. Date
[2019]
Language
English
Description
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management software for deep inspection, detection, and prioritization of threats has become a necessity of any business. This IBM® Redpaper publication explains how the storage features of IBM Spectrum® Scale, combined with the log analysis, deep inspection, and detection of threats provided by IBM QRadar®, helps reduce the impact of incidents...
Author
Publisher
Packt Publishing
Pub. Date
2019.
Language
English
Description
A comprehensive guide that will give you hands-on experience to study and overcome financial cyber threats Key Features Protect your financial environment with cybersecurity practices and methodologies Identify vulnerabilities such as data manipulation and fraudulent transactions Provide end-to-end protection within organizations Book Description Organizations have always been a target of cybercrime. Hands-On Cybersecurity for Finance teaches you...
Author
Publisher
Hanover Square Press
Pub. Date
[2021]
Language
English
Description
"The United States may seem safe from within but beyond its borders, a new enemy rises. An American ship has vanished. The president has tasked the new cyber-intelligence agency, Net Force, with finding out what happened to the vessel. But their investigation reveals a plan that could trigger a world war. Their only option is to strike first. Through the streets of New York, a secret city in Crimea and the depths of the South China Seas, Net Force...
Author
Publisher
Crown
Pub. Date
[2019]
Language
English
Description
"A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets....
Author
Publisher
Rowman & Littlefield
Pub. Date
2020.
Language
English
Description
"Based on insider accounts and exclusive interviews with experts, "Cyber in the Age of Trump" offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger"--
Author
Publisher
Harvard University Press
Pub. Date
2020.
Language
English
Description
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
Author
Publisher
Rowman & Littlefield
Pub. Date
[2020]
Language
English
Description
"Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake"...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request