1 - 20
Next
- Spafford, Eugene H., author.
- [First edition]. - Boston : Addison-Wesley, [2023]
- Description
- Book — 1 online resource (416 pages)
- Summary
-
175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isn't the user the weakest link? In Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us, three cybersecurity pioneers don't just deliver the first comprehensive collection of falsehoods that derail security from the frontlines to the boardroom; they offer expert practical advice for avoiding or overcoming each myth. Whatever your cybersecurity role or experience, Eugene H. Spafford, Leigh Metcalf, and Josiah Dykstra will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research. Throughout the book, you'll find examples drawn from actual cybersecurity events, detailed techniques for recognizing and overcoming security fallacies, and recommended mitigations for building more secure products and businesses. Read over 175 common misconceptions held by users, leaders, and cybersecurity professionals, along with tips for how to avoid them. Learn the pros and cons of analogies, misconceptions about security tools, and pitfalls of faulty assumptions. What really is the weakest link? When aren't "best practices" best? Discover how others understand cybersecurity and improve the effectiveness of cybersecurity decisions as a user, a developer, a researcher, or a leader. Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. "You are made to feel as if you would never fall for this and somehow this makes each case all the more memorable. ... Read the book, laugh at the right places, and put your learning to work. You won't regret it."--The Foreword by Vint Cerf, Internet Hall of Fame Pioneer Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details
- Cham, Switzerland : Springer, 2023.
- Description
- Book — 1 online resource
- Summary
-
- 1. Introductio
- n2. Cybersecurity Applications in Data Scienc
- e3. Cybersecurity Applications in Internet of Thing
- s4. Cybersecurity Applications in Artificial Intelligenc
- e5. Cybersecurity Applications in Robotic
- s6. Cybersecurity Applications in We
- b7. Cybersecurity Applications in High-Tech System
- s8. Cybersecurity Applications in Cyber-Physical System
- s9. Cybersecurity Applications in Mobile Device
- s10. Cybersecurity Applications in Digital Medi
- a11. Cybersecurity Applications in Cloud Computin
- g12. Cybersecurity Applications in Distributed System
- s13. Cybersecurity Applications in Vehicle
- s14. Cybersecurity Applications in Supply Chai
- n15. Cybersecurity Applications in Trustworthy Computin
- g16. Cybersecurity Applications in Database
- s17. Cybersecurity Applications in Operating System
- s18. Cybersecurity Applications in Softwar
- e19. Cybersecurity Applications in Virtualizatio
- n20. Cybersecurity Applications in Biometric
- s21. Cybersecurity Applications in Educatio
- n22. Cybersecurity Applications in Blockchain
- s23. Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Parker, Carey, author.
- 5th edition. - New York, NY : Apress, [2023]
- Description
- Book — 1 online resource (xxx, 591 pages) : illustrations
- Summary
-
- Chapter 1: Before We Begin
- Chapter 2: Cybersecurity 101
- Chapter 3: First Things First
- Chapter 4: Passwords
- Chapter 5: Computer Security
- Chapter 6: Lan Sweet Lan
- Chapter 7: Practice Safe Surfing
- Chapter 8: Secure Communication
- Chapter 9: Online Accounts and Social Media
- Chapter 10: Parental Guidance
- Chapter 11: Dont Be a Smart Phone Dummy
- Chapter 12: Odds and Ends
- Chapter 13: Parting Thoughts
- Chapter 14: Glossary.
(source: Nielsen Book Data)
- Möller, Dietmar. author.
- Cham : Springer, [2023]
- Description
- Book — 1 online resource (xviii, 420 pages) : illustrations.
- Summary
-
- Foreword
- Preface
- 1 Cybersecurity in Digital Transformation
- 2 Threats and Threat Intelligence
- 3 Intrusion Detection and Prevention
- 4 Cyber-Attacker Profiles, Cyber-Attack Models and Scenarios, and Cybersecurity Ontology
- 5 NIST Cybersecurity Framework and MITRE Cybersecurity Criteria
- 6 Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation
- 7 Cybersecurity Maturity Models and SWOT Analysis
- 8 Machine Learning and Deep Learning
- Glossary
- Index.
5. Hardware security primitives [2023]
- Tehranipoor, Mohammad H., 1974- author.
- Cham : Springer, 2023.
- Description
- Book — 1 online resource (356 p.)
- Summary
-
- Introduction.- Hardware Security Primitives and their Applications.- Racetrack PUF.- TERO PUF.- Direct Characterization PUF.- Volatile Memory Based PUF.- Emerging Memory Based PUF.- Extrinsic Characterization of PUF.- Radio PUFs and CoAs.- Optical PUFs.- True Random Number Generators.- Hardware Camouflaging.- Temper Detection Methods.- Embedded Watermarking.- Counterfeit and Recycled IC Detection.- Package-Level Counterfeit IC Detection.- Side Channels Protection in Cryptographic Hardware.- Fault Injection Resistant Cryptographic Hardware.- Energy and Performance Optimization for Cryptography.- Lightweight Cryptography.- Post-Quantum Cryptography.- Virtual Proof of Reality.- Analog Security.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kumar, Ashish (Data scientist), author.
- 1st edition. - Birmingham, UK : Packt Publishing Ltd., 2023.
- Description
- Book — 1 online resource (242 pages) : illustrations
- Summary
-
- Cover
- Title Page
- Copyright and Credit
- Dedicated
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Invisible Digitization Tsunami
- Chapter 1: Invisible Digitization Tsunami
- Digital transformation
- An invisible hand
- Summary
- Chapter 2: Going Digital
- Hello Alexa, Siri, Google, Cortana, and more
- The role of digital calendars
- Digital and physical socialization
- Cameras everywhere
- Digital wearables
- oh, my heart
- Advanced features in wearables
- What is real?
- Summary
- Chapter 3: Visible and Invisible Risks
- Risks in digital life
- Visible risks
- Invisible risks
- When does risk become visible?
- Hit by password phishing
- Use of your credit cards
- Ransomware
- Invading privacy and extortion/phone spying
- Summary
- Chapter 4: Remote Working and the Element of Trust
- Remote working
- not new for everyone
- Pandemic and remote working
- View of remote working for various industries
- Risks to organizations
- Summary
- Chapter 5: The Emergence of Zero Trust and Risk Equation
- Zero Trust in real life
- Zero Trust is a new digital transformation
- Lesson learned from a global pandemic
- Modern principles of Zero Trust
- The NIST approach to Zero Trust architecture
- The Sunburst attack example
- Zero Trust across the digital estate
- Example of controlling access with intelligent policies and continuous risk assessment
- Zero Trust makes compliance easier
- Isolation
- Monitoring and visibility
- Summary
- Part 2: Risk Redefined at Work
- Chapter 6: The Human Risk at the Workplace
- Innocent intent
- Start of day
- During the day
- Wrapping up
- A quick relook at the risks
- Good worker
- Start of the day
- During the day
- Wrapping up
- Self-obsessed
- Rebel intent
- Malicious intent
- Summary
- Chapter 7: Modern Collaboration and Risk Amplification
- Evolving to the new workspace, where the flow of information is versatile
- Versatile collaboration
- some questions
- Challenges of a hybrid setup
- Future devices and their risk profile
- Polarization of opinions and its possible impact on modern collaboration
- Summary
- Chapter 8: Insider Risk and Impact
- Case study
- insider risk at Roposo Ltd
- Context
- Actor and the plot
- The crime
- The aftermath
- The lessons
- Understanding the impact of insider risk
- Primary costs of insider risk
- A summarized view of the impact of insider risk
- Summary
- Chapter 9: Real Examples and Scenarios
- Insider risk
- definition and threat vectors
- Insider risk
- behaviors and technical trends to look out for
- Behavioral indicators
- Technical indicators
- Using the MITRE ATT&CK framework to detect insider threat and behavior
- Case study 1
- exploits in the life sciences sector
- Solution and outcome
- Case study 2
- a victim of a phishing attack
- Solution and outcome
- Case study 3
- working from home
- Solution and outcome
- Case study 4
- AT&T
- Alsmadi, Izzat, 1972- author.
- Second edition. - Cham : Springer Nature Switzerland AG, [2023]
- Description
- Book — 1 online resource : illustrations (chiefly color).
- Summary
-
- Introduction
- Acquisition Management
- Continuity Planning and Disaster Recovery
- Cyber Defense Analysis and Support
- Cyber Intelligence
- Cyber Intelligence Analysis
- Cyber Operational Planning
- Cyber Policy and Strategy Management
- Cyber Threat Analysis
- Cybersecurity Management
- Forensics Analysis
- Identity Management
- Incident Response.
- Wilson, Yvonne, author.
- Second edition. - New York : Apress, [2023]
- Description
- Book — 1 online resource (398 pages)
- Summary
-
- Chapter 1: The Hydra of Modern Identity
- Chapter 2: The Life of an Identity
- Chapter 3: Evolution of Identity
- Chapter 4: Identity Provisioning
- Chapter 5: OAuth 2.0 and API Authorization
- Chapter 6: OIDC OpenID Connect
- Chapter 7: SAML 2
- Chapter 8: Authorization and Policy Enforcement
- Chapter 9: Sessions
- Chapter 10: Using Modern Identity to Build Applications
- Chapter 11: Single Sign-on
- Chapter 12: Strong Authentication
- Chapter 13: Logout
- Chapter 14: Account Management
- Chapter 15: Deprovisioning
- Chapter 16: Troubleshooting
- Chapter 17: Exceptions
- Chapter 18: Less Common Requirements
- Chapter 19: Failures
- Chapter 20: Compliance
- Chapter 21: Looking into the Crystal Ball
- Chapter 22: Conclusion
- Appendix A: Glossary
- Appendix B: Resources for Further Learning
- Appendix C: SAML Authentication Request and Response
- Appendix D: Public Key Cryptography
- Appendix E: Troubleshooting Tools
- Appendix F: Privacy Legislation
- Appendix G: Security Compliance Frameworks.
(source: Nielsen Book Data)
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource (ix, 215 pages) : illustrations (chiefly color).
- Summary
-
- 1. Design And Implementation Of Mobile Jammer For High Security System
- 2. Dual Security Based Attendence System By Using Face Recognition And Rfid With Gsm
- 3. Disasteranalysison Government Data
- 4. Edf: An Enhancement Of Droid Fusion Framework For Mitigation Of Multi Class Malware
- 5. Early Prediction Of Chronic Kidney Disease Using Predictive Analytics
- 6. Monitoring Suspicious Discussion On Online Forum
- 7. Ergonomicallydesignedsystem Forlicenseplate Recognition Usingimage Processingtechnique
- 8. Blockchain Based Privacy Securing G-Cloud Framework For E-Healthcare Service
- 9. Development Of Raspberry Pibot Surveillance Security System
- 10. Image Security Based On Rotational Visual Cryptography
- 11. Development Of Safety Monitoring For An Iot-Enabled Smart Environment
- 12. Deep Transfer Learning For Detecting Cyber Attacks
- 13. Data Security In Cloud With Hybrid Homomorphic Encryption Technique Using Gm Rsa Algorithm
- 14. Pragmatic Reform To Ameliorate Insider Data Theft Detection
- 15. Automatic Vehicle Alert And Accident Detection System Based On Cloud Using Iot
- 16. A Novel Architecture For Detecting And Preventing Network Intrusions
- 17. Cyber Hacking Breaches For Demonstrating And Forecasting
- 18. Enhancedsecurity With Crystographyusing Aes And Lsb
- 19. A Smart Security Systems Using National Instruments Myrio
- 20. Severity And Risk Predictions Of Diabetes On Covid-19 Using Machine Learning Techniques
- 21. Detection Of Cyber Threats In application platforms.
- Diogenes, Yuri, author.
- Third edition. - Birmingham, UK : Packt Publishing, 2022.
- Description
- Book — 1 online resource (570 pages)
- Summary
-
- Table of Contents Security Posture Incident Response Process What is a Cyber Strategy? Understanding the Cybersecurity Kill Chain Reconnaissance Compromising the System Chasing a User's Identity Lateral Movement Privilege Escalation Security Policy Network Security Active Sensors Threat Intelligence Investigating an Incident Recovery Process Vulnerability Management Log Analysis.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Wilhoit, Kyle.
- Birmingham : Packt Publishing, Limited, 2022.
- Description
- Book — 1 online resource (460 pages)
- Summary
-
- Table of Contents Why You Need a Threat Intelligence Program Threat Actors, Campaigns, and Tooling Guidelines and Policies Threat Intelligence Frameworks, Standards, Models, and Platforms Operational Security (OPSEC) Technical Threat Intelligence - Collection Technical Threat Analysis - Enrichment Technical Threat Analysis - Threat Hunting and Pivoting Technical Threat Analysis - Similarity Analysis Preparation and Dissemination Fusion into Other Enterprise Operations Overview of Datasets and Their Practical Application Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Routin, David, author.
- Birmingham, UK : Packt Publishing, 2022.
- Description
- Book — 1 online resource (xviii, 430 pages) : illustrations (some color).
- Summary
-
- Table of Contents Contextualizing Threats and Today's Challenges Purple Teaming - a Generic Approach and a New Model Carrying Out Adversary Emulation with CTI Threat Management - Detecting, Hunting, and Preventing Red Team Infrastructure Blue Team - Collect Blue Team - Detect Blue Team - Correlate Purple Team Infrastructure Purple Teaming the ATT&CK Tactics Purple Teaming with BAS and Adversary Emulation PTX - Purple Teaming eXtended PTX - Automation and DevOps Approach Exercise Wrap-Up and KPIs.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Choudhury, Ashish, author.
- Cham : Springer, [2022]
- Description
- Book — 1 online resource (xiii, 231 pages) : illustrations (some color).
- Summary
-
- Introduction.- Relevant Topics from Abstract Algebra.- Secret Sharing.- A Toy MPC Protocol.- The BGW Perfectly-Secure MPC Protocol for Linear Functions.- The BGW Perfectly-Secure MPC Protocol for Any Arbitrary Function.- Perfectly-Secure MPC in the Pre-Processing Model.- Perfectly-Secure MPC Tolerating General Adversaries.- Perfectly-Secure MPC for Small Number of parties.- The GMW MPC Protocol.- Oblivious Transfer.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Barker, Jessica (Cyber security), author.
- [First edition]. - Swindon, UK : BCS, The Chartered Institute for IT, [2021]
- Description
- Book — 1 online resource (120 pages) : illustrations
- Summary
-
- Introduction Understanding Cybersecurity Awareness Building Cybersecurity Awareness Understanding Cybersecurity Behaviour Changing Cybersecurity Behaviour Understanding Cybersecurity Culture Creating and Changing Culture Where Next? .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
15. Play it safe online [2021]
- Play it safe online (Handout)
- [Washington, D.C.] : Consumer Financial Protection Bureau, [2021]
- Description
- Book — 1 online resource (1 page) : illustrations
16. Juegue seguro, evite las estafas [2021]
- Play it safe online (Handout). Spanish.
- [Washington, D.C.] : Consumer Financial Protection Bureau, 2021
- Description
- Book — 1 online resource (1 page) : illustrations
17. Play it safe online [2021]
- Play it safe online (Placemat)
- [Washington, D.C.] : Consumer Financial Protection Bureau, [2021]
- Description
- Book — 1 online resource (1 page) : color illustrations
18. Juegue seguro, evite las estafas [2021]
- Play it safe online (Placemat). Spanish.
- [Washington, D.C.] : Consumer Financial Protection Bureau, 2021
- Description
- Book — 1 online resource (1 page) : illustrations
19. Adaptive autonomous secure cyber systems [2020]
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (x, 289 pages) : color illustrations
- Summary
-
- 1. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems.-
- 2. Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges.-
- 3. Exploring Adversarial Artificial Intelligence for Autonomous Adaptive Cyber Defense.-
- 4. Can Cyber Operations be Made Autonomous? An Answer from the Situational Awareness Viewpoint.-
- 5. A framework for studying autonomic computing models in cyber deception.-
- 6. Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis.-
- 7. Automated Cyber Risk Mitigation: Making Informed Cost-effective Decisions.-
- 8. Plan Interdiction Games.-
- 9. Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance.-
- 10. Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense.-
- 11. Online Learning Methods for Controlling Dynamic Cyber Deception Strategies.-
- 12. Phishing URL Detection with Lexical Features and Blacklisted Domains.-
- 13. An Empirical Study of Secret Security Patch in Open Source Software.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham : Springer, 2020.
- Description
- Book — 1 online resource (153 pages)
- Summary
-
- Chapter 1. Introduction.-
- Chapter 2. Security Design.-
- Chapter 3. Authentication.-
- Chapter 4. Authorization.-
- Chapter 5. Cryptography.-
- Chapter 6. Virtualization.-
- Chapter 7. Security principles.-
- Chapter 8. Malware.-
- Chapter 9. SQL Injection.-
- Chapter 10. DoS.-
- Chapter 11. Worms.-
- Chapter 12. Virus.-
- Chapter 13. Malicious Code.-
- Chapter 14. Intrusion Detection Systems.-
- Chapter 15. Vulnerability.-
- Chapter 16. Cyber Laws.-
- Chapter 17. Cyber Crime.-
- Chapter 18. Homeland Security.-
- Chapter 19. Cryptocurrency.-
- Chapter 20. BitCoin.-
- Chapter 21. Block chain.-
- Chapter 22. Phishing.-
- Chapter 23. Spoofing.-
- Chapter 24. Cyber War.-
- Chapter 25. Hacktivism.-
- Chapter 26. Distributed Denial of Service (DDoS).-
- Chapter 27. Identity Fraud.-
- Chapter 28. Honeypot.-
- Chapter 29. Keylogging.-
- Chapter 30. Scareware.-
- Chapter 31. Spam.-
- Chapter 32. Sponsored Attacks.-
- Chapter 33. Sneakernet.-
- Chapter 34. Virtual Militray Technologies.-
- Chapter 35. Zero Day.-
- Chapter 36. Intrusion prevention system (IPS).-
- Chapter 37. Macro virus.-
- Chapter 38. Wannacry.-
- Chapter 39. Conclusion.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.