You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage o...
A guide to hacking the human element. Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature. Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative ...
A celebration of and behind-the-scenes look at Jerry Seinfeld’s groundbreaking streaming series Comedians in Cars Getting Coffee. Over eleven seasons and eighty-four episodes, Jerry Seinfeld drove around in classic cars, grabbing coffee and chatting with the funniest people alive. He reminisced with the late Garry Shandling; bantered with legends Steve Martin, Tina Fey, and Eddie Murphy; reunited with the cast of Seinfeld; and even paid a visit to President Barack Obama in the Oval Office. These and dozens of other guests talked about the intricacies of stand-up, the evolution of their careers and personal lives, and whatever else popped into their brilliant minds. The result was not only ...
Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book. Explore the intersection of mathematics and computer security with this engaging and accessible guide. Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s...
None
Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you...
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an over...
Science fiction, fantasy and horror movies have spawned more sequels and remakes than any other film genre. Following Volume I, which covered 400 films made 1931-1995, Volume II analyzes 334 releases from 1996 through 2016. The traditional cinematic monsters are represented--Dracula, Frankenstein, the Wolf Man, a new Mummy. A new wave of popular series inspired by comics and video games, as well as The Lord of the Rings trilogy, could never have been credibly produced without the advances in special effects technology. Audiences follow the exploits of superheroes like Captain America, Iron Man, Spider-Man and Thor, and such heroines as the vampire Selene, zombie killer Alice, dystopian rebels Katniss Everdeen and Imperator Furiosa, and Soviet spy turned American agent Black Widow. The continuing depredations of Jason Voorhees, Freddy Krueger and Michael Myers are described. Pre-1996 movies that have since been remade are included. Entries features cast and credits, detailed synopsis, critics' reviews, and original analysis.
Tennis legend Serena Williams has been competing for more than 20 years and continues to dominate the court while inspiring young tennis fans around the world. Learn about her 23 singles Grand Slam titles, her fashion line, and more.