It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Cyber Operations by Mike O'LearyCyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
Publication Date: 2015
Dark Territory by Fred KaplanAn eye-opening history of our government's efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web.
Essential Cybersecurity Science by Josiah DykstraIf you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.
Securing an IT Organization Through Governance, Risk Management, and Audit by Kenneth Sigler; James L. RaineyEmphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models.
Beyond Cybersecurity by James M. Kaplan; Tucker Bailey; Derek O'Halloran; Alan Marcus; Chris RezekMove beyond cybersecurity to take protection of your digital business to the next level Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style.
Cybersecurity by Thomas J. MowbrayThis essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession.
The Defender's Dilemma by Martin C. Libicki; Lillian Ablon; Tim WebbThis report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures--and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.