NIST Cybersecurity Framework: A pocket guide
This pocket guide serves as an introduction to the National Institute of Standards and Technology (NIST) and to its Cybersecurity Framework (CSF). This is a US focused product.
The Comprehensive Guide to Cybersecurity's Most Infamous Hacks
... cybersecurity training and developing more robust security measures to protect against similar threats. The impact of the AIDS Trojan extended beyond the immediate effects on the victims, influencing the broader perception of cybersecurity ...
Cybersecurity
In Cybersecurity and Cyerbwar: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed.
Cybersecurity in Our Digital Lives
Did you know your car can be hacked? Your medical device? Your employer’s HVAC system? Are you aware that bringing your own device to work may have security implications?
The Cybersecurity Playbook for Modern Enterprises
By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.
Developing a Cybersecurity Framework for Small and Medium Enterprises in the UK
... cybersecurity. These studies focus on the need to develop effective and affordable cybersecurity solutions to address the needs of SMEs which are in a different risk category from larger organizations (Benz and Chatterjee, 2020). The ...
Cybersecurity Capabilities in Developing Nations and Its Impact on Global Security
Focusing on topics such as data privacy and security issues, this book is an essential reference source for researchers, university academics, computing professionals, and upper-level students in developing countries interested in the ...
Cybersecurity For Dummies
How to defend against them? What to do if your personal or business information is compromised? Cybersecurity For Dummies gives you all that information and much more, in language you can understand without a PhD in technology.
Rule of Law in Cyberspace and the Way to Cybersecurity based on Human Rights
... cyber security based on human rights. On the one hand cybersecurity itself means the collection of tools, policies, security concepts, security safeguards, guidelines, training, best practices, assurance and technologies that can be ...
Cybersecurity and Decision Makers
Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, ...
Cybersecurity Risk Management
Filled with clear and easy-to-follow advice, this book also offers readers: A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities ...
Tribe of Hackers
This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.
Enterprise Cybersecurity in Digital Business
The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how ...
Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture
This book has 8 chapters describing these projects in detail with recipes on how to use opensource tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment.
Cybersecurity
Cybersecurity issues routinely make the news, and their prevalence is only growing.
Cybersecurity Fundamentals
This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied.
Cybersecurity in Humanities and Social Sciences
The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity?
Blockchain Detection of Cybersecurity Attacks and Risk Management
This book provides invaluable insights into the importance of blockchain as a cyber defense, guiding readers through a journey from understanding blockchain mechanisms, principles, strategies, and technologies for protecting the cyber ...
Cybersecurity Essentials
This book covers each challenge individually for greater depth of information, with real-world scenarios that show what vulnerabilities look like in everyday computing scenarios.
Cybersecurity in Switzerland
Cybersecurity in Switzerland will be a stimulating read for anybody interested in cyber-security policy, including students, researchers, analysts and policy makers.
