|
 |
|
 |
|
|
 |
|  |
|
Название: Ultimate Guide to CGRC Certification: Prepare for CGRC with domain insights and test strategies Автор: Arun Kumar Chaudhary Издательство: BPB Publications Год: 2025 Страниц: 528 Язык: английский Формат: pdf, epub (true) Размер: 12.6 MB
In today's interconnected world, organizations face increasing challenges in managing the complex landscape of information security, risk, and compliance. This book provides a practical framework for navigating these challenges, enabling professionals to establish and maintain robust systems that protect sensitive data, adhere to regulatory requirements, and mitigate potential threats. This book covers the core domains of CGRC, beginning with foundational security principles, governance structures, and risk assessment, including standards like NIST RMF and SP 800-53. This book offers a comprehensive analysis of GRC fundamentals such as risk management, internal controls, compliance, corporate governance, control selection, implementation, and enhancement, and addressing frameworks like CIS Benchmarks and privacy regulations, including GDPR and PDPA. The book also contains sample questions, case studies, and real-world examples to show the application of GRC concepts in different organizational settings. Security professionals can make various pathways with regulatory requirements, compliance standards, sectors of industry, and managed environments. This guide is designed for both beginners and experienced risk professionals, including GRC managers, security analysts, cybersecurity auditors, and compliance officers. |
Разместил: Ingvar16 5-07-2025, 05:28 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cyber Risk Management in Practice: A Guide to Real-World Solutions Автор: Carlos Morales Издательство: CRC Press Год: 2026 Страниц: 361 Язык: английский Формат: pdf (true), epub (true) Размер: 34.1 MB
Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge. A ‘risk’ in the cyber world refers to the potential for experiencing harm or loss because of a threat exploiting a vulnerability in our systems or processes. It’s vital that everyone understands a risk is not just any problem; it’s a specific issue that arises from the intersection of a threat with a vulnerability. To have a risk, we must find the three key components of risk: Threat, Vulnerability, and Impact. |
Разместил: Ingvar16 5-07-2025, 04:17 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Managing the Cyber Risk: A CISO's practical guide to threat and vulnerability management Автор: Saurabh Mudgal Издательство: BPB Publications Год: 2025 Страниц: 502 Язык: английский Формат: epub (true) Размер: 10.1 MB
In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a journey through the evolving threat landscape, dissecting attacker motivations and methods, and recognizing modern dangers like AI-driven attacks and cloud vulnerabilities. You will learn to quantify the real-world cost of cybercrime, providing a clear justification for robust security measures. The book guides you through building a powerful vulnerability management program, covering asset discovery, scanning techniques (including penetration testing and threat intelligence integration), in-depth risk analysis using CVSS, and effective prioritization and remediation strategies. Finally, it teaches advanced techniques like continuous threat detection and response, deception technologies for proactive threat hunting, integrating security into development pipelines with DevSecOps, and understanding future trends shaping cybersecurity. This book is for cybersecurity professionals, including managers and architects, IT managers, system administrators, security analysts, and CISOs seeking a comprehensive understanding of threat and vulnerability management. |
Разместил: Ingvar16 4-07-2025, 22:13 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Google Cloud Associate Cloud Engineer Certification Guide: A comprehensive guide to implementing, managing, and monitoring Google Cloud solutions Автор: Arijit Sarkar Издательство: BPB Publications Год: 2025 Страниц: 378 Язык: английский Формат: epub (true) Размер: 26.6 MB
With the emergence of cloud computing, organizations are moving their workloads to the public cloud to reduce the capital expenditure towards on-premises IT infrastructure. Google Cloud Platform is one of the major public cloud platforms. Hence, learning about it in depth is crucial for anyone aiming to excel in the cloud computing landscape. This book systematically explores GCP, starting with cloud fundamentals and an overview of GCP services, followed by the ACE exam scope. You will gain practical skills in the console, Cloud Shell, billing, APIs, and IAM, and explore storage (GCS) and databases (Cloud SQL, Spanner). You will master compute through VMs, Cloud Run, GKE, App Engine, Cloud Functions, learn networking with VPC, firewall rules, load balancing, DNS, CDN, and NAT, and discover Big Data, AI/ML, deployment, and monitoring. You will understand the application lifecycle and ACE exam specifics with practice simulations. This book is for IT professionals familiar with on-premises infrastructure or those new to public cloud, including system administrators, developers, and cloud enthusiasts. |
Разместил: Ingvar16 3-07-2025, 06:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Fostering Machine Learning and IoT for Blockchain Technology: Smart Cities Applications, Volume 2 Автор: Khaleel Ahmad, Uma N. Dulhare, Mohammad Sufian Badar, Jameel Ahamed, M.A. Rizvi Издательство: Springer Серия: Transactions on Computer Systems and Networks Год: 2025 Страниц: 311 Язык: английский Формат: pdf (true), epub Размер: 52.1 MB
The book covers Blockchain Technology and its emerging field by developing socio-economic systems viz. efficiently establishing transparency, trust, increasing utilization of various resources, and reducing costs. This book is organized into 2 volumes that provide an overview of Blockchain technology foundations of Blockchain, Machine Learning and Distributed Systems, Cryptography, Consensus algorithm, Bitcoin concepts, and its properties, Smart Contracts, developing knowledge of tools like Hyperledger, Multichain, Ethereum, etc. Machine Learning algorithms, applications of a smart city using Machine Learning and blockchain technology. While this book dwells on the foundations of Blockchain Technology as a part of transparency, scalability, integrity, security, and how the Machine Learning algorithms integrate with blockchain technology-based smart city applications, it will also focus on contemporary topics for Research and Development in various sectors. With an in-depth knowledge of the technology underlying various platforms such as Bitcoin, Ethereum, and Hyperledger. |
Разместил: Ingvar16 3-07-2025, 03:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CompTIA Network+ Certification Guide (Exam N10-009): Unleash your full potential as a network administrator - 2nd Edition Автор: Eithne Hogan Издательство: BPB Publications Год: 2025 Страниц: 740 Язык: английский Формат: epub (true) Размер: 29.1 MB
Network administrators are crucial in safeguarding data through cybersecurity, optimizing cloud resources, and ensuring secure remote connections, vital for maintaining seamless IT infrastructures. CompTIA Network+ Certification has become the industry standard for validating essential networking skills, making it crucial for IT professionals seeking to establish or advance their careers in network administration. Beginning with networking fundamentals including OSI models, TCP/IP protocols, and Wireshark analysis, it progresses through network topologies, cable installation, IP addressing, and subnetting practices. The second edition includes new content reflecting changes in the exam, such as evolving use cases for modern networks, important factors of physical installations, and additional details on implementing IPv4 and IPv6 network services. The content incorporates an acute awareness of security in network operations. Upon completing this guide, you will possess comprehensive Network+ knowledge and practical skills necessary to confidently pass the N10-009 exam and immediately contribute as a competent network administrator in any enterprise environment. This book is designed for individuals who aspire to pursue a rewarding career in network administration. |
Разместил: Ingvar16 2-07-2025, 20:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mastering Mobile Network and Related Security: Protecting telecom networks in a connected world Автор: Tiju Johnson Издательство: BPB Publications Год: 2025 Страниц: 732 Язык: английский Формат: epub (true) Размер: 18.2 MB
In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, this book delivers a thorough examination of vulnerabilities, attack vectors, and defense strategies that every telecom professional must understand. This book systematically covers the entire mobile security spectrum. Whether you are a security specialist seeking telecom-specific expertise, an engineer responsible for secure network design, an executive making strategic security investments or a student preparing for a career in telecommunications, this book provides the knowledge you need to protect critical telecom infrastructure. This book is intended for security professionals, telecom engineers, executives, and students looking to understand the security landscape of modern telecommunications networks. |
Разместил: Ingvar16 2-07-2025, 19:39 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Applying Blockchain Technology: Concepts and Trends Автор: Javaid Iqbal, Alwi Bamhdi, Bilal Ahmad Pandow, Faheem Syeed Masoodi Издательство: CRC Press Год: 2025 Страниц: 288 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
Blockchain technology has the potential to revolutionize the way to conduct transactions and share information. It is having a significant impact on a wide range of industries. Applying Blockchain Technology: Concepts and Trends is an in-depth guide exploring the world of blockchain technology. Beginning with an introduction to concepts related to blockchain and its application, the book delves into the benefits and challenges of using blockchain in various industries, including healthcare, finance, real estate, voting, and supply chain management. It discusses potential ethical considerations associated with blockchain technology and how to design and implement blockchain solutions ethically. The book covers practical applications of blockchain in different industries, as well as its potential for use with IoT, smart grids, and cloud computing. Moreover, the book provides an in-depth discussion on the implications of blockchain on the financial system, as well as the potential of blockchain to disrupt the traditional ways of conducting business. The practical examples and case studies in the book are suitable for students, professionals, and researchers interested in learning about the latest trends in blockchain technology. |
Разместил: Ingvar16 30-06-2025, 20:26 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mastering Network Flow Traffic Analysis: Implementing and analyzing flow data across network topologies for threat detection Автор: Gilberto Persico Издательство: BPB Publications Год: 2025 Страниц: 330 Язык: английский Формат: pdf, epub (true) Размер: 13.1 MB
The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security. Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. This book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended. |
Разместил: Ingvar16 25-06-2025, 20:12 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mastering Honeypots: Art of deception for cybersecurity defense Автор: Mukesh Choudhary Издательство: BPB Publications Год: 2025 Страниц: 354 Язык: английский Формат: epub (true) Размер: 10.8 MB
Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future attacks. This book simplifies the concept of honeypots, which are important tools in cybersecurity. The book explains their history, types, and how to design and use them effectively. It includes practical advice on setting up honeypots, monitoring them, and analyzing attacks. It also offers strategies for blue team professionals, like SOC analysts, to improve defenses and serves as a helpful resource for purple team members to practice detecting attacks. Additionally, it discusses how honeypots contribute to threat intelligence and cybersecurity training, including new ideas like quantum honeypots, preparing professionals to face modern cyber threats. This book is a vital resource for CTOs, CISOs, InfoSec managers, InfoSec analysts, and network admins. This book will help students and researchers who are working in the domain of cybersecurity. |
Разместил: Ingvar16 25-06-2025, 17:22 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|