As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to …
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, …
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they …
In the past decades, cyber-physical systems (CPSs) have been widely applied to fields such as smart grids, environment monitoring, aerospace, …
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA …
For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to …
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who …
Spitzner defines the various types of "honeypots" that are used to emulate security breeches on computer networks, allowing system administrators …
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical …
These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear …
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, …
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of …
Network security is concerned with creating a secure inter-connected network that is designed so that on the one hand, users …
SEC401.1: Network Security Essentials Overview A key way that attackers gain access to a company's resources is through a network …
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter …
Your one-stop guide to using Python along with creating your own hacking tools, and make the most out of available …
Incident response is a multidisciplinary science that resolves computer crime and complex legal issues, chronological methodologies and technical computer techniques. …
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the …
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threatsPurchase of the …
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides …
Build a blue team for efficient cyber threat management in your organizationKey FeaturesExplore blue team operations and understand how to …
"The Smart Grid is a convenient term to describe the modernization of electric, natural gas, and water grid infrastructures. The …
Empower Your Digital Shield with Splunk Expertise! Key Features: - In-depth Exploration of Splunk's Security Ecosystem and Capabilities. - Practical …
The ability to make both individuals and consumers more secure online and on computer networks is a crying need worldwide. …
This book presents that explainable artificial intelligence (XAI) is going to replace the traditional artificial, machine learning, deep learning algorithms …
Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects …
This book provides the first comprehensive view of safe and secure CPS and IoT systems. The authors address in a …
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security …
In the wake of fresh allegations that personal data of Facebook users have been illegally used to influence the outcome …
This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection …
This book explores the strategic decisions made by organizations when implementing cybersecurity controls and leveraging economic models and theories from …
The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk …
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with …
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
Over 700 pages of insight into all things cybersecurityCybersecurity All-in-One For Dummies covers a lot of ground in the world …