Discover concise and focused books on specific cybersecurity topics with Cyber Shorts. This book series is designed for students, professionals, and enthusiasts seeking to explore specialized areas within cybersecurity. From blockchain to zero-day to ethical hacking, each book provides real-world examples and practical insights. We're currently accepting book proposals to expand our Cyber Shorts series. Share your expertise and contribute to the growth of cybersecurity knowledge worldwide by submitting a book proposal to [email protected]
By Mariya Ouaissa, Mariyam Ouaissa
November 22, 2024
The aim of this book is to explore the definitions and fundamentals of offensive security vs defensive Security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of a practical aspects of cybersecurity and covers the main disciplines ...
By Ravindra Das
October 29, 2024
As the world is becoming more digital and intertwined together, the Cybersecurity Threat Landscape has no doubt become a daunting one for sure. For example, old style Threat Variants of the past, especially that of Phishing, has now become much more sophisticated and covert in nature. A lot of ...
By Ravindra Das
October 10, 2024
The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For ...
By Ravindra Das
December 21, 2023
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution. The ...
By Ravindra Das
December 14, 2023
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems. However, given its stature, it has also become a prime target for the cyberattacker. Thus, a Zero Trust Framework is strongly needed. Deploying...