0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Theoretical Cybersecurity - Principles and Advanced Concepts (Paperback, 1st ed.): Jacob G. Oakley, Michael Butler, Wayne York,... Theoretical Cybersecurity - Principles and Advanced Concepts (Paperback, 1st ed.)
Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
R1,307 R1,058 Discovery Miles 10 580 Save R249 (19%) Ships in 10 - 15 working days

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade-the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities-as well as defensible experimentation concepts-are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations. What you'll learn The current state of the cybersecurity sector and how it constrains theoretical innovation How to understand attacker and defender cost benefit The detect, prevent, and accept paradigm How to build your own cybersecurity box Supporting cybersecurity innovation through defensible experimentation How to implement strategic cybersecurity Infinite vs finite game play in cybersecurity Who This Book Is For This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.

Waging Cyber War - Technical Challenges and Operational Constraints (Paperback, 1st ed.): Jacob G. Oakley Waging Cyber War - Technical Challenges and Operational Constraints (Paperback, 1st ed.)
Jacob G. Oakley
R1,101 R909 Discovery Miles 9 090 Save R192 (17%) Ships in 10 - 15 working days

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war. Waging Cyber War details technical resources and activities required by the cyber war fighter. Even non-technical readers will gain an understanding of how the obstacles encountered are not easily mitigated and the irreplaceable nature of many cyber resources. You will walk away more informed on how war is conducted from a cyber perspective, and perhaps why it shouldn't be waged. And you will come to know how cyber warfare has been covered unrealistically, technically misrepresented, and misunderstood by many. What You'll Learn Understand the concept of warfare and how cyber fits into the war-fighting domain Be aware of what constitutes and is involved in defining war and warfare as well as how cyber fits in that paradigm and vice versa Discover how the policies being put in place to plan and conduct cyber warfare reflect a lack of understanding regarding the technical means and resources necessary to perform such actions Know what it means to do cyber exploitation, attack, and intelligence gathering; when one is preferred over the other; and their specific values and impacts on each other Be familiar with the need for, and challenges of, enemy attribution Realize how to develop and scope a target in cyber warfare Grasp the concept of self-attribution: what it is, the need to avoid it, and its impact See what goes into establishing the access from which you will conduct cyber warfare against an identified target Appreciate how association affects cyber warfare Recognize the need for resource resilience, control, and ownership Walk through the misconceptions and an illustrative analogy of why cyber warfare doesn't always work as it is prescribed Who This Book Is For Anyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, and security practitioners and policy or decision makers. The book is also for anyone with a cell phone, smart fridge, or other computing device as you are a part of the attack surface.

Professional Red Teaming - Conducting Successful Cybersecurity Engagements (Paperback, 1st ed.): Jacob G. Oakley Professional Red Teaming - Conducting Successful Cybersecurity Engagements (Paperback, 1st ed.)
Jacob G. Oakley
R1,101 R909 Discovery Miles 9 090 Save R192 (17%) Ships in 10 - 15 working days

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes Who This Book Is For Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Metal Cut Throat Razer Carrier
R30 Discovery Miles 300
Afritrail Clifton Beach Shade
R800 R549 Discovery Miles 5 490
Fast & Furious: 8-Film Collection
Vin Diesel, Paul Walker, … Blu-ray disc R336 R257 Discovery Miles 2 570
The Papery A5 WOW 2025 Diary - Giraffe…
R349 R300 Discovery Miles 3 000
Lucky Plastic 3-in-1 Nose Ear Trimmer…
R289 Discovery Miles 2 890
Hermione Granger Wizard Wand - In…
 (1)
R803 Discovery Miles 8 030
Baby Dove Body Wash 200ml
R50 R33 Discovery Miles 330
Gym Towel & Bag
R95 R78 Discovery Miles 780
Bamboo Fly Repellent ShooAway
R499 R399 Discovery Miles 3 990
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R199 Discovery Miles 1 990

 

Partners