0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Theoretical Cybersecurity - Principles and Advanced Concepts (Paperback, 1st ed.): Jacob G. Oakley, Michael Butler, Wayne York,... Theoretical Cybersecurity - Principles and Advanced Concepts (Paperback, 1st ed.)
Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell
R1,173 R976 Discovery Miles 9 760 Save R197 (17%) Ships in 18 - 22 working days

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade-the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities-as well as defensible experimentation concepts-are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations. What you'll learn The current state of the cybersecurity sector and how it constrains theoretical innovation How to understand attacker and defender cost benefit The detect, prevent, and accept paradigm How to build your own cybersecurity box Supporting cybersecurity innovation through defensible experimentation How to implement strategic cybersecurity Infinite vs finite game play in cybersecurity Who This Book Is For This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.

Waging Cyber War - Technical Challenges and Operational Constraints (Paperback, 1st ed.): Jacob G. Oakley Waging Cyber War - Technical Challenges and Operational Constraints (Paperback, 1st ed.)
Jacob G. Oakley
R988 R842 Discovery Miles 8 420 Save R146 (15%) Ships in 18 - 22 working days

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war. Waging Cyber War details technical resources and activities required by the cyber war fighter. Even non-technical readers will gain an understanding of how the obstacles encountered are not easily mitigated and the irreplaceable nature of many cyber resources. You will walk away more informed on how war is conducted from a cyber perspective, and perhaps why it shouldn't be waged. And you will come to know how cyber warfare has been covered unrealistically, technically misrepresented, and misunderstood by many. What You'll Learn Understand the concept of warfare and how cyber fits into the war-fighting domain Be aware of what constitutes and is involved in defining war and warfare as well as how cyber fits in that paradigm and vice versa Discover how the policies being put in place to plan and conduct cyber warfare reflect a lack of understanding regarding the technical means and resources necessary to perform such actions Know what it means to do cyber exploitation, attack, and intelligence gathering; when one is preferred over the other; and their specific values and impacts on each other Be familiar with the need for, and challenges of, enemy attribution Realize how to develop and scope a target in cyber warfare Grasp the concept of self-attribution: what it is, the need to avoid it, and its impact See what goes into establishing the access from which you will conduct cyber warfare against an identified target Appreciate how association affects cyber warfare Recognize the need for resource resilience, control, and ownership Walk through the misconceptions and an illustrative analogy of why cyber warfare doesn't always work as it is prescribed Who This Book Is For Anyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, and security practitioners and policy or decision makers. The book is also for anyone with a cell phone, smart fridge, or other computing device as you are a part of the attack surface.

Professional Red Teaming - Conducting Successful Cybersecurity Engagements (Paperback, 1st ed.): Jacob G. Oakley Professional Red Teaming - Conducting Successful Cybersecurity Engagements (Paperback, 1st ed.)
Jacob G. Oakley
R988 R842 Discovery Miles 8 420 Save R146 (15%) Ships in 18 - 22 working days

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes Who This Book Is For Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Connectomic Deep Brain Stimulation
Andreas Horn Paperback R3,536 Discovery Miles 35 360
War or Peace? - Nationalism, Democracy…
Stephen L. Burg Hardcover R2,849 Discovery Miles 28 490
Necessary Beings - An Essay on Ontology…
Bob Hale Hardcover R2,232 Discovery Miles 22 320
RLE: Japan Mini-Set E: Sociology…
Various Hardcover R47,733 Discovery Miles 477 330
Fuzzy Controllers Handbook
Ron Nucci Hardcover R3,033 R2,748 Discovery Miles 27 480
Bridges
Calum Scott CD R447 Discovery Miles 4 470
Motion Control of a Citrus-Picking Robot
Thomas Pool Hardcover R2,079 Discovery Miles 20 790
Very Best of Paul Robeson
Paul Robeson CD R230 R216 Discovery Miles 2 160
Handbook of Research on Big Data…
Manoj Kumar Singh Hardcover R4,941 Discovery Miles 49 410
Snugglebug
Jim Lombardi Hardcover R532 Discovery Miles 5 320

 

Partners