In today's hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate and counter cyber threats, navigating the increasingly dangerous digital landscape.
From cryptographic foundations to advanced persistent threats, you'll master the core concepts that transform novices into digital defenders. Each chapter tackles critical security domains, including online tracking defenses, ransomware identification, social engineering countermeasures, and OSINT techniques used by both defenders and attackers. Discover how to:
Implement multi-layered protection against sophisticated malware
Recognize and respond to psychological manipulation tactics
Navigate the concealed territories of the Deep and Dark Web safely
Deploy enterprise-grade network security architectures
Leverage AI-driven threat detection to stay ahead of attackers.
Whether you're securing personal devices against tracking, protecting enterprise networks from nation-state actors, or building comprehensive defense strategies, this book is for working professionals, computing specialists, and IT enthusiasts, providing you with practical, actionable knowledge for today's security challenges.
Key Features:
Bridges theoretical cybersecurity concepts with practical defense strategies
Provides actionable knowledge on emerging threats
Uses accessible language for both beginners and experienced practitioners
Equips readers with a comprehensive understanding of the entire threat landscape
Addresses both human and system vulnerabilities
Delivers insider perspective on threats and countermeasures
Incorporates cutting-edge security approaches that prepare readers for the next generation of cybersecurity challenges
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für Beruf und Forschung
Professional Practice & Development
Illustrationen
42 s/w Photographien bzw. Rasterbilder, 4 s/w Zeichnungen, 2 s/w Tabellen, 46 s/w Abbildungen
2 Tables, black and white; 4 Line drawings, black and white; 42 Halftones, black and white; 46 Illustrations, black and white
Maße
Höhe: 234 mm
Breite: 156 mm
ISBN-13
978-0-367-44214-9 (9780367442149)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Nihad A. Hassan is an independent cybersecurity consultant, digital forensics and cyber OSINT expert, online blogger and author with over 15 years of experience in information security research. He has completed multiple technical security consulting engagements and authored six books and numerous articles on information security. Nihad is highly involved in security training, education and motivation. For more information, go to www.osint.link.
Rami Hijazi is the general manager of MERICLER Inc., an education and corporate training firm in Toronto, Canada. Rami is an experienced IT professional who lectures on a wide array of topics, including object-oriented programming, Java, eCommerce, Agile development, database design, and data handling analysis. Rami also works as consultant to Cyber Boundaries Inc., where he is involved in the design of encryption systems and wireless networks, intrusion detection, and data breach tracking, as well as providing planning and development advice for IT departments concerning contingency planning.
1. Understanding Cybersecurity 2. Cyber anonymity and Web Layers 3. Introduction to Cryptography 4. Cyber Threats 5. Advanced persistence threat (APT) 6. Ransomware 7. Social Engineering Attacks & Mitigation Strategies 8. Open Source Intelligence Techniques (OSINT) 9. Endpoint defense strategies 10. Enterprise network defense strategies