O’Reilly Media, Inc., 2025. — 588 p. — ISBN 978-1-098-16508-6. Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system...
O’Reilly Media, Inc., 2025. — 588 p. — ISBN 978-1-098-16508-6. Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system...
Orange Education Pvt Ltd, AVA, 2024. — 306 p. — ISBN 978-81-96890-31-5. Attackers have to be only right once, but just one mistake will permanently undo them. Book Description The “Ultimate Cyberwarfare for Evasive Cyber Tactic” is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book...
СПб.: Наука и техника, 2024. — 368 с. — ISBN 978-5-907592-61-2. Данный виртуальный диск с кодом вместе с практическим руководством "Бухарев Р.С. Хакинг на Python" позволит вам погрузиться в захватывающий мир кибербезопасности и изучить основные аспекты использования Python в этой области.
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
Springer, 2025. — 636 p. This book addresses a variety of problems that arise at the interface between AI techniques and challenging problems in cybersecurity. The book covers many of the issues that arise when applying AI and Deep Learning algorithms to inherently difficult problems in the security domain, such as malware detection and analysis, intrusion detection, spam...
CRC Press, 2025. — 383 p. — ISBN 103262146X. Artificial Intelligence for Cyber Security and Industry 4.0 offers a comprehensive exploration of the intersection of artificial intelligence (AI) and cyber security, providing readers with a thorough understanding of both the advantages and risks posed by AI technologies in modern industries. Covering a wide array of topics, from...
CRC Press, 2025. — 383 p. — ISBN 103262146X. Artificial Intelligence for Cyber Security and Industry 4.0 offers a comprehensive exploration of the intersection of artificial intelligence (AI) and cyber security, providing readers with a thorough understanding of both the advantages and risks posed by AI technologies in modern industries. Covering a wide array of topics, from...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1407-5. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
3rd Edition. — For Dummies, 2025. 565 p. Get the know-how you need to safeguard your data against cyber attacks. Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security—shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more,...
3rd Edition. — For Dummies, 2025. 565 p. Get the know-how you need to safeguard your data against cyber attacks. Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security—shouldn't you learn how to keep yourself and your loved ones safe? Fully updated with information on AI, hybrid work environments, and more,...
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...