• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Theoretical Cybersecurity: Principles and Advanced Concepts » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Theoretical Cybersecurity: Principles and Advanced Concepts

ISBN-13: 9781484282991 / Angielski / Miękka / 2022 / 213 str.

J. Louis Sewell
Theoretical Cybersecurity: Principles and Advanced Concepts J. Louis Sewell 9781484282991 APress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Theoretical Cybersecurity: Principles and Advanced Concepts

ISBN-13: 9781484282991 / Angielski / Miękka / 2022 / 213 str.

J. Louis Sewell
cena 211,90
(netto: 201,81 VAT:  5%)

Najniższa cena z 30 dni: 209,01
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!
Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Security - General
Wydawca:
APress
Język:
Angielski
ISBN-13:
9781484282991
Rok wydania:
2022
Ilość stron:
213
Wymiary:
23.5 x 15.5
Oprawa:
Miękka
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1. Introduction to Strategic Cybersecurity

Discuss what strategic cybersecurity is

Discussion on how it is not cybersecurity strategy

 

Chapter 2. No one cares about cybersecurity

Real motivations

Consequences

How can cybersecurity help them in spite of themselves?

 

Chapter 3. Cost-Benefit & Cybersecurity

Cost-Benefit to the defender

Cost-Benefit to the attacker

 

Chapter 4. What is the box that is cybersecurity?

Where do we draw the line?

What are areas that should be abandoned

What are areas that should be explored

 

Chapter 5. The detect, prevent, accept paradigm

Outline the paradigm

Case studies

 

Chapter 6. Building your own cybersecurity box

What is out of the cyber domain: sim swapping, go daddy

What is likely to be your attacker

What is likely to be your loss

 

Chapter 7. Cybersecurity as a material

Capability Analysis

Sourcing

Test and evaluation

Utilization

Deprecation

Failure analysis

 

Chapter 8. Cybersecurity as infrastructure

A comparison to electricity

How do we get there and what will it mean?

 

Chapter 9. Strategic Defensive Security

Detect

Identify

Monitor

Hunt

 

Chapter 10. Strategic Offensive Security

Penetration testing

Red Teaming

Reverse Red Teaming

 

Chapter 11. Strategic Assurance

Frameworks

Auditing

Case study

 

Chapter 12. Strategic cybersecurity in commercial sectors

The approach

Case study

 

Chapter 13. Strategic cybersecurity in accountable sectors

Healthcare approach

Case study

Financial approach

Case study

 

Chapter 14. Strategic Magic

AI

ML

Block Chain

 

Chapter 15. Looking Forward

Where is the theory-craft?

We need new ideas and paradigms as much as we need new technology

Why is it difficult for academia to evolve cybersecurity?

Especially offensive cybersecurity

What is wrong with cybersecurity currently in academics

Degree programs

Unrealistic expectations

Potential solutions

Why does industry often lack an academic approach?

Dr. Jacob G. Oakley is a cybersecurity author and subject matter expert with 16 years of experience focusing on strategic enterprise-level cybersecurity architectures as well as offensive cybersecurity operations within government and commercial sectors. His previous technical books, Professional Red Teaming, Waging Cyber War, and Cybersecurity for Space, are also published by Apress.

Michael Butler is a cybersecurity subject matter expert with 12 years of experience focusing on building, developing, and leading teams of ethical hackers. He is a primary instructor and developer of an offensive cloud security course taught both privately and at Blackhat conferences in the United States, Europe, and Asia. He has previously collaborated with Dr. Oakley as the technical reviewer for Professional Red Teaming.

Wayne York is a cybersecurity technical editor and subject matter expert with 18 years of experience focusing on offensive cybersecurity operations and program protection within government and commercial sectors. His previous technical edited book is Waging Cyber War by Dr. Oakley, published by Apress.

Dr. Matthew Puckett is a mathematics professor and former software engineer. His areas of interest include theology, cognitive science, and artificial intelligence. His hobbies include chess, where he is currently one of the top 300 players in the United States (according to FIDE).

Dr. J. Louis Sewell is a mathematician trained in Graph Theory. As Technical Fellow of a Huntsville, AL, technology company, he develops enduring solutions to critical infrastructure challenges in government and civilian sectors. Professionally and personally, he has a special interest in artificial intelligence ethics, infinite game dynamics, and the role of personal experience in the philosophy of science. 

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able.

The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade—the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.

To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry’s past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities—as well as defensible experimentation concepts—are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.

What you’ll learn

  • The current state of the cybersecurity sector and how it constrains theoretical innovation
  • How to understand attacker and defender cost benefit
  • The detect, prevent, and accept paradigm
  • How to build your own cybersecurity box
  • Supporting cybersecurity innovation through defensible experimentation
  • How to implement strategic cybersecurity
  • Infinite vs finite game play in cybersecurity

  •  



    Udostępnij

    Facebook - konto krainaksiazek.pl



    Opinie o Krainaksiazek.pl na Opineo.pl

    Partner Mybenefit

    Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

    Czytaj nas na:

    Facebook - krainaksiazek.pl
    • książki na zamówienie
    • granty
    • książka na prezent
    • kontakt
    • pomoc
    • opinie
    • regulamin
    • polityka prywatności

    Zobacz:

    • Księgarnia czeska

    • Wydawnictwo Książkowe Klimaty

    1997-2026 DolnySlask.com Agencja Internetowa

    © 1997-2022 krainaksiazek.pl
         
    KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
    Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
    KrainaKsiazek.PL - Księgarnia Internetowa
    Polityka prywatnosci - link
    Krainaksiazek.pl - płatnośc Przelewy24
    Przechowalnia Przechowalnia