The Wiley Network

Key New Titles in Cybersecurity

key-new-titles-in-cybersecurity

March 22, 2022

To bring new generation cyberattacks into fruition, hackers are armed with the latest zero-day vulnerabilities and social engineering techniques. They utilize advanced tactics, personalized to appear unknown to signature-based tools and yet authentic enough to bypass spam filters. Stay up to date with the latest Wiley titles in Cybersecurity to manage your risk and develop tools and techniques for detecting cyberattacks.    Read the first chapter of each for free on Wiley.com

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Cynthia Brumfield, with Brian Haugli

Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. This book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. It also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.

Trust in Computer Systems and the Cloud

Mike Bursell 

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity 

This book delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing.

Cybersecurity and Decision Makers: Data Security and Digital Trust

Marie De Fréminville

Cybersecurity is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.

Cybersecurity of Industrial Systems

Jean-Marie Flaus

To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions.

Cybersecurity of Industrial Systems presents these different subjects in order to give an in-depth overview and to help the reader manage the cybersecurity of their installation. This book addresses these issues for both classic SCADA architecture systems and Industrial Internet of Things (IIoT) systems.

Ransomware Protection Playbook

Roger Grimes 

Avoid becoming the next ransomware victim by taking practical steps today 

Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. 

In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks.

Security and its Challenges in the 21st Century

Claudine Guerrier

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.

This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program

John Jackson

An insider’s guide showing companies how to spot and remedy vulnerabilities in their security programs.

A bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs.

Game Theory and Machine Learning for Cyber Security

Charles A. Kamhoua (Editor), Christopher D. Kiekintveld (Editor), Fei Fang (Editor), and Quanyan Zhu (Editor)

Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field

In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security.

Kali Linux Penetration Testing Bible  

Gus Khawaja

Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kali’s varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.             

Cybersecurity Law, 2nd Edition

Jeff Kosseff

The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. This book includes material on recent FTC data security consent decrees and data breach litigation.

IoT Security: Advances in Authentication

Madhusanka Liyanage (Editor), An Braeken (Editor), Pardeep Kumar (Editor), and Mika Ylianttila (Editor)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. 

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise

Jennifer Minella

Reduce organizational cybersecurity risk and build comprehensive WiFi, private cellular, and IOT security solutions. An essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security.

Cybersecurity and Local Government

Donald F. Norris, Laura K. Mateczun, and Richard F. Forno

Learn to secure your local government’s networks with this one-of-a-kind resource

In Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compelling argument that every local government official, elected or otherwise, must be reasonably knowledgeable about cybersecurity concepts and provide appropriate support for it within their governments. It also lays out a straightforward roadmap to achieving those objectives, from an overview of cybersecurity definitions to descriptions of the most common security challenges faced by local governments. 

Intelligent Security Systems: How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security

Leon Reznik

Dramatically improve your cybersecurity using AI and machine learning

In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device’s owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities.

This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts.

The Wiley 5G REF: Security

Madhusanka Liyanage (Series Editor), Rahim Tafazolli (Editor-in-Chief), Chin-Liang Wang (Editor-in-Chief), and Periklis Chatzimisios (Editor-in-Chief)

Introduces the security landscape of 5G, and significant security and privacy risks associated with the 5G networks. Then, the security solutions for different segments of the 5G network, i.e., radio network, edge network, access network, and core network, are discussed. Since 5G is developed based on network softwarization, security threats associated with key network softwarization technologies such as SDN, NFV, NS, and MEC are also presented in detail. Then, the security issues related to the new 5G and IoT services are delivered. Finally, a detailed discussion on the privacy of 5G networks is presented by considering  Datafied Society. 

Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

Wiem Tounsi (Editor)

Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead.

This book develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems

Related Articles

/global/aem/banner-6. This is a very global banner for every single page of EN language