Skip to main content

Books in Social sciences and humanities

  • How to Attack and Defend Your Website

    • 1st Edition
    • Henry Dalziel
    • Alejandro Caceres
    • English
    How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
  • How to Defeat Advanced Malware

    New Tools for Protection and Forensics
    • 1st Edition
    • Henry Dalziel
    • Simon Crosby
    • English
    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...
  • Introduction to US Cybersecurity Careers

    • 1st Edition
    • Henry Dalziel
    • English
    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.
  • Building an Intelligence-Led Security Program

    • 1st Edition
    • Allan Liska
    • English
    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
  • How to Define and Build an Effective Cyber Threat Intelligence Capability

    • 1st Edition
    • Henry Dalziel
    • Eric Olson + 1 more
    • English
    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
  • A Machine-Learning Approach to Phishing Detection and Defense

    • 1st Edition
    • O.A. Akanbi + 2 more
    • English
    Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
  • Bloodstain Patterns

    Identification, Interpretation and Application
    • 1st Edition
    • Anita Y. Wonder
    • English
    Bloodstain Patterns: Identification, Interpretation and Application combines material from Blood Dynamics (2001) and Bloodstain Pattern Evidence (2007) with updated case work and scientific advances from medical and hard sciences. The text expands coverage of such areas as arterial damage pattern identification, staging of crime scenes, legal applications and problems from both sides of the bench, and extending teaching and training to those outside criminal justice. With violent offenders more aware of crime scene investigation techniques and attempting to frame others, the text expands outdated basic training programs that are insufficient to identify attempts to confuse the investigation. This book clarifies previous understandings as well as bridges the gap toward future advance courses. Based on the work of Paul Leland Kirk, the book’s focus is on first line investigators’ accuracy in identifying specific bloodstain patterns, correctly interpreting and applying them to casework.
  • The Changing Role of the Human Resource Profession in the Asia Pacific Region

    • 1st Edition
    • Jayantee Saha + 1 more
    • English
    The human resource (HR) profession has been on a long and challenging journey. Globalisation and sweeping policy changes have re-defined and re-aligned HR and its role. It is important for HR professionals to develop and become innovators in their respective industries. The Changing Role of the Human Resource Profession in the Asia Pacific Region is based on case-studies of retail, tourism, healthcare, security, education, and energy, spread across the greater Asia Pacific (AP) region. The book rests on the principle of the laws of attraction, that ‘thoughts become things’ and argues that acknowledging good human resource policies and practices can be a key influence on all aspects of an organisation. After an introduction, five chapters cover key topics: six major industries; changing HR practices across the AP; an insider’s view on best practices; the role of HR in sustaining growth across the AP; and a conclusion looking towards the future of HR in the Asian Pacific Region.
  • Finance

    A Quantitative Introduction
    • 1st Edition
    • Piotr Staszkiewicz + 1 more
    • English
    Many students want an introduction to finance. Those who are quantitatively-orien... learners can benefit in particular from an introduction that puts more emphasis on mathematics and graphical presentations than on verbal descriptions. By illustrating core finance facts and concepts through equations and graphical material, Finance: A Quantitative Introduction can help people studying business management, marketing, accounting, and other subjects. By using few lengthy verbal explanations and many illustrations, it can teach readers quickly and efficiently.
  • China’s Venture Capital Market

    Current Legal Problems and Prospective Reforms
    • 1st Edition
    • Lin Zhang
    • English
    The venture capital market in China has been developing for over twenty years. Over this period, the legal frameworks surrounding China’s venture capital have evolved significantly. China’s Venture Capital Market addresses this important topic and argues for further improvements in legal frameworks for venture capital in China. The book consists of five chapters, each covering an aspect of venture capital in China. The first chapter profiles the venture capital market. The second, third and fourth chapters consider the legal problems and suggest reform measures for fundraising in, operation of and exit from Chinese venture capital. The book concludes by asking how long it will take for reform measures to take place in China.