Manning Early Access Program (MEAP)
Read chapters as they are written, get the finished eBook as soon as it’s ready, and receive the pBook long before it's in bookstores.
A jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy.
Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cyber Security is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively.
about the technology
Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks.
about the book
Making Sense of Cyber Security is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You'll cement this mindset by planning your own penetration test—taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you'll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.
what's inside
Develop and incrementally improve your own cybersecurity strategy
Detect rogue WiFi networks and safely browse on public WiFi
Protect against physical attacks utilizing USB devices or building access cards
Use the OODA loop and a hacker mindset to plan out your own attacks
Connect to and browse the Dark Web
Apply threat models to build, measure, and improve your defenses
Respond to a detected cyber attack and work through a security breach
about the reader
For security-conscious professionals. No IT skills or cybersecurity experience required.
about the author
Tom Kranz is a cybersecurity consultant with almost 30 years' experience in IT. After a successful career helping UK Government departments and private sector clients, Tom now advises and supports organizations on their security strategy and challenges.
customers also reading
This book1°2°3°
FREE domestic shipping on orders of three or more print books
Definitely an eye opener in terms of how exposed any application is to attacks. I think anyone considering that HTTPS is the end of all your problems should read the book and reconsider data security in every stage.
A gentle introduction to the arcane world of Cyber Security and the ongoing battle to stay safe and secure.
This book provides a very good overview about the increasingly important cybersecurity. Actual threats are discussed in a way which is easily understandable by non-technicians but provides interesting insights for the more technical reader also.