Making Sense of Cybersecurity you own this product

Thomas Kranz
  • MEAP began October 2020
  • Publication in November 2022 (estimated)
  • ISBN 9781617298004
  • 288 pages (estimated)
  • printed in black & white
filed under

placing your order...

Don't refresh or navigate away from the page.
eBook Our eBooks come in DRM-free Kindle, ePub, and PDF formats + liveBook, our enhanced eBook format accessible from any web browser. $25.99 $39.99 you save $14 (35%)
Making Sense of Cybersecurity (eBook) added to cart
continue shopping
adding to cart

print + eBook Receive a print copy shipped to your door + the eBook in Kindle, ePub, & PDF formats + liveBook, our enhanced eBook format accessible from any web browser. $32.49 $49.99 you save $17 (35%)
FREE domestic shipping on orders of three or more print books
Making Sense of Cybersecurity (print + eBook) added to cart
continue shopping
adding to cart

It opened my eyes to just how shockingly under-secured some major parts of modern comms infrastructure really is!

Derek Hampton
Look inside
A jargon-free, practical guide to the key concepts, terminology, and technologies of cybersecurity perfect for anyone planning or implementing a security strategy.

Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts effectively.

about the technology

Every high-profile data breach underlines the need for cybersecurity. A proper understanding of threats, vulnerabilities, and most-likely attacks empowers you to make better decisions and mitigate risks.

about the book

Making Sense of Cybersecurity is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.

Renowned security expert Tom Kranz teaches you to think like a hacker, ensuring you can spot your own weak points and evaluate risks in new technologies or processes. You'll cement this mindset by planning your own penetration test—taking on the role of the attacker in a simulated hack against an asset management firm. Finally, you'll work through a real-world security breach, learning how to respond to live threats and apply the lessons learned to your own organization.

what's inside

  • Develop and incrementally improve your own cybersecurity strategy
  • Detect rogue WiFi networks and safely browse on public WiFi
  • Protect against physical attacks utilizing USB devices or building access cards
  • Use the OODA loop and a hacker mindset to plan out your own attacks
  • Connect to and browse the Dark Web
  • Apply threat models to build, measure, and improve your defenses
  • Respond to a detected cyber attack and work through a security breach

about the reader

For security-conscious professionals. No IT skills or cybersecurity experience required.

about the author

Tom Kranz is a cybersecurity consultant with almost 30 years' experience in IT. After a successful career helping UK Government departments and private sector clients, Tom now advises and supports organizations on their security strategy and challenges.

FREE domestic shipping on orders of three or more print books

Definitely an eye opener in terms of how exposed any application is to attacks. I think anyone considering that HTTPS is the end of all your problems should read the book and reconsider data security in every stage.

George Onofrei

A gentle introduction to the arcane world of Cyber Security and the ongoing battle to stay safe and secure.

Ronald Cranston

This book provides a very good overview about the increasingly important cybersecurity. Actual threats are discussed in a way which is easily understandable by non-technicians but provides interesting insights for the more technical reader also.

Andi Schabus