LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Network security

See below for a selection of the latest books from Network security category. Presented with a red border are the Network security books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Network security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Cyber Defense Countering Targeted Attacks

Cyber Defense Countering Targeted Attacks

Author: Richard Stiennon Format: Hardback Release Date: 01/03/2020

With the sudden, pervasive rise of the Internet, widespread random attacks from viruses, worms, and bots were used to engage in cyber crime and disruptive behavior. As these threats mature, they turn into targeted attacks against banks, large data processors, and governments. Today, such targeted attacks have become the greatest threat facing every organization, including both small and large companies, and governments of all sizes. In this new book, Stiennon presents a comprehensive view of the technology, methodology, and tools needed to defend digital assets from targeted attacks. It is an in-depth manual on the tools, techniques, technology, and policies needed to defend organizations from cyber espionage, Denial-of-Service attacks, and stealthy infiltration. Stiennon addresses security practitioners, IT managers of corporate and government sites, and government agency officials determining cyber policies. He explains why countering targeted attacks requires new investment in technology, as well as changes to security operations and organizations. He addresses new services and products that have arisen to assist in the task of discovering and blocking targeted attacks, and how deploying these technologies properly is a critical defense against targeted attacks. Each chapter introduces a technology, the types of attacks it defends against, and the products and services available which are suited to the task. This book is a must read for anyone who wants to understand the evolution of the security industry, the threats that drive it, the incidents that highlight the rapid changes in cyber crime, and how to defend against them.

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

Author: Ben Malisow Format: Paperback / softback Release Date: 20/02/2020

The only official study guide for the new CCSP exam CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way. The CCSP is the latest credential from (ISC)2 and the Cloud Security Alliance, designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond. Review 100% of all CCSP exam objectives Practice applying essential concepts and skills Access the industry-leading online study tool set Test your knowledge with bonus practice exams and more As organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification, and apply your skills in a real-world setting.

The Official (ISC)2 SSCP CBK Reference

The Official (ISC)2 SSCP CBK Reference

Author: Mike Wills Format: Hardback Release Date: 29/01/2020

The only official body of knowledge for SSCP--(ISC)2's popular credential for hands-on security professionals--fully revised and updated. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification--fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements--is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Access Controls; Security Operations and Administration; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.

Data Breaches Exposed Downs, Ups, and How to End Up Better Off

Data Breaches Exposed Downs, Ups, and How to End Up Better Off

Author: Sherri Davidoff Format: Paperback / softback Release Date: 28/12/2019

Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don't want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world's most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You'll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Practical Packet Analysis, 3e

Practical Packet Analysis, 3e

Author: Chris Sanders Format: Paperback / softback Release Date: 28/11/2019

The Modern Security Operations Center

The Modern Security Operations Center

Author: Joseph Muniz, Moses Frost, Aamir Lakhani, Omar Santos Format: Paperback / softback Release Date: 28/10/2019

This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. Writing for security and network professionals, managers, and other stakeholders, the authors cover: How SOCs have evolved, and today's key considerations in deploying them Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, investigation, forensics, and compliance People and process issues, including training, career development, job rotation, and hiring Centralizing and managing security data more effectively Threat intelligence and threat hunting Incident response, recovery, and vulnerability management Using data orchestration and playbooks to automate and control the response to any situation Advanced tools, including SIEM 2.0 The future of SOCs, including AI-Assisted SOCs, machine learning, and training models Note: This book's lead author, Joseph Muniz, was also lead author of Security Operations Center: Building, Operating, and Maintaining your SOC (Cisco Press). The Modern Security Operations Center is an entirely new and fully vendor-neutral book.

Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers

Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers

Author: Weizhi Meng Format: Paperback / softback Release Date: 24/10/2019

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019. The 18 full papers and 3 short papers presented in this volume were carefully reviewed and selected from a total of 76 submissions. The papers in the volume cover a broad range of topics on security in Internet-of-things, Social Networks, User Authentication, Algorithm design, Artificial Intelligence, and Big Data.

The Ethical Hack A Framework for Business Value Penetration Testing

The Ethical Hack A Framework for Business Value Penetration Testing

Author: James S. Tiller Format: Paperback / softback Release Date: 23/10/2019

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and unwritten conventions that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Apple Card and Apple Pay A Ridiculously Simple Guide to Mobile Payments

Apple Card and Apple Pay A Ridiculously Simple Guide to Mobile Payments

Author: Scott La Counte Format: Paperback / softback Release Date: 18/10/2019

Foundations Of Information Security A Straightforward Introduction

Foundations Of Information Security A Straightforward Introduction

Author: Jason Andress Format: Paperback / softback Release Date: 10/10/2019

Discrete Password Logbook Locked Door Edition

Discrete Password Logbook Locked Door Edition

Author: Suzeteo Enterprises Format: Hardback Release Date: 25/09/2019