DR. JEFF DANIELS
  • Home
  • About
  • Publications and Speaking
  • Contact
Digital Transformation | Leader | Professor

Cyber Reading List for National Cyber Security Awareness Month

10/11/2012

0 Comments

 
Picture




October is National Cyber Security Awareness Month!

National Cyber Security Awareness Month is observed in October to drive awareness about our role in reducing cyber threat and staying secure.
 
Today, organizations are more dependent than ever on the vast worldwide network of computers, data, and websites that support internal and external transactions, communications, and more. Increased connectivity can bring about greater risk of theft, fraud, and abuse. It is important that organizations ensure their information and infrastructure are secure, reliable, and resilient.

What's Popular

Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI
Defining 900+ ready to use metrics that measure compliance, resiliency, and ROI, this book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including SOX, HIPAA, and the Data Protection Act-UK.

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Offering an insider's view of the secrets of hackers, this hands-on guide exposes methodologies hackers use to exploit physical access, network access, and wireless vectors, and shows you how you can outwit computer predators at their own game.

Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition
Detailing the most recent vulnerabilities and remedies along with legal disclosure methods, this book explains how to thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws.

Cybercrime and Espionage: An Analysis of Subversive Multivector Threats
Providing a wealth of knowledge related to the realities seen in the execution of advanced attacks, this book will educate you on realities of advanced, next generation threats, which take form in a variety ways.

Cyber Security Essentials
Illustrating more than 75 key security concepts with short, easy-to-understand descriptions, this book explains the concepts behind today's most prevalent threats, tactics, and procedures and provides actionable advice for the mitigation of common vulnerabilities.

What's New

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition
Walking you through the process of conducting an effective security assessment, this authoritative guide provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.

Reverse Deception: Organized Cyber Threat Counter-Exploitation
Providing full coverage of legal and ethical issues, operational vetting, and security team management, this one-of-a-kind guide shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders.

Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security
A groundbreaking exploration of how to identify and fight security threats at every level, this revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more.

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP
Providing detailed case studies and tips on selecting appropriate security components, this authoritative guide lays out comprehensive technical, administrative, and operational strategies for security management.

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.

Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
Loaded with examples of real-world problems and solutions, this book introduces the theoretical foundations and techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems.



0 Comments



Leave a Reply.

    Picture

    Author

    Director
    @lockheedmartin
    | Professor
    @UMDGlobalCampus
    | 1st Cloud Dissertation | Top 5 #Thinkers360 #blockchain #cloud #iot #AI #AIEthics #digital #cyber #5g

    View my profile on LinkedIn
    Follow @jeffdaniels
    Tweets by jeffdaniels

    RSS Feed

    Archives

    December 2022
    August 2022
    March 2021
    February 2021
    January 2021
    December 2020
    September 2020
    August 2020
    February 2020
    January 2019
    October 2015
    April 2015
    January 2015
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    August 2013
    July 2013
    June 2013
    February 2013
    December 2012
    October 2012
    September 2012
    August 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011

    Categories

    All
    4h
    Acoustic
    Adele
    Adoption
    Aero
    Aerospace
    Airshow
    Alliance
    Architect
    Architecture
    Astronaut
    Augustine
    Bahill
    Book
    Books
    Boxing
    Budget
    Business
    Business Card
    Candidate
    Card
    Career
    Careerdevelopment
    Chan
    Chowder
    Cio
    Cities Names
    Clam
    Cloud
    Cloudcomputing
    Cnci
    College
    Computing
    Conference
    Connectivity
    Crowe
    Csedweek
    Cto
    Cyber
    Cybersecurity
    Deep Dive
    Defense
    Denise
    Dfw
    Digital
    Ebook
    Education
    Email
    Engineering
    Exploration
    Extreme
    F35
    Fall
    Fb
    Fedgov
    Fighter
    Flight
    Flighttest
    Florida
    Food
    Framework
    Frazier
    Get
    Gissing
    Glennis
    Google
    Haunted
    Hbr
    Heterogeneous
    History
    Homogeneous
    Horwath
    House
    Ideacast
    Identity
    Insiderhighered
    Internet
    Interview
    Joe
    Jsf
    Kindle
    Kindlefire
    Klout
    Kolditz
    Leadership
    Learning
    Linkedin
    Lm
    Martin
    Meeting
    Mentor
    Miracles
    Mit
    Mobile
    Monkey
    Mst3k
    Music
    Nasa
    Nascar
    Nelson
    Netflix
    Networking
    Nist
    Norm
    Orlando
    Phd
    Pictures
    Post
    Practice
    Process
    Pumpkin
    Put
    Quote
    Races
    Ragan
    Recipe
    Results
    Robots
    Role
    Rollinginthedeep
    Scary
    Search
    Security
    Servo
    Silence
    Simian
    Smokin
    Smoothie
    Snarky
    Socialnetwork
    Sound Barrier
    Space
    Speakup
    Spending
    Star
    Stem
    Sterman
    Strategy
    Success
    Systems
    Systemsengineering
    Teaching
    Teamtexas
    Techmgmt
    #techmgmt
    Techmgmt#
    #techmgt
    Technology
    Texas
    Tms
    Togaf
    Townhall
    Treat
    Trend
    Trust
    Tx
    Web
    Web2.0
    X1
    Yeager

    RSS Feed

Powered by Create your own unique website with customizable templates.
Photos used under Creative Commons from europeanspaceagency, ▓▒░ TORLEY ░▒▓, Lori_NY, Dean_Groom, dalecruse, Fin Cosplay & Amigurumi, Iain Farrell, erin_everlasting, palindrome6996, Easa Shamih (eEko) | P.h.o.t.o.g.r.a.p.h.y, markhillary, Matt McGee, Marc_Smith, woodleywonderworks, agustilopez, rachel_titiriga, SeaDave, cheri lucas., Caio H. Nunes, grabbingsand, Armchair Aviator, quinn.anya, Jennifer Kumar, billaday, edtechworkshop, chucknado, purpleslog, yugenro, christianeager, dground, GlasgowAmateur, expertinfantry, OiMax
  • Home
  • About
  • Publications and Speaking
  • Contact