Cybersecurity Books
8 books in this category
Zero Trust Networks
Evan Gilman
Zero Trust Networks
Evan Gilman, Doug Barth
Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.
Identity Attack Vectors
Morey J. Haber
Identity Attack Vectors
Morey J. Haber, Darran Rolls
Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.
Privileged Attack Vectors
Morey J. Haber
Privileged Attack Vectors
Morey J. Haber
This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.
Zero Trust Security
Jason Garbis
Zero Trust Security
Jason Garbis, Jerry W. Chapman
This enterprise guide provides a comprehensive framework for planning and implementing zero trust security. It covers the strategic, architectural, and operational aspects of zero trust, including identity-centric security, microsegmentation, software-defined perimeters, and continuous verification.
Cybersecurity Ops with bash
Paul Troncone
Cybersecurity Ops with bash
Paul Troncone, Carl Albing
Learn how to use the bash command line for cybersecurity operations including log analysis, network monitoring, malware analysis, and security auditing. Practical recipes for both offensive and defensive security tasks.
Real-World Cryptography
David Wong
Real-World Cryptography
David Wong
Real-World Cryptography teaches you applied cryptographic techniques for securing systems. It covers symmetric and asymmetric encryption, digital signatures, hash functions, key exchange, TLS, and advanced topics like secure messaging, post-quantum cryptography, and zero-knowledge proofs.
Practical Cloud Security
Chris Dotson
Practical Cloud Security
Chris Dotson
Practical Cloud Security covers the essential security considerations for cloud deployments including identity management, network security, data protection, logging, and incident response across IaaS, PaaS, and SaaS models.
Identity Is the New Perimeter
Jason Garbis
Identity Is the New Perimeter
Jason Garbis
This book makes the case that identity has replaced the network perimeter as the primary security boundary and provides a practical framework for implementing identity-first security. It covers identity-centric architecture, continuous authentication, adaptive access control, and identity threat detection.