Skip to main content
DI

Cybersecurity Books

8 books in this category

Zero Trust Networks

Evan Gilman

Zero Trust Networks

Evan Gilman, Doug Barth

4.4

Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.

advancedZero TrustCybersecurity

Identity Attack Vectors

Morey J. Haber

Identity Attack Vectors

Morey J. Haber, Darran Rolls

4.3

Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.

intermediateIAMCybersecurity

Privileged Attack Vectors

Morey J. Haber

Privileged Attack Vectors

Morey J. Haber

4.2

This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.

intermediatePAMCybersecurity

Zero Trust Security

Jason Garbis

Zero Trust Security

Jason Garbis, Jerry W. Chapman

4.3

This enterprise guide provides a comprehensive framework for planning and implementing zero trust security. It covers the strategic, architectural, and operational aspects of zero trust, including identity-centric security, microsegmentation, software-defined perimeters, and continuous verification.

intermediateZero TrustCybersecurity

Cybersecurity Ops with bash

Paul Troncone

Cybersecurity Ops with bash

Paul Troncone, Carl Albing

4.1

Learn how to use the bash command line for cybersecurity operations including log analysis, network monitoring, malware analysis, and security auditing. Practical recipes for both offensive and defensive security tasks.

intermediateCybersecurityDevOps Security

Real-World Cryptography

David Wong

Real-World Cryptography

David Wong

4.7

Real-World Cryptography teaches you applied cryptographic techniques for securing systems. It covers symmetric and asymmetric encryption, digital signatures, hash functions, key exchange, TLS, and advanced topics like secure messaging, post-quantum cryptography, and zero-knowledge proofs.

advancedCryptographyCybersecurity

Practical Cloud Security

Chris Dotson

Practical Cloud Security

Chris Dotson

4.2

Practical Cloud Security covers the essential security considerations for cloud deployments including identity management, network security, data protection, logging, and incident response across IaaS, PaaS, and SaaS models.

intermediateCloud SecurityCybersecurity

Identity Is the New Perimeter

Jason Garbis

Identity Is the New Perimeter

Jason Garbis

4.5

This book makes the case that identity has replaced the network perimeter as the primary security boundary and provides a practical framework for implementing identity-first security. It covers identity-centric architecture, continuous authentication, adaptive access control, and identity threat detection.

intermediateIAMZero Trust