Nihad A. Hassan – författare
Visar alla böcker från författaren Nihad A. Hassan. Handla med fri frakt och snabb leverans.
5 produkter
5 produkter
749 kr
Skickas inom 10-15 vardagar
In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate, and counter cyber threats, navigating the increasingly dangerous digital landscape.From cryptographic foundations to advanced persistent threats, you’ll master the core concepts that transform novices into digital defenders. Each chapter tackles critical security domains, including online tracking defenses, ransomware identification, social engineering countermeasures, and OSINT techniques used by both defenders and attackers. Discover how to:• Implement multi-layered protection against sophisticated malware• Recognize and respond to psychological manipulation tactics• Navigate the concealed territories of the Deep and Dark Web safely• Deploy enterprise-grade network security architectures• Leverage AI-driven threat detection to stay ahead of attackers.Whether you’re securing personal devices against tracking, protecting enterprise networks from nation-state actors, or building comprehensive defense strategies, this book is for working professionals, computing specialists, and IT enthusiasts, providing you with practical, actionable knowledge for today’s security challenges.Key Features:• Bridges theoretical cybersecurity concepts with practical defense strategies• Provides actionable knowledge on emerging threats• Uses accessible language for both beginners and experienced practitioners• Equips readers with a comprehensive understanding of the entire threat landscape• Addresses both human and system vulnerabilities• Delivers an insider perspective on threats and countermeasures• Incorporates cutting-edge security approaches that prepare readers for the next generation of cybersecurity challenges
1 756 kr
Skickas inom 10-15 vardagar
In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate, and counter cyber threats, navigating the increasingly dangerous digital landscape.From cryptographic foundations to advanced persistent threats, you’ll master the core concepts that transform novices into digital defenders. Each chapter tackles critical security domains, including online tracking defenses, ransomware identification, social engineering countermeasures, and OSINT techniques used by both defenders and attackers. Discover how to:• Implement multi-layered protection against sophisticated malware• Recognize and respond to psychological manipulation tactics• Navigate the concealed territories of the Deep and Dark Web safely• Deploy enterprise-grade network security architectures• Leverage AI-driven threat detection to stay ahead of attackers.Whether you’re securing personal devices against tracking, protecting enterprise networks from nation-state actors, or building comprehensive defense strategies, this book is for working professionals, computing specialists, and IT enthusiasts, providing you with practical, actionable knowledge for today’s security challenges.Key Features:• Bridges theoretical cybersecurity concepts with practical defense strategies• Provides actionable knowledge on emerging threats• Uses accessible language for both beginners and experienced practitioners• Equips readers with a comprehensive understanding of the entire threat landscape• Addresses both human and system vulnerabilities• Delivers an insider perspective on threats and countermeasures• Incorporates cutting-edge security approaches that prepare readers for the next generation of cybersecurity challenges
Open Source Intelligence Methods and Tools
A Practical Guide to Online Intelligence
Häftad, Engelska, 2018
555 kr
Skickas inom 10-15 vardagar
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web.The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You’ll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organizationUse OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackersGather corporate intelligence about business competitors and predict future marketdirectionsConduct advanced searches to gather intelligence from social media sites such as Facebook and TwitterUnderstand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is ForPenetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises
555 kr
Skickas inom 10-15 vardagar
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law.Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use.Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll LearnAssemble computer forensics lab requirements, including workstations, tools, and moreDocument the digital crime scene, including preparing a sample chain of custody formDifferentiate between law enforcement agency and corporate investigationsGather intelligence using OSINT sourcesAcquire and analyze digital evidenceConduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensicsUtilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniquesWho This Book Is ForPolice and other law enforcement personnel, judges(with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals
Ransomware Revealed
A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Häftad, Engelska, 2019
455 kr
Skickas inom 10-15 vardagar
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly.Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future.Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems.What You Will LearnBe aware of how ransomware infects your systemComprehend ransomware components in simple termsRecognize the different types of ransomware familiesIdentify the attack vectors employed by ransomware to infect computer systemsKnow how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies)Know what to do if a successful ransomware infection takes placeUnderstand how to pay the ransom as well as the pros and cons of payingSet up a ransomware response plan to recover from such attacksWho This Book Is ForThose who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.