BookShared
  • MEMBER AREA    
  • How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

    (By Sam Grubb)

    Book Cover Watermark PDF Icon Read Ebook
    ×
    Size 23 MB (23,082 KB)
    Format PDF
    Downloaded 612 times
    Last checked 10 Hour ago!
    Author Sam Grubb
    “Book Descriptions: Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks.You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the jargon, giving you a broad view of how specific attacks work and common methods used by online adversaries, as well as the controls and strategies you can use to defend against them. Each chapter tackles a new topic from the ground up, such as malware or social engineering, with easy-to-grasp explanations of the technology at play and relatable, real-world examples. Hands-on exercises then turn the conceptual knowledge you’ve gained into cyber-savvy skills that will make you safer at work and at home. You’ll explore various types of authentication (and how they can be broken), ways to prevent infections from different types of malware, like worms and viruses, and methods for protecting your cloud accounts from adversaries who target web apps. You’ll also learn how     Use command-line tools to see information about your computer and network    Analyze email headers to detect phishing attempts    Open potentially malicious documents in a sandbox to safely see what they do    Set up your operating system accounts, firewalls, and router to protect your network    Perform a SQL injection attack by targeting an intentionally vulnerable website    Encrypt and hash your files In addition, you’ll get an inside look at the roles and responsibilities of security professionals, see how an attack works from a cybercriminal’s viewpoint, and get first-hand experience implementing sophisticated cybersecurity measures on your own devices.”

    Google Drive Logo DRIVE
    Book 1

    Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

    ★★★★★

    Andy Greenberg

    Book 1

    The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win

    ★★★★★

    Gene Kim

    Book 1

    This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

    ★★★★★

    Nicole Perlroth

    Book 1

    The Linux Command Line: A Complete Introduction

    ★★★★★

    William E. Shotts Jr.

    Book 1

    On Bullshit

    ★★★★★

    Harry G. Frankfurt

    Book 1

    Permanent Record

    ★★★★★

    Edward Snowden

    Book 1

    Short Stories in French for Beginners (Teach Yourself Short Stories)

    ★★★★★

    Olly Richards

    Book 1

    It Will All Work Out: The Freedom of Letting Go

    ★★★★★

    Kevin Hart

    Book 1

    Loonshots: How to Nurture the Crazy Ideas That Win Wars, Cure Diseases, and Transform Industries

    ★★★★★

    Safi Bahcall

    Book 1

    The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

    ★★★★★

    Kevin D. Mitnick

    Book 1

    Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)

    ★★★★★

    Marianne Bellotti

    Book 1

    Prepared: A Manual for Surviving Worst-Case Scenarios

    ★★★★★

    Mike Glover

    Book 1

    Misbelief: What Makes Rational People Believe Irrational Things

    ★★★★★

    Dan Ariely

    Book 1

    The Unicorn Project

    ★★★★★

    Gene Kim

    Book 1

    The Everything Store: Jeff Bezos and the Age of Amazon

    ★★★★★

    Brad Stone