Skip to main content

Syngress

    • Synthetic Media, Deepfakes, and Cyber Deception

      Attacks, Analysis, and Defenses
      • 1st Edition
      • Cameron H. Malin + 2 more
      • English
      Synthetic Media, Deepfakes, and Cyber Deception: Attacks, Analysis, and Defenses introduces the only analytical Synthetic Media Analysis Framework (SMAF) to help describe cyber threats and help security professionals anticipate and analyze attacks. This framework encompasses seven dimensions: Credibility, Control, Medium, Interactivity, Familiarity, Intended Target, and Evocation. Synthetic media is a broad term that encompasses the artificial manipulation, modification, and production of information, covering a spectrum from audio-video deepfakes to text-based chatbots. Synthetic media provides cyber attackers and scammers with a game-changing advantage over traditional ROSE attacks because they have the potential to convincingly impersonate close associates through text, imagery, voice, and video.This burgeoning threat has yet to be meaningfully addressed through any written treatment on the topic. The book is co-authored by three cyber influence and deception experts who have gained deep knowledge and experience on the topic through diverse, true operational pathways and backgrounds. The diversity and perspectives of the author team makes the content in the book the broadest and deepest treatment of synthetic media attacks available to readers.
    • Quantum Cryptography and Annealing for Securing Industrial IoT

      • 1st Edition
      • Seifedine Kadry + 5 more
      • English
      Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designed to protect Industrial Internet of Things (IIoT) platforms. Focusing on the convergence between quantum and post-quantum cryptography, the book delves into practical implementations that safeguard IIoT devices and strengthen infrastructure. With the proliferation of interconnected systems in modern industry, the need for robust security has never been more urgent. The authors emphasize real-world applications, offering readers actionable insights into how quantum cryptosystems are integrated within IIoT environments to counter emerging threats, particularly those posed by quantum computing advancements.Beyond its focus on practical solutions, the book provides a thorough analysis of IIoT hardware resilience, addressing vulnerabilities to physical and side-channel attacks. It evaluates the performance of quantum cryptosystems and discusses how interdisciplinary teams collaborate to engineer secure IIoT systems. Balancing theory with application, the authors highlight challenges faced in implementing quantum cryptographic principles and present innovative approaches to overcome them.
    • Edge Intelligence

      Advanced Deep Transfer Learning for IoT Security
      • 1st Edition
      • Jawad Ahmad + 5 more
      • English
      Edge Intelligence: Advanced Deep Transfer Learning for IoT Security presents a comprehensive exploration into the critical intersection of cybersecurity, edge computing, and deep learning, offering practitioners, researchers, and cybersecurity professionals a definitive guide to protect IoT/IIoT systems. This book delves into the synergistic potential of edge computing and advanced machine/deep learning algorithms, providing insights into lightweight and resource-efficient models with a special focus on resource-constrained edge devices. The rapidly evolving nature of cyberattacks underscores the need for updated and integrated resources that address the intersection of cybersecurity, edge computing, and deep learning. The authors address this issue by offering practical insights, lightweight models, and proactive defense mechanisms tailored to the unique challenges of securing edge devices and networks. This book is not only written to provide its audience effective strategies to detect and mitigate network intrusions by leveraging edge intelligence and advanced deep transfer learning techniques but also to provide practical insights and implementation guidelines tailored to resource-constrained edge devices.
    • Professional Penetration Testing

      Creating and Learning in a Hacking Lab
      • 3rd Edition
      • Thomas Wilhelm
      • English
      Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
    • Antivirus Engines

      From Methods to Innovations, Design, and Applications
      • 1st Edition
      • Paul A. Gagniuc
      • English
      Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.
    • Industrial Network Security

      Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
      • 3rd Edition
      • Eric D. Knapp
      • English
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.Author Eric Knapp examines the unique protocols and applications that are the foundation of Industrial Control Systems (ICS) and provides clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • CISSP® Study Guide

      • 4th Edition
      • Joshua Feldman + 2 more
      • English
      CISSP® Study Guide, Fourth Edition provides the latest updates on CISSP® certification, the most prestigious, globally-recognized, vendor neutral exam for information security professionals. In this new edition, readers will learn about what's included in the newest version of the exam’s Common Body of Knowledge. The eight domains are covered completely and as concisely as possible. Each domain has its own chapter, including specially designed pedagogy to help readers pass the exam. Clearly stated exam objectives, unique terms/definitions, exam warnings, learning by example, hands-on exercises, and chapter ending questions help readers fully comprehend the material.
    • Research Methods for Cyber Security

      • 1st Edition
      • Thomas W. Edgar + 1 more
      • English
      Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.
    • Securing the Internet of Things

      • 1st Edition
      • Shancang Li + 1 more
      • English
      Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
    • Federal Cloud Computing

      The Definitive Guide for Cloud Service Providers
      • 2nd Edition
      • Matthew Metheny
      • English
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.