environmental studies min

Handbook of Environmental Sociology

Handbook of Environmental Sociology This handbook defines the contours of environmental sociology and invites readers to push boundaries in their exploration of this important subdiscipline. It offers a comprehensive overview of the evolution of environmental sociology and its role in this era of intensified national and global environmental crises. Its Read more…

c8se0TP1LNEGrHoXyX8ybP1KuPiYEGEg min

The Hardware Hacking Handbook

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing Read more…

web security min

Web Security Testing Guide

The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals. The WSTG is a comprehensive guide to testing the security of web applications and web services. Created by the collaborative efforts of cybersecurity professionals and dedicated volunteers, the WSTG provides Read more…

the red team guide min

The Red Team Guide

Red Teaming was seen as a useful tool for generals to evaluate their security posture, Red Team therefore took on the role of the aggressors or “bad guys”. The bad guys do not follow the rules but utilized in a controlled way simulating and emulating what the bad guys can Read more…

e8Pl9GUL4chw989FVNpy1yakzEx40FaI min

Smartphone-Based Detection Devices

Smartphone usage has created a new means for detection, analysis, diagnosis and monitoring through the use of new apps and attachments. These breakthrough analytical methods offer ways to overcome the drawbacks of more conventional methods, such as the expensive instrumentation that is often needed, complex sample pre-treatment steps, or time-consuming Read more…

threat hunting in the cloud min

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. Read more…

91Dnm8YaSML min

Practical IoT Hacking

Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You’ll develop a security testing methodology, discover the art of Read more…