Cybersecurity Books


Differential Privacy in Artificial Intelligence

Differential Privacy in Artificial Intelligence: From Theory to Practice is a comprehensive resource designed to review the principles and applications of differential privacy in a world increasingly driven by data. This book delves into the theoretical underpinnings of differential privacy, its use in machine learning systems, practical implementa

Practical Cloud Security, 2nd Edition

Cloud Azure AWS

With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro

Cloud Native Security Cookbook

Cloud

With the rise of the cloud, every aspect of IT has been shaken to its core. The fundamentals for building systems are changing, and although many of the principles that underpin security still ring true, their implementation has become unrecognizable. This practical book provides recipes for AWS, Azure, and GCP to help you enhance the security of y

Security Risk Management for the Internet of Things

IoT

In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT s

Kubernetes Security

Kubernetes

Kubernetes has fundamentally changed the way DevOps teams create, manage, and operate container-based applications, but as with any production process, you can never provide enough security. This practical ebook walks you through Kubernetes security features - including when to use what - and shows you how to augment those features with container i

Web Application Firewalls

Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern d

High Performance Privacy Preserving AI

Artificial intelligence (AI) depends on data. In sensitive domains - such as healthcare, security, finance, and many more - there is therefore tension between unleashing the power of AI and maintaining the confidentiality and security of the relevant data. This book - intended for researchers in academia and R&D engineers in industry - explains how

What Is eBPF?

SRE Linux

In just the past few years, the extended Berkeley Packet Filter (eBPF) has gone from relative obscurity to one of the hottest technology areas in modern infrastructure computing. With this report, Liz Rice dives into eBPF and explains how this framework enables networking, security, and observability tooling for modern compute environments. SREs, o

Cyber Security Awareness For Dummies

Over the past decade, the cyber security landscape has changed dramatically. According to Cybersecurity Ventures, by 2021, the global cost of cybercrime is expected to reach $6 trillion, making it more profitable than the entire global illegal drugs trade. Organisations of every size and in every industry have become potential targets for cybercrim

NGINX Cookbook, Part 2

Nginx

This is the 2nd of three installments of NGINX Cookbook. This book is about NGINX the web server, reverse proxy, load balancer, and HTTP cache. This installment focuses on security aspects and features of NGINX and NGINX Plus, the licensed version of the NGINX server. Throughout this installment the reader will learn the basics of controlling acces