Browse Definitions :

8 cybersecurity books to read in 2023

Brush up on your cybersecurity skills by picking up one of these titles.

Cybersecurity is an important issue for IT and business professionals, as cyber attacks continue to plague governments, businesses and other organizations.

There are many different types of cyber attacks that organizations fall victim to, including ransomware, phishing, password attacks and DNS spoofing. And knowing how to minimize these attacks is a must.

If you are planning to pursue a career in cybersecurity, want to protect your organization from cyber attacks or just want to brush up on your skills, here are eight books to check out.

'Cyber Threat Hunting' book coverClick on book image
to purchase.

1. Cyber Threat Hunting

Publisher: Manning Publications Co.

Author: Nadhem AlFardan

Description: In Cyber Threat Hunting, you will learn how to see and stop cyber attacks. Explore real-life scenarios, and learn both basic and advanced techniques for threat hunting. This book also comes with downloadable data sets and scenario templates to hone your skills.

'Enterprise Cybersecurity in Digital Business' book coverClick on book image
to purchase.

2. Enterprise Cybersecurity in Digital Business

Publisher: Taylor & Francis Group

Author: Ariel Evans

Description: In Enterprise Cybersecurity in Digital Business, you will learn about cyber-risk from a business rather than technical standpoint. Learn how to set goals, create new roles to fill cybersecurity gaps and include everyone in your business. This book is geared toward CEOs, chief information security officers, data protection officers and compliance managers.

'Ethical Hacking' book coverClick on book image
to purchase.

3. Ethical Hacking

Publisher: No Starch Press

Author: Daniel G. Graham

Description: In Ethical Hacking, you'll explore the necessary skills for penetration testers, security researchers and malware analysts. You'll work with a variety of pen testing tools and practice tasks such as capturing passwords in a corporate Windows network and scanning devices on the internet to find potential victims.

'Evidence-Based Cybersecurity' book coverClick on book image
to purchase.

4. Evidence-Based Cybersecurity

Publisher: Taylor & Francis Group

Authors: Pierre-Luc Pomerleau and David Maimon

Description: In Evidence-Based Cybersecurity, you will learn the foundation of the evidence-based cybersecurity approach and read examples of how it can improve cybersecurity operations. This book is geared toward security professionals and policymakers.

'Making Sense of Cybersecurity' book coverClick on book image
to purchase.

5. Making Sense of Cybersecurity

Publisher: Manning Publications Co.

Author: Thomas Kranz

Description: In Making Sense of Cybersecurity, you will learn to plan a security strategy and spot your organization's weak points by studying real-world security examples. This book is geared toward business professionals with no background in cybersecurity.

'Mastering Malware Analysis' book coverClick on book image
to purchase.

6. Mastering Malware Analysis

Publisher: Packt Publishing

Author: Alexey Kleymenov

Description: In Mastering Malware Analysis, you will learn how to identify and investigate suspicious activity and create a plan to handle malware incidents. This book is geared toward malware researchers, IT security administrators, forensic analysts and anyone looking to protect their organization from malicious software.

'Practical Social Engineering' book coverClick on book image
to purchase.

7. Practical Social Engineering

Publisher: No Starch Press

Author: Joe Gray

Description: In Practical Social Engineering, you will explore the techniques behind social engineering attacks and learn how to prevent them. Read case studies, learn best practices, and discover tools and templates to protect your organization. This book is geared toward pen testers.

'Social Engineering' book coverClick on book image
to purchase.

8. Social Engineering

Publisher: MIT Press

Authors: Robert W. Gehl and Sean T. Lawson

Description: In Social Engineering, you will learn how earlier forms of social engineering have made today's masspersonal social engineering possible. Discover how these manipulative communication practices are a mix of deception and information gathering, and learn how to protect against masspersonal social engineering.

Next Steps

Top 7 enterprise cybersecurity challenges in 2022

Top 8 in-demand cybersecurity jobs for 2022 and beyond

Top 12 cybersecurity online courses for 2022

Dig Deeper on Security

Networking
  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

Security
  • virtual firewall

    A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (...

  • cloud penetration testing

    Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its ...

  • cloud workload protection platform (CWPP)

    A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud ...

CIO
  • Regulation SCI (Regulation Systems Compliance and Integrity)

    Regulation SCI (Regulation Systems Compliance and Integrity) is a set of rules adopted by the U.S. Securities and Exchange ...

  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

HRSoftware
  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close