Browse Definitions :

8 cybersecurity books to read in 2023

Brush up on your cybersecurity skills by picking up one of these titles.

Cybersecurity is an important issue for IT and business professionals, as cyber attacks continue to plague governments, businesses and other organizations.

There are many different types of cyber attacks that organizations fall victim to, including ransomware, phishing, password attacks and DNS spoofing. And knowing how to minimize these attacks is a must.

If you are planning to pursue a career in cybersecurity, want to protect your organization from cyber attacks or just want to brush up on your skills, here are eight books to check out.

'Cyber Threat Hunting' book coverClick on book image
to purchase.

1. Cyber Threat Hunting

Publisher: Manning Publications Co.

Author: Nadhem AlFardan

Description: In Cyber Threat Hunting, you will learn how to see and stop cyber attacks. Explore real-life scenarios, and learn both basic and advanced techniques for threat hunting. This book also comes with downloadable data sets and scenario templates to hone your skills.

'Enterprise Cybersecurity in Digital Business' book coverClick on book image
to purchase.

2. Enterprise Cybersecurity in Digital Business

Publisher: Taylor & Francis Group

Author: Ariel Evans

Description: In Enterprise Cybersecurity in Digital Business, you will learn about cyber-risk from a business rather than technical standpoint. Learn how to set goals, create new roles to fill cybersecurity gaps and include everyone in your business. This book is geared toward CEOs, chief information security officers, data protection officers and compliance managers.

'Ethical Hacking' book coverClick on book image
to purchase.

3. Ethical Hacking

Publisher: No Starch Press

Author: Daniel G. Graham

Description: In Ethical Hacking, you'll explore the necessary skills for penetration testers, security researchers and malware analysts. You'll work with a variety of pen testing tools and practice tasks such as capturing passwords in a corporate Windows network and scanning devices on the internet to find potential victims.

'Evidence-Based Cybersecurity' book coverClick on book image
to purchase.

4. Evidence-Based Cybersecurity

Publisher: Taylor & Francis Group

Authors: Pierre-Luc Pomerleau and David Maimon

Description: In Evidence-Based Cybersecurity, you will learn the foundation of the evidence-based cybersecurity approach and read examples of how it can improve cybersecurity operations. This book is geared toward security professionals and policymakers.

'Making Sense of Cybersecurity' book coverClick on book image
to purchase.

5. Making Sense of Cybersecurity

Publisher: Manning Publications Co.

Author: Thomas Kranz

Description: In Making Sense of Cybersecurity, you will learn to plan a security strategy and spot your organization's weak points by studying real-world security examples. This book is geared toward business professionals with no background in cybersecurity.

'Mastering Malware Analysis' book coverClick on book image
to purchase.

6. Mastering Malware Analysis

Publisher: Packt Publishing

Author: Alexey Kleymenov

Description: In Mastering Malware Analysis, you will learn how to identify and investigate suspicious activity and create a plan to handle malware incidents. This book is geared toward malware researchers, IT security administrators, forensic analysts and anyone looking to protect their organization from malicious software.

'Practical Social Engineering' book coverClick on book image
to purchase.

7. Practical Social Engineering

Publisher: No Starch Press

Author: Joe Gray

Description: In Practical Social Engineering, you will explore the techniques behind social engineering attacks and learn how to prevent them. Read case studies, learn best practices, and discover tools and templates to protect your organization. This book is geared toward pen testers.

'Social Engineering' book coverClick on book image
to purchase.

8. Social Engineering

Publisher: MIT Press

Authors: Robert W. Gehl and Sean T. Lawson

Description: In Social Engineering, you will learn how earlier forms of social engineering have made today's masspersonal social engineering possible. Discover how these manipulative communication practices are a mix of deception and information gathering, and learn how to protect against masspersonal social engineering.

Next Steps

Top 7 enterprise cybersecurity challenges in 2022

Top 8 in-demand cybersecurity jobs for 2022 and beyond

Top 12 cybersecurity online courses for 2022

Dig Deeper on Security

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close