Discover concise and focused books on specific cybersecurity topics with Cyber Shorts. This book series is designed for students, professionals, and enthusiasts seeking to explore specialized areas within cybersecurity. From blockchain to zero-day to ethical hacking, each book provides real-world examples and practical insights. We're currently accepting book proposals to expand our Cyber Shorts series. Share your expertise and contribute to the growth of cybersecurity knowledge worldwide by submitting a book proposal to [email protected]
By Kazım Duraklar
June 30, 2025
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments. "Security Technologies for Law Enforcement Agencies" offers a comprehensive examination of the tools, systems, and ...
By Esra Bas
December 30, 2024
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary...
By Mariya Ouaissa, Mariyam Ouaissa
November 22, 2024
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines ...
By Ravi Das
October 29, 2024
As the world is becoming more digital and entwined together, the cybersecurity threat landscape has no doubt become a daunting one. For example, typical threat variants of the past, especially those of phishing, have now become much more sophisticated and covert in nature. A lot of this has been ...
By Ravindra Das
October 10, 2024
The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For ...
By Ravindra Das
December 21, 2023
Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution. The ...
By Ravi Das
December 14, 2023
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems. However, given its stature, it has also become a prime target for the cyberattacker. Thus, a Zero Trust Framework is strongly needed. Deploying...