Featured publications

An orange background that reads: "Cybersecurity for everyone; A human-centered approach to protecting yourself and your community"

Cybersecurity for Everyone: A Human-Centered Approach to Protecting Yourself and Your Community

Whether you’re a student, a professional, a parent, or a business leader, this book is designed to help you understand cybersecurity’s role in everyday life and how you can make a difference in keeping our digital world safe.

A black background with an image of a dragon wrapped around a castle with text that reads: "Firewalls don't stop dragons".

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy, written specifically for everyday people.

An animated fox shines a flashlight on small, decorative illustrations. Text reads: "Cybersecurity myths and misconceptions: Avoiding the Hazards and Pitfalls that Derail Us"

Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Audiobook)

Whatever your cybersecurity role or experience, the authors of this audiobook will help you surface hidden dangers, prevent avoidable errors, eliminate faulty assumptions, and resist deeply human cognitive biases that compromise prevention, investigation, and research.

An abstract design with the text: "CRC focus: humans and cyber security: how organizations can enhance resilience through human factors"

Humans and Cyber Security

Humans and Cybersecurity delivers an applied approach to capturing and mitigating the risk of the human element in cyber security and proposes that it is easier to change organizational practices than it is individual behavior.

An abstract background with the text: "Jump-start your SOC analyst career: a roadmap to cybersecurity success, second edition."

Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success

Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.

An abstract background with a chain with the text that reads: "1st Edition: Cyber Security Kill Chain - Tactics and Strategies"

Cyber Security Kill Chain - Tactics and Strategies

"Cyber Security Kill Chain - Tactics and Strategies" dives into the systematic approach to understanding and countering cyber threats using the Cyber Kill Chain framework, presenting actionable strategies to help strengthen your cybersecurity posture.

Abstract background of chess pieces with the text: "Cyber resilience index"

Cyber Resilience Index: Mastering Threat-Informed Defense

Learn about the Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and effective threat management and communication.

An abstract background showing a person wearing a hood with the text: "Advances in Cyber Security: Emerging Threats and Countermeasures in Cybersecurity"

Emerging Threats and Countermeasures in Cybersecurity

An essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, this book provides a comprehensive toolkit for understanding and combating digital threats.

An abstract black and green background with text that reads: "Expert Insight - Hack the Cybersecurity interview. Navigate Cybersecurity interviews with confidence, from entry-level to expert roles."

Hack the Cybersecurity Interview - Second Edition

Ace your cybersecurity interview by unlocking expert strategies, technical insights, and career-boosting tips for securing top roles in the industry.

An abstract background with a color wheel on it. Text reads: "See yourself in Cyber".

See Yourself in Cyber

Information security strategist Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization can contribute to improving its cybersecurity backbone.

An abstract background with cubes and locks in a pattern. Text reads: "1st edition. Cybersecurity and privacy law handbook."

Cybersecurity and Privacy Law Handbook

Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standards.

A black background with the text: "The code of honor - embracing ethics in cybersecurity."

The Code of Honor

This book delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives, with examples for readers of how to apply the hand-on skills detailed within.

Certification guides

The following texts are study guides for specific certification tests, and essential part of a cybersecurity professional's repertoire.

A background image of two men looking at a computer with text that reads: "Cisco certified support technician (CCST) IT support 100-140"

Cisco Certified Support Technician (CCST) IT Support - 100-140 Official Cert Guide

The Certified Ethical Hacker (CEH) exam tests an applicant’s familiarity with a number of security concepts and is a requirement for many entry-level IT Jobs.

A cover that reads "First edition - Certified information systems security professional (CISSP) exam guide. Master CISSP with hands-on bonus content and practical coverage of all eight exam domains. Ted Jordan, CISSP. Ric Daza, PhD, CISSP. Hinne Hettema, PhD."

Certified Information Systems Security Professional (CISSP) Exam Guide

Certified Information Systems Security Professional (CISSP) is another certification for IT security professionals an establishes skill in in a variety of security types.

A grey background with text that reads: "CompTIA Security+ Practice Tests. Second Edition. Exam Sy0-601. Provides over 1,000 practice questions covering all exam objectives. Complements the CompTIA Security+ Study Guide, Eighth Edition, Exam SY0-601."

CompTIA Security+ Practice Tests, 3rd Edition

CompTIA Security+ is the premier global certification that establishes the essential skills required for core security functions and a career in IT security.