The Language of Cybersecurity

The Language of Cybersecurity

by Maria Antonieta Flores (Editor)
The Language of Cybersecurity

The Language of Cybersecurity

by Maria Antonieta Flores (Editor)


    Qualifies for Free Shipping
    Check Availability at Nearby Stores

Related collections and offers


The Language of Cybersecurity defines 52 terms that every business professional should know about cybersecurity, even professionals who are not specialists. Anyone who uses any kind of computing device needs to understand the importance of cybersecurity, and every business professional also needs to be able to speak intelligently with cybersecurity professionals.

The Language of Cybersecurity introduces the world of cybersecurity through the terminology that defines the field. Each of the 52 main terms contains a definition, a statement of why the term is important, and an essay that explains why a business professional should know about the term.

Each term was authored by an expert practitioner in that area.

The Language of Cybersecurity looks at vulnerabilities, exploits, defenses, planning, and compliance. In addition there is a glossary that defines more than 80 additional. For those who want to dig deeper, there are more than 150 references for further exploration.

Expertly compiled and edited by Tonie Flores, this book is a useful reference for cybersecurity experts, managers, students, and anyone who uses a computer, tablet, smart phone, or other computing device.

Product Details

ISBN-13: 9781937434625
Publisher: XML Press
Publication date: 07/15/2018
Pages: 188
Product dimensions: 5.50(w) x 8.50(h) x 0.40(d)

About the Author

Tonie Flores has guided systems and business professionals through the complexities of selecting and implementing leading edge information processing solutions. Her work as a systems engineer, instructor, change management specialist, and technical writer has helped information technology users from the shop floor and back office through the C-suite in Asia, Latin America, and the United States

Table of Contents

  • Foreword
  • Preface
  • Acknowledgments
  • Vulnerabilities
    • Social Engineering
    • Security Fatigue
    • Shadow Security
    • Data Leak
    • Insider Threat
    • Zero-day Vulnerability
    • Dark Web

  • Exploits
    • Phishing
    • Ransomware
    • Botnet
    • Advanced Persistent Threat
    • Buffer Overflow Attack

  • Defenses
    • Authentication
    • Endpoint Security
    • Multi-factor Authentication
    • Identity Management
    • Physical Access Control
    • Biometrics
    • Security Awareness
    • Situational Awareness
    • Behavioral Monitoring
    • Non-repudiation
    • Privilege
    • Firewall
    • Encryption
    • Sandboxing
    • Hardening

  • Planning, Management, and Controls
    • Governance, Risk Management, Compliance (GRC)
    • Application Risk Governance
    • Vulnerability Assessment
    • Business Impact Assessment (BIA)
    • Business Continuity Plan
    • Incident Response Plan
    • CISO
    • Risk Register
    • Kill Chain
    • Metrics
    • Audit
    • Threat Modeling
    • Static Application Security Testing
    • Penetration Testing

  • Compliance
    • Confidentiality
    • Integrity
    • Availability
    • Separation of Duties
    • Policy
    • Standards
    • Regulation
    • Privacy
    • Controls
    • Payment Card Industry Data Security Standard (PCIDSS)
    • General Data Protection Regulation (GDPR)

  • Glossary of Security Terms
  • Additional Contributors
  • References
  • Contributor Index
  • Subject Index

From the B&N Reads Blog

Customer Reviews