Login | Sign Up | Settings | Wish List

 



Searching ...
0 %

Books by Kyle Wilhoit






Operationalizing Threat Intelligence
A guide to developing and operationalizing cyber threat intelligence programs (Paperback)
by Kyle Wilhoit, Joseph Opacki
Paperback, 460 Pages, Published 2022 by Packt Publishing
ISBN-13: 978-1-80181-468-3, ISBN: 1-80181-468-6






Hacking Exposed Industrial Control Systems(1st Edition)
ICS and SCADA Security Secrets & Solutions
by Clint E. Bodungen, Bryan L. Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt
Paperback, 416 Pages, Published 2016 by Mcgraw-Hill Education
ISBN-13: 978-1-259-58971-3, ISBN: 1-259-58971-4

"Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Secure your ICS and SCADA systems the battle-tested Hacking Exposed™ wayThis hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refine ..."






Hacking Exposed Industrial Control Systems
ICS and Scada Security Secrets and Solutions
by Bryan Singer, Clint Bodungen, Aaron Shbeeb, Stephen Hilt, Kyle Wilhoit
544 Pages, Published 2016 by Mcgraw Hill Professional
ISBN-13: 978-1-259-58972-0, ISBN: 1-259-58972-2

"weekend sacrifices caring for the kids gave me the time to write this book. A special thanks to Joel Scambray for believing in this enough to make it part of the Hacking ExposedTM legacy. To the team of authors, contributors, and editors, thank you for your time and effort. We all have day jobs and families, and it took many late nights and weekends, over several months, to get this done. Finally, thank you to those who have had th ..."






Operationalizing Threat Intelligence
A guide to developing and operationalizing cyber threat intelligence programs
by Kyle Wilhoit, Joseph Opacki
460 Pages, Published 2022 by Packt Publishing Ltd
ISBN-13: 978-1-80181-866-7, ISBN: 1-80181-866-5

"By the end of this book, you'll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production."






China and Cybersecurity
Espionage, Strategy, and Politics in the Digital Domain
by Jon R. Lindsay , Tai Ming Cheung , Derek S. Reveron
352 Pages, Published 2015 by Oxford University Press
ISBN-13: 978-0-19-020128-9, ISBN: 0-19-020128-2






Hack the Cybersecurity Interview
A complete interview preparation guide for jumpstarting your cybersecurity career
by Ken Underhill , Christophe Foulon , Tia Hopkins
260 Pages, Published 2022 by Packt Publishing Ltd
ISBN-13: 978-1-80181-269-6, ISBN: 1-80181-269-1






Sandworm
A New ERA of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by Andy Greenberg
368 Pages, Published 2019 by Anchor
ISBN-13: 978-0-525-56463-8, ISBN: 0-525-56463-2






2013 Journal of Law & Cyber Warfare, Summer, Volume 2, Issue 1
by Lexeprint Inc.
Paperback, 112 Pages, Published 2013 by Lulu.Com
ISBN-13: 978-1-304-65473-1, ISBN: 1-304-65473-7






The Browser Hacker's Handbook
by Michele Orru , Christian Frichot , Wade Alcorn
648 Pages, Published 2014 by John Wiley & Sons
ISBN-13: 978-1-118-91435-9, ISBN: 1-118-91435-X






Cybersecurity for Industry 4.0
Analysis for Design and Manufacturing
by Lane Thames , Dirk Schaefer
265 Pages, Published 2017 by Springer
ISBN-13: 978-3-319-50660-9, ISBN: 3-319-50660-9

All Authors

Kyle Wilhoit

Stephen Hilt

Aaron Shbeeb

Bryan Singer

Clint Bodungen

Joseph Opacki


All Bindings

Paperback

Unknown


All Years

2022

2016