EasterBlack-owned or founded brands at TargetGroceryClothing, Shoes & AccessoriesBabyHomeFurnitureKitchen & DiningOutdoor Living & GardenToysElectronicsVideo GamesMovies, Music & BooksSports & OutdoorsBeautyPersonal CareHealthPetsHousehold EssentialsArts, Crafts & SewingSchool & Office SuppliesParty SuppliesLuggageGift IdeasGift CardsClearanceTarget New ArrivalsTarget Finds#TargetStyleTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores

Sponsored

Theoretical Cybersecurity - by Jacob G Oakley & Michael Butler & Wayne York & Matthew Puckett & J Louis Sewell (Paperback)

Theoretical Cybersecurity - by  Jacob G Oakley & Michael Butler & Wayne York & Matthew Puckett & J Louis Sewell (Paperback) - 1 of 1
$49.49 sale price when purchased online
$54.99 list price
Target Online store #3991

About this item

Highlights

  • There is a distinct lack of theoretical innovation in the cybersecurity industry.
  • About the Author: Dr. Jacob G. Oakley is a cybersecurity author and subject matter expert with 16 years of experience focusing on strategic enterprise-level cybersecurity architectures as well as offensive cybersecurity operations within government and commercial sectors.
  • 213 Pages
  • Computers + Internet, Security

Description



Book Synopsis



There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able.

The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade--the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.

To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities--as well as defensible experimentation concepts--are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.

What you'll learn

  • The current state of the cybersecurity sector and how it constrains theoretical innovation
  • How to understand attacker and defender cost benefit
  • The detect, prevent, and accept paradigm
  • How to build your own cybersecurity box
  • Supporting cybersecurity innovation through defensible experimentation
  • How to implement strategic cybersecurity
  • Infinite vs finite game play in cybersecurity

Who This Book Is For

This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.



From the Back Cover



There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able.

The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade--the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science.

To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities--as well as defensible experimentation concepts--are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations.

What you'll learn

  • The current state of the cybersecurity sector and how it constrains theoretical innovation
  • How to understand attacker and defender cost benefit
  • The detect, prevent, and accept paradigm
  • How to build your own cybersecurity box
  • Supporting cybersecurity innovation through defensible experimentation
  • How to implement strategic cybersecurity
  • Infinite vs finite game play in cybersecurity



  • About the Author



    Dr. Jacob G. Oakley is a cybersecurity author and subject matter expert with 16 years of experience focusing on strategic enterprise-level cybersecurity architectures as well as offensive cybersecurity operations within government and commercial sectors. His previous technical books, Professional Red Teaming, Waging Cyber War, and Cybersecurity for Space, are also published by Apress.

    Michael Butler is a cybersecurity subject matter expert with 12 years of experience focusing on building, developing, and leading teams of ethical hackers. He is a primary instructor and developer of an offensive cloud security course taught both privately and at Blackhat conferences in the United States, Europe, and Asia. He has previously collaborated with Dr. Oakley as the technical reviewer for Professional Red Teaming.

    Wayne York is a cybersecurity technical editor and subject matter expert with 18 years of experience focusing on offensive cybersecurity operations and program protection within government and commercial sectors. His previous technical edited book is Waging Cyber War by Dr. Oakley, published by Apress.

    Dr. Matthew Puckett is a mathematics professor and former software engineer. His areas of interest include theology, cognitive science, and artificial intelligence. His hobbies include chess, where he is currently one of the top 300 players in the United States (according to FIDE).

    Dr. J. Louis Sewell is a mathematician trained in Graph Theory. As Technical Fellow of a Huntsville, AL, technology company, he develops enduring solutions to critical infrastructure challenges in government and civilian sectors. Professionally and personally, he has a special interest in artificial intelligence ethics, infinite game dynamics, and the role of personal experience in the philosophy of science.

    Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .49 Inches (D)
    Weight: .73 Pounds
    Suggested Age: 22 Years and Up
    Sub-Genre: Security
    Genre: Computers + Internet
    Number of Pages: 213
    Publisher: Apress
    Theme: General
    Format: Paperback
    Author: Jacob G Oakley & Michael Butler & Wayne York & Matthew Puckett & J Louis Sewell
    Language: English
    Street Date: July 13, 2022
    TCIN: 1003044581
    UPC: 9781484282991
    Item Number (DPCI): 247-50-0434
    Origin: Made in the USA or Imported
    If the item details above aren’t accurate or complete, we want to know about it.

    Shipping details

    Estimated ship dimensions: 0.49 inches length x 6.14 inches width x 9.21 inches height
    Estimated ship weight: 0.73 pounds
    We regret that this item cannot be shipped to PO Boxes.
    This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

    Return details

    This item can be returned to any Target store or Target.com.
    This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
    See the return policy for complete information.

    Related Categories

    Get top deals, latest trends, and more.

    Privacy policy

    Footer

    About Us

    About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

    Help

    Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member Services

    Stores

    Find a StoreClinicPharmacyOpticalMore In-Store Services

    Services

    Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
    PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy