Fr. 76.00

Attack Vectors - The History of Cybersecurity

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You'll Learn:

  • Understand the history of cyber-security from the early 1950's through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

List of contents

Chapter 1: The History of Attack Vectors.- Chapter 2: Business Justification.- Chapter 3: Definitions.- Chapter 4: Malware.- Chapter 5: Exploits.- Chapter 6: Breaches.- Chapter 7: Regulations.- Chapter 8: People.- Chapter 9: Syndicates.- Chapter 10: Social Engineering.- Chapter 11: Solutions.- Chapter 12: The Human Threat.- Chapter 13:  Lateral Movement.- Chapter 14: Return on Investment.- Chapter 15: It s Not If, But When.- Chapter 16: Supply Chain Attacks.- Chapter 17: Been Hacked?.- Chapter 18: History Lesson.- Chapter 19: Conclusion.

About the author

Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previous served as BeyondTrust’s Chief Security Officer, Chief Technology, and Vice President of Product Management during nearly his 13-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Summary

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.
It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.
As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.
You’ll Learn:

  • Understand the history of cyber-security from the early 1950’s through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.
Who This Book Is For?
New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.

Product details

Authors Morey Haber
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 27.10.2025
 
EAN 9798868817083
ISBN 9798868817083
No. of pages 384
Dimensions 155 mm x 22 mm x 235 mm
Weight 634 g
Illustrations XXXVI, 384 p. 15 illus.
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Technikgeschichte, Datenschutz, Netzwerksicherheit, Privacy, Exploits, Cybersecurity, Malware, Data and Information Security, Informatik und Informationstechnologie, Cyber Attack, data security, Information Security, Cyber Defense, cyber attack vectors, cyber breach, attack vectors, cyber threat

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.