Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Recommendation: The Florentine Deception

Uday Mittal September 11, 2017 Leave a Comment

Book Recommendation: The Florentine Deception

I came across The Florentine Deception in the Cybersecurity Canon List. It was listed as a gateway book for 2016. Written by, Carey Nachenberg, co-inventor of Norton Antivirus, it is a suspense thriller novel with cybersecurity as an underlying theme. It is one of those cybersecurity focused novels which amalgamate the two worlds in a […]

Filed Under: Fiction, Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, Norton Antivirus

The Cybersecurity Canon Project

Uday Mittal August 15, 2015 Leave a Comment

The Cybersecurity Canon Project

One thing any Cyber Security Professional crave is good literature on the subject. While there are many books that cover the basics and introduce the reader to the field, there are few which have the potential to spark a debate. My search for such books led me to Cybersecurity Canon list. Cybersecurity Canon Project was […]

Filed Under: Good Reads Tagged With: Cybersecurity books, Cybersecurity Cannon, palo alto networks, Rick Howard

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress