The Pre-Loved edit from Shopbop
To share your reaction on this item, open the Amazon app from the App Store or Google Play on your phone.
Add Prime to get Fast, Free delivery
Amazon prime logo
$38.83
FREE Returns
FREE delivery Monday, January 27
Or Prime members get FREE delivery Saturday, January 25. Order within 21 hrs 49 mins.
In Stock
$$38.83 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$38.83
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Amazon.com
Sold by
Amazon.com
Returns
30-day refund/replacement
30-day refund/replacement
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

The Complete Guide to Defense in Depth: Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

5.0 5.0 out of 5 stars 12 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$38.83","priceAmount":38.83,"currencySymbol":"$","integerValue":"38","decimalSeparator":".","fractionalValue":"83","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"wT1StyTGLAld%2F0REFsXjXrbECAoJBlQ3JbP1FLS0C%2F78PyfsI%2FYGodSA%2F3Qo3fUsrb8ScvhG%2Fn0fQ9GM3yNsMCpmh8oZ2ugZDUR1HaSQIgTZpWeRyTUw6ydz5HoX9b7yKlU%2FDfkLIClOZpiknLpNTw%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Purchase options and add-ons

Gain comprehensive insights to safeguard your systems against advanced threats and maintain resilient security posture

Key Features

  • Develop a comprehensive understanding of advanced defense strategies to shape robust security programs
  • Evaluate the effectiveness of a security strategy through the lens of Defense in Depth principles
  • Understand the attacker mindset to deploy solutions that protect your organization from emerging threats
  • Purchase of the print or Kindle book includes a free PDF eBook

Book Description

In an era of relentless cyber threats, organizations face daunting challenges in fortifying their defenses against increasingly sophisticated attacks. The Complete Guide to Defense in Depth offers a comprehensive roadmap to navigating the complex landscape, empowering you to master the art of layered security.

This book starts by laying the groundwork, delving into risk navigation, asset classification, and threat identification, helping you establish a robust framework for layered security. It gradually transforms you into an adept strategist, providing insights into the attacker's mindset, revealing vulnerabilities from an adversarial perspective, and guiding the creation of a proactive defense strategy through meticulous mapping of attack vectors. Toward the end, the book addresses the ever-evolving threat landscape, exploring emerging dangers and emphasizing the crucial human factor in security awareness and training. This book also illustrates how Defense in Depth serves as a dynamic, adaptable approach to cybersecurity.

By the end of this book, you’ll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility.

What you will learn

  • Understand the core tenets of Defense in Depth, its principles, and best practices
  • Gain insights into evolving security threats and adapting defense strategies
  • Master the art of crafting a layered security strategy
  • Discover techniques for designing robust and resilient systems
  • Apply Defense in Depth principles to cloud-based environments
  • Understand the principles of Zero Trust security architecture
  • Cultivate a security-conscious culture within organizations
  • Get up to speed with the intricacies of Defense in Depth for regulatory compliance standards

Who this book is for

This book is for security engineers, security analysts, and security managers who are focused on secure design and Defense in Depth. Business leaders and software developers who want to build a security mindset will also find this book valuable. Additionally, students and aspiring security professionals looking to learn holistic security strategies will benefit from the book. This book doesn’t assume any prior knowledge and explains all the fundamental concepts. However, experience in the security industry and awareness of common terms will be helpful.

Table of Contents

  1. Navigating Risk, Classifying Assets, and Unveiling Threats
  2. Practical Guide to Defense in Depth
  3. Building a Framework for Layered Security
  4. Understanding the Attacker Mindset
  5. Uncovering Weak Points through an Adversarial Lens
  6. Mapping Attack Vectors and Gaining an Edge
  7. Building a Proactive Layered Defense Strategy
  8. Understanding Emerging Threats and Defense in Depth
  9. The Human Factor – Security Awareness and Training
  10. Defense in Depth – A Living, Breathing Approach to Security

Editorial Reviews

Review

“I've been both a security practitioner and leader for well over 16 years. Much of what I've learned over the years has been laid out well and in a pragmatic way in this book by Akash. The book looks at building security capabilities with a risk-based approach. By better understanding threat actors and tactics, one can better design their prevention, monitoring and response capabilities. This is a great resource for those new to security or moving up a level and now responsible for building preventative programs.”

Ray Espinoza, Chief Information Security Officer

About the Author

Akash Mukherjee is a security enthusiast and a leader with experience setting up and executing security strategies at large tech companies. He is currently a security leader at Apple AIML. He was previously a security lead at Google, leading the insider risk program and supply chain security efforts at Google Chrome. During his time at Google, Akash was also a course lead and subject matter expert for the Google Cybersecurity Certificate course. He has been at the forefront of the emerging threat landscape and has led the development of novel security strategies and frameworks. Akash was one of the co-developers of the open-source Supply-chain Levels for Soft ware Artifacts (SLSA) framework. He is based in the Silicon Valley area in the US, and he holds a bachelor of technology degree from the Indian Institute of Technology, B.H.U., India, and a master's degree in cyber security from the University of Southern California, USA.

Product details

  • Publisher ‏ : ‎ Packt Publishing (July 31, 2024)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 298 pages
  • ISBN-10 ‏ : ‎ 1835468268
  • ISBN-13 ‏ : ‎ 978-1835468265
  • Item Weight ‏ : ‎ 1.14 pounds
  • Dimensions ‏ : ‎ 0.64 x 7.5 x 9.25 inches
  • Customer Reviews:
    5.0 5.0 out of 5 stars 12 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Akash Mukherjee
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Akash Mukherjee is an experienced software professional with deep expertise in security and AI. He has led security teams at Google, Apple to protect against APTs and Nation State threats.

After his Masters, Akash worked across multiple security domains. He is known for his work in developing open source supply chain security framework: SLSA at Google. Akash has also led course development for Google Cyber Security career certificate. He currently leads the security team at Apple AIML.

Customer reviews

5 out of 5 stars
12 global ratings

Review this product

Share your thoughts with other customers
Fantastic Read
5 out of 5 stars
Fantastic Read
The content is very well structured and nicely laid out. Would definitely recommend it!
Thank you for your feedback
Sorry, there was an error
Sorry we couldn't load the review

Top reviews from the United States

  • Reviewed in the United States on September 18, 2024
    This book is certainly a welcome addition to the cybersecurity landscape. Having known Akash for a long time, and witnessing his passion for information security firsthand, I was eager to dive into his perspective on defense in depth. And the book does not disappoint. Akash's writing is clear and engaging, makes even complex security concepts accessible to readers of varying technical backgrounds. He expertly weaved together the theoretical underpinnings of defense in depth with practical, real-world examples. As someone who has had countless conversations with Akash about cybersecurity, I can attest that his passion is genuine and infectious, backed by his colorful experience in the field.

    Whether you're a seasoned security professional or just starting your journey in the field, "The Complete Guide to Defense in Depth" is a valuable resource that I highly recommend.
  • Reviewed in the United States on August 3, 2024
    I'm a security professional. Been working directly as cyber security person or have been implementing defense in depth controls for more than a dozen years now. I feel this book can be your golden ticket and guide to tackle your vulnerabilities/security issues when directly resolving the issue is difficult due to various reasons. The author has a clear understanding of security and how we can effectively apply security controls.
  • Reviewed in the United States on August 13, 2024
    Akash Mukherjee's "The Complete Guide to Defense in Depth" is an essential resource for cybersecurity professionals looking to enhance their understanding and implementation of layered defense strategies. Mukherjee masterfully combines his extensive experience and deep knowledge of cyber threats to offer readers a comprehensive guide that is both educational and highly applicable in today's cyber landscape.

    One of the book’s strengths lies in its structured approach to explaining complex security concepts through real-world examples and case studies, making it accessible not only to seasoned experts but also to newcomers in the cybersecurity field. The detailed discussion on evolving cyber threats and the strategic guidance on implementing robust defense mechanisms provides readers with the tools necessary to build resilient and secure systems.

    Additionally, Mukherjee’s emphasis on the importance of adapting security strategies to align with the dynamic nature of cyber threats is particularly valuable. This book goes beyond theoretical knowledge, offering actionable advice that can be tailored to the specific needs of an organization, enhancing both its security posture and its ability to respond to incidents.

    This book is great for all cybersecurity audiences who are looking to implement a defense in depth strategy.

    Highlights:

    In-depth coverage of defense strategies against sophisticated cyberattacks.
    Practical advice and real-world applications of security concepts.
    Focus on continuous adaptation and resilience in cybersecurity practices.

    In conclusion, "The Complete Guide to Defense in Depth" by Akash Mukherjee is an invaluable addition to the cybersecurity literature, offering depth, clarity, and practical guidance to enhance the security frameworks of any organization. Whether you are a security professional or a business leader, this book will equip you with the knowledge and skills to navigate the complexities of modern cybersecurity challenges.
  • Reviewed in the United States on September 7, 2024
    The Complete Guide to Defense in Depth by Akash Mukherjee is an excellent resource for both security professionals and IT practitioners looking to understand and implement the concept of "Defense in Depth" within their organizations. Mukherjee delivers a clear, well-structured guide that breaks down the complexities of this multi-layered security strategy into actionable steps. The author Mukherjee doesn’t just present theoretical concepts; he also provides numerous real-world examples that help illustrate how Defense in Depth can be implemented in modern IT environments. The inclusion of case studies and practical scenarios is particularly useful, as they show how to apply these principles in various organizational contexts, whether you're securing a small business or a large enterprise. accessibility. Whether you're new to cybersecurity or have been working in the field for years, The Complete Guide to Defense in Depth caters to a wide audience. Mukherjee's writing is clear and easy to follow, with plenty of diagrams and explanations that simplify complex topics.
  • Reviewed in the United States on September 21, 2024
    The content is very well structured and nicely laid out. Would definitely recommend it!
    Customer image
    5.0 out of 5 stars Fantastic Read
    Reviewed in the United States on September 21, 2024
    The content is very well structured and nicely laid out. Would definitely recommend it!
    Images in this review
    Customer image
    Customer image
  • Reviewed in the United States on August 17, 2024
    Akash Mukherjee's "The Complete Guide to Defense in Depth" offers a comprehensive and accessible exploration of modern cybersecurity strategies. As someone with a keen interest in technology, I found this book to be both informative and engaging. Its holistic approach sets it apart, covering everything from risk navigation and asset classification to understanding the attacker's mindset. Mukherjee excels at explaining complex concepts without oversimplification, making it valuable for readers at different levels of technical expertise.

    The book's coverage of emerging threats and emphasis on adaptability are particularly noteworthy. Mukherjee presents Defense in Depth not as a static set of rules, but as a dynamic approach to security, aligning well with our rapidly changing digital landscape. The practical orientation of the book offers actionable guidance across various scenarios, while its progression from foundational concepts to advanced strategies ensures a logical learning path. Overall, "The Complete Guide to Defense in Depth" is an excellent resource for anyone seeking to understand and implement robust, multilayered security measures in today's complex cyber environment.
    Customer image
    5.0 out of 5 stars Navigating the Evolving Cyber Landscape: A Comprehensive yet Accessible Guide
    Reviewed in the United States on August 17, 2024
    Akash Mukherjee's "The Complete Guide to Defense in Depth" offers a comprehensive and accessible exploration of modern cybersecurity strategies. As someone with a keen interest in technology, I found this book to be both informative and engaging. Its holistic approach sets it apart, covering everything from risk navigation and asset classification to understanding the attacker's mindset. Mukherjee excels at explaining complex concepts without oversimplification, making it valuable for readers at different levels of technical expertise.

    The book's coverage of emerging threats and emphasis on adaptability are particularly noteworthy. Mukherjee presents Defense in Depth not as a static set of rules, but as a dynamic approach to security, aligning well with our rapidly changing digital landscape. The practical orientation of the book offers actionable guidance across various scenarios, while its progression from foundational concepts to advanced strategies ensures a logical learning path. Overall, "The Complete Guide to Defense in Depth" is an excellent resource for anyone seeking to understand and implement robust, multilayered security measures in today's complex cyber environment.
    Images in this review
    Customer image
    Customer image