Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…

This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons.
This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons.
"An excellent starting point for future security professionals." -Help Net Security
Cybersecurity is a huge field, and breaking in can feel overwhelming. Where do you start when the territory spans everything from cryptography to cloud security to social engineering?
In Foundations of Cybersecurity, you'll learn how security professionals actually think about protecting systems. You'll start with core principles like authentication, authorization, and access control, then build outward into network defense, operating system hardening, application security, and security operations.
Each chapter introduces concepts in context, showing how they connect to real decisions you'll face on the job.
This updated second edition covers-
How attackers think- the threat landscape, social engineering tactics, and the kill chain How defenders respond- SOC operations, incident response, and vulnerability assessment The business side- governance, risk management, compliance frameworks, and penetration testing Securing what's new- AI systems, IoT devices, and cloud-native architectures Building your career- paths into security, certifications that matter, and the soft skills that separate good analysts from great ones
Hands-on projects throughout will have you apply what you've learned, from classifying real threat actors to designing detection rules to building a security awareness program.
Whether you're coming from IT or a completely different field, this book gives you the conceptual foundation to understand what cybersecurity professionals do, why they do it, and how to become one.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Stock availability can be subject to change without notice. We recommend calling the shop or contacting our online team to check availability of low stock items. Please see our Shopping Online page for more details.
This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons.
This comprehensive introduction to the information security field covers the industry's essential concepts, using real-world security breaches to illustrate key lessons.
"An excellent starting point for future security professionals." -Help Net Security
Cybersecurity is a huge field, and breaking in can feel overwhelming. Where do you start when the territory spans everything from cryptography to cloud security to social engineering?
In Foundations of Cybersecurity, you'll learn how security professionals actually think about protecting systems. You'll start with core principles like authentication, authorization, and access control, then build outward into network defense, operating system hardening, application security, and security operations.
Each chapter introduces concepts in context, showing how they connect to real decisions you'll face on the job.
This updated second edition covers-
How attackers think- the threat landscape, social engineering tactics, and the kill chain How defenders respond- SOC operations, incident response, and vulnerability assessment The business side- governance, risk management, compliance frameworks, and penetration testing Securing what's new- AI systems, IoT devices, and cloud-native architectures Building your career- paths into security, certifications that matter, and the soft skills that separate good analysts from great ones
Hands-on projects throughout will have you apply what you've learned, from classifying real threat actors to designing detection rules to building a security awareness program.
Whether you're coming from IT or a completely different field, this book gives you the conceptual foundation to understand what cybersecurity professionals do, why they do it, and how to become one.