Skip links

My Books

Sosyal Mühendislik İnternet ve Telefon Dolandırıcılığı

Sosyal Muhendislik – (Social Engineering – Turkish Edition)

Sosyal Muhendislik İnternet ve Telefon Dolandırıcılığı;

This is a Turkish blog post – announcement for my new book 

Meslekleri, görevleri ve eğitimleri gereği siber güvenlik, siber saldırı ve karşı tedbirleri konularında uzman olan 3 yazarın kaleme aldığı bu eser, yazarların daha önce karşılaştıkları sorunların çözümlerinden, kendilerine gele n sorulardan ve mesleki tecrübelerinden oluşmaktadır.

Gelişen teknoloji, yaygınlaşan internet kullanımı ve haberleşme yöntemleri ile kişiler hakkında bilgi edinmek ve bu bilgileri kötüye kullanmak artık çok daha kolay bir hale gelmiştir.

Kitapta, teknolojinin sağladığı imkânları kullanarak insanları kandırmak suretiyle özel veya gizli bir bilgi, para veya başka değerli metaları haksız yere elde edenler, sosyal mühendisler ve kullandıkları teknik, taktik ve yöntemler bütün yönleriyle ele alınmıştır.

Bu kapsamda, sosyal mühendislik kavramı içerisinde yer alan tanımlamalar ve sınıflandırmalar yaşanmış örneklerle açıklanarak genel resim ortaya konulmuş, ardından bu tuzaklara düşmemizin arkasında yatan psikolojik hususlar, duygusal zekâ, beden dili ve feraset ilmi anlatılmıştır.

Kavramsal bilgilendirmeyi tamamladıktan sonra, kendimizi dolandırıcının yerine koyarak bir sosyal mühendislik saldırısı incelemeci ve öğretici bir yaklaşımla ele alınmış, açık kaynak istihbarat toplama yöntemleri, saldırıda kullanılacak bilgisayar ve diğer araçların hazırlanması, internet üzerinde bıraktığımız izler, dark net dahil internetin tüm katmanları açıklanmış ve son aşamada örnek iki sosyal mühendislik saldırı adım adım anlatılmıştır.

Bilişim teknolojisinin kullanıldığı dolandırıcılık yöntemi olan “Sosyal Mühendislik” konusu Türkiye’de ilk defa bu derecede, “geniş, detaylı ve örnekli” olarak, konun uzmanları tarafından bu kitapta anlatılmıştır.

Yaşanmış Örnekler – Karşı Tedbirler

  • Sosyal Mühendisliğe Giriş
  • Sosyal Mühendislik Saldırısı Aşamaları
  • Bilgisayar Temelli Sosyal Mühendislik Saldırıları
  • Telefon Temelli Sosyal Mühendislik Saldırıları
  • İnsan Temelli Sosyal Mühendislik Saldırıları
  • İnternet / Sosyal Medya Temelli Sosyal Mühendislik Saldırıları
  • Sosyal Mühendisliğin Psikolojik Boyutu
  • İkna, Etkileme ve Hedef Seçimi
  • Saldırı Hazırlığı ve Sosyal Mühendislik Araçları
  • Açık Kaynak İstihbaratı
  • İnternet Katmanları
  • Tor (The Onion Router)
  • Dark Web Erişimi
  • Bilgi Toplama ve Saldırı
  • Teknik Bilgi Toplama Yöntemleri
  • Teknik Olmayan Bilgi Toplama Yöntemleri
  • Sosyal Mühendislik Saldırısı Örnekleri

Kavram ve Sınıflandırma – Yöntemler Continue reading Sosyal Muhendislik – (Social Engineering – Turkish Edition)

Cybersecurity Attack and Defense Strategies Chinese

Cybersecurity Attack Defense Strategies (Chinese Edition) 2022

Cybersecurity Attack Defense Strategies – Chinese Edition

I am extremely proud to announce that our award winning, best seller book is now also available in Chinese. The book was translated to Koren before and now its heading in a new milestone <3

Yuri and I will stay committed to helping the Cybersecurity Community globally.

Once I got the reseller details for our book, I will share them right here 😉

Cybersecurity Attack Defense Strategies (Chinese Edition) Continue reading Cybersecurity Attack Defense Strategies (Chinese Edition) 2022

Practical Cyber Threat Intelligence

Practical Cyber Threat Intelligence – New Book (17th)

Practical Cyber Threat Intelligence This is my seventeenth book with my name on the cover and like its predecessors, this book represents several years of in-depth research, analysis, and real-life work experience. While working as a Chief Information Security Officer (CISO )in a world class cybersecurity firm (Comodo Cybersecurity), spending time with cybersecurity communities, authoring […]

Manage Engine review

A review of Cybersecurity The Beginner’s Guide : Informative Review (March 22 )

A review of Cybersecurity The Beginner’s Guide Special thanks to Manage Engine for revieing my book and publishing it in their web site . You can read the review in ManageEngine web site via this link : A review of Dr. Erdal Ozkaya’s book Cybersecurity: The Beginner’s Guide The book Cybersecurity: The Beginner’s Guide, authored […]

Best Books on Cyber Security

18 Best Books to Learn Cyber Security

18 Best Books to Learn Cyber Security

In today’s world, every single thing is done with the help of technology. Technology has made things easier. The popularity of technology has led to cybercrime.

You can read the original blog post right here 

Quickly Check These Amazing Cyber Security Books

Cybercrime is also known as computer crime because a computer is used as a tool to commit fraud, trade, or violate privacy.

So, it is very important to have basic information about cybercrime and different ways to prevent it.

Many people do not have a good understanding of cybercrime.

Do you want proper knowledge about cybercrime and methods to prevent it?
Best Books to Learn Cyber Security for Beginners and Security Professionals
We have brought a collection of books for you to learn about cybercrime and cyber security.

We have compiled a list of the books that are my favorite. These books are recommended by my colleagues who have more than a decade of cybersecurity experience.

 

18 Best Books

1. Cybersecurity: The Beginner’s Guide by Dr. Erdal Ozkaya

2. Cybersecurity For Dummies by Joseph Steinberg

3. Kali Linux Hacking: A Complete Step by Step Guide by Ethem Mining

4. Cyber Warfare – Truth, Tactics, and Strategies by Dr. Chase Cunningham

5. Cybersecurity: Essential Guide for Beginners to Learn Basic Methods of Cybersecurity by Henry George

6. Cybersecurity for Beginners by Raef Meeuwisse

7. Cybersecurity Attacks – Red Team Strategies by Johann Rehberger

8. Next Level Cybersecurity: Detect the Signals, Stop the Hack by Sai Huda

9. The Art of Invisibility by Kevin Mintnick

10. Cyber Security: A Starter Guide to Cyber Security for Beginners by Kevin Kali

11. How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life by J. J Luna

12. Cyber Security: Hacking with Kali Linux, Ethical Hacking by Zach Codings

13. Learn Computer Forensics: A Beginner’s Guide to Searching, Analyzing, and Securing Digital Evidence by William Oettinger

14. CompTIA Security+ Guide to Network Security Fundamentals – Standalone Book by Mark Ciampa

15. Cyber Security: The Beginners Guide to Learning The Basics of Information Security and Modern Cyber Threats by Noah Zhang

16. Cybersecurity: A Comprehensive Beginner’s Guide to Learn the Realms of Cybersecurity from A-Z by Elijah Lewis

17. Cyber Minds: Insights on Cybersecurity Across the Cloud, Data, Artificial Intelligence, Blockchain, and IoT to Keep You Cyber Safe by Shira Rubinoff

18. Cybersecurity Essentials by Charles J. Brooks

Conclusion

Cybersecurity is one of the major concerns in today’s world.

We are exposed to risks and threats. To prevent this, it becomes very important to have knowledge about cyberspace. All the books are well-researched and written by experts.

They provide appropriate content for beginners and experienced security professionals. Don’t waste another second and get your favorite copy soon.

You can learn more on Wikipedia about Cyber Security.

If you did not find your favorite cyber security book here, you are welcome to leave it in the comment section. We will include it in this article titled Best Books to Learn Cyber Security for Beginners and Security Professionals when we update it the next time.

Continue reading 18 Best Books to Learn Cyber Security

ISC CBK Suggested References

CBK Suggested References – Great resources suggested by (ISC)²

CBK Suggested References Did you know that our book, Cybersecurity Attack and Defense Strategies is listed in one of the World’s Most Prestigious certification bodies as a Reference book? This reference list is not intended to be an all-inclusive collection representing the respective certifications Common Body of Knowledge (CBK). Its purpose is to provide candidates a starting point for […]

Explore
Drag