Public library services for Canadians with print disabilities
  • Mobile accessibility tips
    • Change contrast
      • AYellow on black selected
      • ABlack on yellow selected
      • AWhite on black selected
      • ABlack on white selected
      • ADefault colours selected
    • Change text size
      • Text size Small selected
      • Text size Medium selected
      • Text size Large selected
      • Text size Maximum selected
    • Change font
      • Arial selected
      • Verdana selected
      • Comic Sans MS selected
    • Change text spacing
      • Narrow selected
      • Medium selected
      • Wide selected
  • Register
  • Log in
  • Français
  • Home
  • Newspapers
  • Magazines
  • Recommended
  • For libraries
  • Help
  • Skip to content
      • Change contrast
        • AYellow on black selected
        • ABlack on yellow selected
        • AWhite on black selected
        • ABlack on white selected
        • ADefault colours selected
      • Change text size
        • Text size Small selected
        • Text size Medium selected
        • Text size Large selected
        • Text size Maximum selected
      • Change font
        • Arial selected
        • Verdana selected
        • Comic Sans MS selected
      • Change text spacing
        • Narrow selected
        • Medium selected
        • Wide selected
  • Accessibility tips
CELAPublic library services for Canadians with print disabilities

Centre for Equitable Library Access
Public library service for Canadians with print disabilities

  • Register
  • Log in
  • Français
  • Home
  • Newspapers
  • Magazines
  • Recommended
  • For libraries
  • Help
  • Advanced search
  • Browse by category
  • Search tips
Breadcrumb
  1. Home

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)

By Akashdeep Bhardwaj

Arts and entertainment, Computers and internet

Synthetic audio, Automated braille

Summary

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in… today’s evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises.This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations. As the world becomes increasingly interconnected, this book dedicates several chapters to the Internet of Things (IoT), uncovering its vulnerabilities and showcasing threat surface attack assessments through real device testing and threat mapping frameworks. Readers learn to analyze device security and apply countermeasures such as secure boot, blockchain integration, and anomaly detection.The volume also delves into the dark web, shedding light on anonymous networks like TOR and I2P and equipping readers with methods to investigate hidden services safely. It explains how to extract intelligence using automation, analyze illicit activity, and integrate findings into broader cybersecurity frameworks. Culminating with advanced cyber threat intelligence (CTI), this book examines intelligence cycles, tools, and platforms, enabling readers to move from theory to practice. From indicator of compromise analysis and threat actor profiling to automation and incident response, readers gain the skills to leverage CTI for strategic defense.Designed for cybersecurity students, professionals, and enthusiasts, this book offers a balanced blend of technical depth, ethical awareness, and actionable guidance. By the end, readers will not only understand key cybersecurity domains but also be prepared to apply their knowledge in practical, high-stakes environments, making them valuable assets in the fight against cyber threats.

Title Details

ISBN 9781040434710
Publisher CRC Press
Copyright Date 2026
Book number 6895521
Report a problem with this book

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)

FAQ

Which devices can I use to read books and magazines from CELA?

Answer: CELA books and magazines work with many popular accessible reading devices and apps. Find out more on ourCompatible devices and formats page.

Go to Frequently Asked Questions page

About us

The Centre for Equitable Library Access, CELA, is an accessible library service, providing books and other materials to Canadians with print disabilities.

  • Learn more about CELA
  • Privacy
  • Terms of acceptable use
  • Member libraries

Follow us

Keep up with news from CELA!

  • Subscribe to our newsletters
  • Blog
  • Facebook
  • Bluesky
  • Twitter
  • Youtube

Suggestion Box

CELA welcomes all feedback and suggestions:

  • Join our Educator Advisory Group
  • Apply for our User Advisory Group
  • Suggest a title for the collection
  • Report a problem with a book

Contact Us

Email us at help@celalibrary.ca or call us at 1-855-655-2273 for support.

Go to contact page for full details

Copyright 2025 CELA. All rights reserved.