" >

The Resource List of the Week – Cybersecurity

This week, our Resource List of the Week concentrates on Cybersecurity. Before starting, let’s give a definition to this topic.

What is Cyber Security?

According to the SearchSecurity,

“Cybersecurity is the protection of Internet-connected systems, including hardware, software and data, from cyber attacks.”

To better understand the topic, we recommend you read the following titles and resources.


1. Cyber Security – Sutton, D.

Cybersecurity is more essential today than ever, not just in the workplace but at home too. This book describes various types of cyber threat explaining what people can do to mitigate these risks and keep their data secure.

Cyber Security - Sutton, D.


2. Cyber Security Management – Trim, P. and Lee, Y.I.

This text, derived from research, places security management in a holistic context, outlining how the strategic marketing approach can be used to underpin cyber security in partnership arrangements. This is a unique title that integrates highly specialized materials understandableby everyone, including non-specialists.

Cyber Security Management - Trim, P. and Lee, Y.I.


3. Cyber Security Culture – Trim, P. and Upton, D.

This research-based, unique book contains insights from experts who do not normally release information into the public arena. The text is a useful resource for managers and government agencies, explaining how organizational learning and training can be utilized to develop a culture that protects companies from attacks. Finally, the authors outline that the speed and complexity of cyber-attacks demand a different approach to security management. Therefore, the book includes scenario-based planning and training to supplement security policies and technical protection systems.

Cyber Security Culture - Trim, P. and Upton, D.


4. Cyber Security Engineering – Mead, N.R. and Woody, C.

This text provides references and tutorials on the capabilities related to modern cybersecurity engineering. Firstly, the authors bring together comprehensive best practices for building software systems that exhibit superior operational security. Then, it gives suggestions for considering security throughout the full system development and acquisition lifecycles. Finally, the book introduces seven core principles of software assurance showing how to apply them coherently and systematically.

Cyber Security Engineering - Mead, N.R. and Woody, C.


5. Research Methods for Cyber Security – Edgar, T.W. and Manz, D.O.

This book outlines scientific methods for generating impactful knowledge, validating theories, and adding critical rigour to the cybersecurity field. Firstly, it shows how to develop a research plan; then, it delineates useful research methodologies for cybersecurity study: observational, mathematical, experimental, and applied. Finally, each research method chapter concludes with recommended outlines and suggested templates for submission to peer-reviewed venues.

Research Methods for Cyber Security - Edgar, T.W. and Manz, D.O.


6. Information Security Resources

This webpage is a collection of cybersecurity resources along with helpful links to the SANS websites, content and free resources.


7. Cyber Security Resources

This website hosts information about professional associations, educational opportunities, certifications and social media contacts, useful to anyone involved in Cyber Security.


8. Five Laws of Cyber Security

This video shows a Ted Talk byNick Espinosa, an expert in cybersecurity and network infrastructure.

If you dont want to miss out on any updates, please subscribe to our newsletter!