- Home
- Computers
- Management Information Systems
- Foundations of Cybersecurity, 2nd Edition (A Straightforward Introduction)
Foundations of Cybersecurity, 2nd Edition (A Straightforward Introduction)
List Price:
$59.99
| Expected release date is May 19th 2026 |
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Jason Andress
Format:
Paperback
Pages:
328
Publisher:
No Starch Press (May 19, 2026)
Imprint:
No Starch Press
Release Date:
May 19, 2026
Language:
English
Audience:
General/trade
ISBN-13:
9781718504400
ISBN-10:
1718504403
Weight:
22.4oz
Dimensions:
6.94" x 9.13" x 0.77"
File:
RandomHouse-PRH_Book_Company_PRH_PRT_Onix_delta_active_D20260513T235852_156254930-20260514.xml
Folder:
RandomHouse
List Price:
$59.99
Country of Origin:
United States
Pub Discount:
65
Case Pack:
22
As low as:
$46.19
Publisher Identifier:
P-RH
Discount Code:
A
QuickShip:
Yes
Overview
This comprehensive introduction to the information security field covers the industry’s essential concepts, using real-world security breaches to illustrate key lessons.
"An excellent starting point for future security professionals.”
—Help Net Security
Cybersecurity is a huge field, and breaking in can feel overwhelming. Where do you start when the territory spans everything from cryptography to cloud security to social engineering?
In Foundations of Cybersecurity, you’ll learn how security professionals actually think about protecting systems. You’ll start with core principles like authentication, authorization, and access control, then build outward into network defense, operating system hardening, application security, and security operations.
Each chapter introduces concepts in context, showing how they connect to real decisions you’ll face on the job.
This updated second edition covers:
Hands-on projects throughout will have you apply what you’ve learned, from classifying real threat actors to designing detection rules to building a security awareness program.
Whether you’re coming from IT or a completely different field, this book gives you the conceptual foundation to understand what cybersecurity professionals do, why they do it, and how to become one.
"An excellent starting point for future security professionals.”
—Help Net Security
Cybersecurity is a huge field, and breaking in can feel overwhelming. Where do you start when the territory spans everything from cryptography to cloud security to social engineering?
In Foundations of Cybersecurity, you’ll learn how security professionals actually think about protecting systems. You’ll start with core principles like authentication, authorization, and access control, then build outward into network defense, operating system hardening, application security, and security operations.
Each chapter introduces concepts in context, showing how they connect to real decisions you’ll face on the job.
This updated second edition covers:
- How attackers think: the threat landscape, social engineering tactics, and the kill chain
- How defenders respond: SOC operations, incident response, and vulnerability assessment
- The business side: governance, risk management, compliance frameworks, and penetration testing
- Securing what’s new: AI systems, IoT devices, and cloud-native architectures
- Building your career: paths into security, certifications that matter, and the soft skills that separate good analysts from great ones
Hands-on projects throughout will have you apply what you’ve learned, from classifying real threat actors to designing detection rules to building a security awareness program.
Whether you’re coming from IT or a completely different field, this book gives you the conceptual foundation to understand what cybersecurity professionals do, why they do it, and how to become one.









