Target New ArrivalsGift Ideas for MomClothing, Shoes & AccessoriesHome & DecorKitchen & DiningOutdoor Living & GardenGroceryHousehold EssentialsBabyBeautyPersonal CareHealthWellnessLuggageSports & OutdoorsToysElectronicsVideo GamesMovies, Music & BooksSchool & Office SuppliesParty SuppliesGift IdeasGift CardsPetsUlta Beauty at TargetShop by CommunityTarget OpticalDealsClearanceTarget New ArrivalsSpring OutfitsGift Ideas for MomWomen’s Festival OutfitsTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Attack Vectors - by  Morey J Haber (Paperback) - 1 of 1

Attack Vectors - by Morey J Haber (Paperback)

$33.40Save $21.59 (39% off)

In Stock

Free & easy returns

Free & easy returns

Return this item by mail or in store within 90 days for a full refund.
Eligible for registries and wish lists

About this item

Highlights

  • From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders.
  • About the Author: Morey J. Haber is the Chief Security Advisor at BeyondTrust.
  • 384 Pages
  • Computers + Internet, Security

Description



Book Synopsis



From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity's evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry.

It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet's defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art.

As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today's high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future.

You'll Learn:

  • Understand the history of cyber-security from the early 1950's through today.
  • Explore the history of terminology that defines the threat landscape.
  • Examine the history of malware, exploits, breaches, syndicates, and people throughout the last 25 years.
  • Learn how modern cyber-security solutions have been developed to address the evolution of attack vectors.
  • Explore best practices for what to do after a breach and how to manage some of the biggest risks including human beings themselves.

Who This Book Is For?

New security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.



About the Author



Morey J. Haber is the Chief Security Advisor at BeyondTrust. As the Chief Security Advisor, Morey is the lead identity and technical evangelist at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. Morey has previous served as BeyondTrust's Chief Security Officer, Chief Technology, and Vice President of Product Management during nearly his 13-year tenure. In 2020, Morey was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board assisting the corporate community with identity security best practices. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. Morey earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.

Dimensions (Overall): 9.21 Inches (H) x 6.14 Inches (W) x .86 Inches (D)
Weight: 1.3 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 384
Genre: Computers + Internet
Sub-Genre: Security
Publisher: Apress
Theme: General
Format: Paperback
Author: Morey J Haber
Language: English
Street Date: October 29, 2025
TCIN: 1007433648
UPC: 9798868817083
Item Number (DPCI): 247-52-7526
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 0.86 inches length x 6.14 inches width x 9.21 inches height
Estimated ship weight: 1.3 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO, Alaska, Hawaii

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, delivered to the guest, delivered by a Shipt shopper, or picked up by the guest.
See the return policy for complete information.

Q: Does the book discuss modern cybersecurity solutions?

submitted by AI Shopping Assistant - 1 month ago
  • A: Yes, it explores how contemporary solutions tackle evolving attack vectors and threats in cybersecurity.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What historical events are mentioned in the book?

submitted by AI Shopping Assistant - 1 month ago
  • A: Key events include the Morris Worm, Stuxnet, CodeRed, and HeartBleed, illustrating the evolution of cyber threats.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What audience is this book intended for?

submitted by AI Shopping Assistant - 1 month ago
  • A: It is aimed at new security professionals, auditors, and IT staff looking to understand cybersecurity history.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: Who is the author of this book?

submitted by AI Shopping Assistant - 1 month ago
  • A: The author is Morey J. Haber, a Chief Security Advisor with over 25 years of IT experience.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Q: What topics are covered in the book regarding cybersecurity?

submitted by AI Shopping Assistant - 1 month ago
  • A: The book covers the evolution of malware, cyber attacks, exploits, and defensive strategies throughout history.

    submitted byAI Shopping Assistant - 1 month ago
    Ai generated

Additional product information and recommendations

Discover more options

Trending Computers & Technology Books

Get top deals, latest trends, and more.

Privacy policy