|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1024148082 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180223s2018 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d TOH
|d OCLCF
|d OCLCA
|d N$T
|d CEF
|d YDX
|d KSU
|d NLE
|d DEBBG
|d TEFOD
|d G3B
|d S9I
|d UAB
|d OCLCQ
|d OCLCO
|d NZAUC
|d OCLCQ
|
019 |
|
|
|a 1044533098
|
020 |
|
|
|a 9781788473859
|q (electronic bk.)
|
020 |
|
|
|a 178847385X
|q (electronic bk.)
|
020 |
|
|
|a 1788475291
|
020 |
|
|
|a 9781788475297
|
020 |
|
|
|z 9781788475297
|
029 |
1 |
|
|a GBVCP
|b 1016524331
|
035 |
|
|
|a (OCoLC)1024148082
|z (OCoLC)1044533098
|
037 |
|
|
|a CL0500000942
|b Safari Books Online
|
037 |
|
|
|a 81C7FA63-218E-4F38-BE7B-BF9E3225BA04
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Diogenes, Yuri,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity, attack and defense strategies :
|b infrastructure security with Red Team and Blue Team tactics /
|c Yuri Diogenes, Erdal Ozkaya.
|
246 |
3 |
0 |
|a Infrastructure security with Red Team and Blue Team tactics
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed February 22, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ...
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a Operating systems.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Networking.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
700 |
1 |
|
|a Ozkaya, Erdal,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Diogenes, Yuri.
|t Cybersecurity - Attack and Defense Strategies : Infrastructure security with Red Team and Blue Team tactics.
|d Birmingham : Packt Publishing, ©2018
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788475297/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1703781
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15146414
|
994 |
|
|
|a 92
|b IZTAP
|