|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1089683288 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190311s2019 cau o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d GW5XE
|d N$T
|d EBLCP
|d YDX
|d UPM
|d UKMGB
|d OCLCF
|d VT2
|d UMI
|d LQU
|d OCLCQ
|d COO
|d LEATE
|d UKAHL
|d OCLCQ
|d BRF
|d DCT
|d OCLCQ
|d OCLCO
|d COM
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB952851
|2 bnb
|
016 |
7 |
|
|a 019299084
|2 Uk
|
019 |
|
|
|a 1089857278
|a 1090037196
|a 1091325334
|a 1103281006
|a 1104212015
|a 1105196901
|a 1111058409
|a 1122812900
|a 1129338666
|a 1152979204
|a 1156351455
|a 1162737474
|a 1192349302
|a 1204098506
|a 1240524333
|
020 |
|
|
|a 9781484243091
|q (electronic bk.)
|
020 |
|
|
|a 1484243099
|q (electronic bk.)
|
020 |
|
|
|a 9781484243107
|q (print)
|
020 |
|
|
|a 1484243102
|
020 |
|
|
|z 9781484243084
|q (print)
|
020 |
|
|
|z 1484243080
|
024 |
7 |
|
|a 10.1007/978-1-4842-4309-1
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4842-4
|
029 |
1 |
|
|a AU@
|b 000065126524
|
029 |
1 |
|
|a AU@
|b 000065198802
|
029 |
1 |
|
|a AU@
|b 000067505134
|
029 |
1 |
|
|a CHNEW
|b 001084539
|
029 |
1 |
|
|a CHSLU
|b 001359324
|
029 |
1 |
|
|a CHVBK
|b 566427133
|
029 |
1 |
|
|a CHVBK
|b 592047504
|
029 |
1 |
|
|a UKMGB
|b 019299084
|
035 |
|
|
|a (OCoLC)1089683288
|z (OCoLC)1089857278
|z (OCoLC)1090037196
|z (OCoLC)1091325334
|z (OCoLC)1103281006
|z (OCoLC)1104212015
|z (OCoLC)1105196901
|z (OCoLC)1111058409
|z (OCoLC)1122812900
|z (OCoLC)1129338666
|z (OCoLC)1152979204
|z (OCoLC)1156351455
|z (OCoLC)1162737474
|z (OCoLC)1192349302
|z (OCoLC)1204098506
|z (OCoLC)1240524333
|
037 |
|
|
|a com.springer.onix.9781484243091
|b Springer Nature
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UR
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oakley, Jacob G.,
|e author.
|
245 |
1 |
0 |
|a Professional Red teaming :
|b conducting successful cybersecurity engagements /
|c Jacob G. Oakley.
|
264 |
|
1 |
|a [Berkeley, CA] :
|b Apress,
|c 2019.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (SpringerLink, viewed March 13, 2019).
|
505 |
0 |
|
|a Intro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Red Teams in Cyberspace; Intentions; Advantages; Evaluating Preparedness; Evaluating Defenses; Evaluating Monitoring; Evaluating Responses; Disadvantages; Summary; Chapter 2: Why Human Hackers?; Innovation and Automation; Modeling Technology; Nonpivot Technology; Pivoting and Exploiting Technology; Automation Advantages and Disadvantages; Advantages; Disadvantages; Active; Passive; Example Scenarios; Scenario 1; Scenario 2; Scenario 3; Scenario 4; Threat Hunting; Summary
|
505 |
8 |
|
|a Chapter 3: The State of Modern Offensive SecurityThe Challenge of Advanced Persistent Threats; More Capable; More Time; Infinite Scope; No Rules of Engagement; Environmental Challenges; Regulatory Standards; Limited Innovation; Misconceptions; Adversarial Customers; Technical Personnel; Managerial Personnel; User Personnel; Personnel Conclusion; Effective Red Team Staffing; Summary; Chapter 4: Shaping; Who; Customer Technical Personnel; Customer Operational Personnel; Provider Technical Personnel; Provider Operational Personnel; When; Preventing Incidents; Balancing Scope Attributes; What
|
505 |
8 |
|
|a Motivation of the AssessmentPrior Testing; Existing Security; Scope Footprint; Inorganic Constraints; Summary; Chapter 5: Rules of Engagement; Activity Types; Physical; Social Engineering; External Network; Internal Network; Pivoting; Wireless Network; Category; Escalation of Force; Incident Handling; Tools; Certification Requirements; Personnel Information; Summary; Chapter 6: Executing; Staffing; The Professional Hacker; Best Practices; Check the ROE; Acknowledge Activity; Operational Tradecraft; Operational Notes; Enumeration and Exploitation; Postaccess Awareness; System Manipulation
|
505 |
8 |
|
|a Leaving the TargetExample Operational Notes; Summary; Chapter 7: Reporting; Necessary Inclusions; Types of Findings; Exploited Vulnerabilities; Nonexploited Vulnerabilities; Technical Vulnerabilities; Nontechnical Vulnerabilities; Documenting Findings; Findings Summaries; Individual Findings; Briefing; The No-Results Assessment; Summary; Chapter 8: Purple Teaming; Challenges; People Problems; Customer Needs; Types of Purple Teaming; Reciprocal Awareness; Unwitting Host; Unwitting Attacker; Red-Handed Testing; Catch and Release; The Helpful Hacker; Summary; Chapter 9: Counter-APT Red Teaming
|
505 |
8 |
|
|a CAPTR TeamingWorst-case Risk Analysis and Scoping; Critical Initialization Perspective; Reverse Pivot Chaining; Contrast; Zero Day; Insider Threats; Efficiency; Introduced Risk; Disadvantages; Summary; Chapter 10: Outcome-oriented Scoping; Worst-case Risk Assessment; The Right Stuff; Operational Personnel; Technical Personnel; Assessor Personnel; Example Scope; Centrality Analysis; Summary; Chapter 11: Initialization Perspectives; External Initialization Perspective; DMZ Initialization Perspective; Internal Initialization Perspective; Critical Initialization Perspective
|
520 |
|
|
|a Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Oakley, Jacob G.
|t Professional Red teaming.
|d [Berkeley, CA] : Apress, 2019
|z 1484243080
|z 9781484243084
|w (OCoLC)1071867367
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484243091/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36137296
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5726261
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2044893
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16102446
|
994 |
|
|
|a 92
|b IZTAP
|