|
|
|
|
LEADER |
00000cam a22000007i 4500 |
001 |
OR_on1347229868 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
221011t20222022enka ob 001 0 eng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d UKMGB
|d YDXIT
|d N$T
|d OCLCF
|d UKAHL
|d IEEEE
|d OCLCO
|
015 |
|
|
|a GBC2E2345
|2 bnb
|
016 |
7 |
|
|a 020711230
|2 Uk
|
019 |
|
|
|a 1350412127
|
020 |
|
|
|a 9781803243955
|q electronic book
|
020 |
|
|
|a 1803243953
|q electronic book
|
020 |
|
|
|z 9781803248776
|
029 |
1 |
|
|a UKMGB
|b 020711230
|
035 |
|
|
|a (OCoLC)1347229868
|z (OCoLC)1350412127
|
037 |
|
|
|a 9781803248776
|b O'Reilly Media
|
037 |
|
|
|a 10163554
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|b C93 2022
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20221011
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Diogenes, Yuri,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity :
|b attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system /
|c Yuri Diogenes, Dr. Erdal Ozkaya.
|
250 |
|
|
|a Third edition.
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c 2022.
|
264 |
|
4 |
|c ©2022
|
300 |
|
|
|a 1 online resource (570 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Expert insight
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
|
588 |
|
|
|a Description based on online resource; title from digital title page (viewed on November 11, 2022).
|
505 |
0 |
|
|a Table of Contents Security Posture Incident Response Process What is a Cyber Strategy? Understanding the Cybersecurity Kill Chain Reconnaissance Compromising the System Chasing a User’s Identity Lateral Movement Privilege Escalation Security Policy Network Security Active Sensors Threat Intelligence Investigating an Incident Recovery Process Vulnerability Management Log Analysis.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Ozkaya, Erdal,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 9781803248776
|
830 |
|
0 |
|a Expert insight.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781803248776/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH40001921
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3395475
|
994 |
|
|
|a 92
|b IZTAP
|