Cargando…

Cybersecurity blue team strategies : uncover the secrets of blue teams to combat cyber threats in your organization /

This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Sehgal, Kunal (Autor), Thymianis, Nikolaos (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1372398657
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 230311s2023 enk o 001 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d ORMDA  |d EBLCP  |d OCLCF  |d YDX  |d UKMGB  |d N$T  |d NBJ  |d IEEEE  |d OCLCO 
015 |a GBC315884  |2 bnb 
016 7 |a 020933802  |2 Uk 
019 |a 1371570323 
020 |a 9781801073615 
020 |a 1801073619 
020 |z 9781801072472  |q paperback 
029 1 |a UKMGB  |b 020933802 
029 1 |a AU@  |b 000074572447 
035 |a (OCoLC)1372398657  |z (OCoLC)1371570323 
037 |a 9781801072472  |b O'Reilly Media 
037 |a 10162645  |b IEEE 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23/eng/20230314 
049 |a UAMI 
100 1 |a Sehgal, Kunal,  |e author. 
245 1 0 |a Cybersecurity blue team strategies :  |b uncover the secrets of blue teams to combat cyber threats in your organization /  |c Kunal Sehgal, Nikolaos Thymianis. 
250 |a 1st edition. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2023. 
300 |a 1 online resource (208 p.) 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
500 |a Description based upon print version of record. 
504 |a Includes index. 
520 |a This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch. 
505 0 |a Part 1: Establishing the Blue -- Chapter 1: Establishing a Defense Program -- Chapter 2: Managing a Defense Security Team -- Chapter 3: Risk Assessment -- Chapter 4: Blue Team Operations -- Chapter 5: Threats -- What are cyber threats? -- Chapter 6: Governance, Compliance, Regulations, and Best Practices -- Part 2: Controlling the Fray -- Chapter 7: Preventive Controls -- Chapter 8: Detective Controls -- Chapter 9: Cyber Threat Intelligence -- Chapter 10: Incident Response and Recovery -- Chapter 11: Prioritizing and Implementing a Blue Team Strategy -- Part 3: Ask the Experts -- Chapter 12: Expert Insights. 
500 |a Corrective controls 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer crimes. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Criminalité informatique. 
650 7 |a Computer crimes  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Thymianis, Nikolaos,  |e author. 
776 0 8 |i Print version:  |a Sehgal, Kunal  |t Cybersecurity Blue Team Strategies  |d Birmingham : Packt Publishing, Limited,c2023  |z 9781801072472 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781801072472/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30399073 
938 |a YBP Library Services  |b YANK  |n 304661221 
938 |a EBSCOhost  |b EBSC  |n 3565330 
994 |a 92  |b IZTAP