|
|
|
|
LEADER |
00000cam a22000007a 4500 |
001 |
OR_on1372398657 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||||||| |
008 |
230311s2023 enk o 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d ORMDA
|d EBLCP
|d OCLCF
|d YDX
|d UKMGB
|d N$T
|d NBJ
|d IEEEE
|d OCLCO
|
015 |
|
|
|a GBC315884
|2 bnb
|
016 |
7 |
|
|a 020933802
|2 Uk
|
019 |
|
|
|a 1371570323
|
020 |
|
|
|a 9781801073615
|
020 |
|
|
|a 1801073619
|
020 |
|
|
|z 9781801072472
|q paperback
|
029 |
1 |
|
|a UKMGB
|b 020933802
|
029 |
1 |
|
|a AU@
|b 000074572447
|
035 |
|
|
|a (OCoLC)1372398657
|z (OCoLC)1371570323
|
037 |
|
|
|a 9781801072472
|b O'Reilly Media
|
037 |
|
|
|a 10162645
|b IEEE
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20230314
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sehgal, Kunal,
|e author.
|
245 |
1 |
0 |
|a Cybersecurity blue team strategies :
|b uncover the secrets of blue teams to combat cyber threats in your organization /
|c Kunal Sehgal, Nikolaos Thymianis.
|
250 |
|
|
|a 1st edition.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2023.
|
300 |
|
|
|a 1 online resource (208 p.)
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
500 |
|
|
|a Description based upon print version of record.
|
504 |
|
|
|a Includes index.
|
520 |
|
|
|a This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
|
505 |
0 |
|
|a Part 1: Establishing the Blue -- Chapter 1: Establishing a Defense Program -- Chapter 2: Managing a Defense Security Team -- Chapter 3: Risk Assessment -- Chapter 4: Blue Team Operations -- Chapter 5: Threats -- What are cyber threats? -- Chapter 6: Governance, Compliance, Regulations, and Best Practices -- Part 2: Controlling the Fray -- Chapter 7: Preventive Controls -- Chapter 8: Detective Controls -- Chapter 9: Cyber Threat Intelligence -- Chapter 10: Incident Response and Recovery -- Chapter 11: Prioritizing and Implementing a Blue Team Strategy -- Part 3: Ask the Experts -- Chapter 12: Expert Insights.
|
500 |
|
|
|a Corrective controls
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique.
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Thymianis, Nikolaos,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Sehgal, Kunal
|t Cybersecurity Blue Team Strategies
|d Birmingham : Packt Publishing, Limited,c2023
|z 9781801072472
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781801072472/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL30399073
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 304661221
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 3565330
|
994 |
|
|
|a 92
|b IZTAP
|