Cybersecurity attacks (Red Team activity)

"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Nesterenko, Sergii (RednerIn)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Place of publication not identified] Packt [2018]
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cgm a22000002 4500
001 ZDB-30-ORH-047715928
003 DE-627-1
005 20240228120448.0
006 m o | |
007 cr uuu---uuuuu
008 191023s2018 xx ||| |o o ||eng c
035 |a (DE-627-1)047715928 
035 |a (DE-599)KEP047715928 
035 |a (ORHE)9781788478878 
035 |a (DE-627-1)047715928 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Nesterenko, Sergii  |e RednerIn  |4 spk 
245 1 0 |a Cybersecurity attacks (Red Team activity)  |c Sergii Nesterenko 
264 1 |a [Place of publication not identified]  |b Packt  |c [2018] 
300 |a 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Title from title screen (viewed March 20, 2018). - Date of publication from resource description page 
520 |a "There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer security 
650 0 |a Computer crimes 
650 2 |a Computer Security 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Sécurité informatique 
650 4 |a Criminalité informatique 
650 4 |a Computer crimes  |0 (OCoLC)fst00872063 
650 4 |a Computer networks ; Security measures  |0 (OCoLC)fst00872341 
650 4 |a Computer security  |0 (OCoLC)fst00872484 
650 4 |a Electronic videos 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781788478878/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047715928
_version_ 1818767388939649024
adam_text
any_adam_object
author2 Nesterenko, Sergii
author2_role spk
author2_variant s n sn
author_facet Nesterenko, Sergii
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047715928
(DE-599)KEP047715928
(ORHE)9781788478878
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02733cgm a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-047715928</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120448.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047715928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047715928</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788478878</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047715928</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nesterenko, Sergii</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity attacks (Red Team activity)</subfield><subfield code="c">Sergii Nesterenko</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Packt</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen (viewed March 20, 2018). - Date of publication from resource description page</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="0">(OCoLC)fst00872063</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788478878/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047715928
illustrated Not Illustrated
indexdate 2024-12-18T08:49:06Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Packt
record_format marc
spelling Nesterenko, Sergii RednerIn spk
Cybersecurity attacks (Red Team activity) Sergii Nesterenko
[Place of publication not identified] Packt [2018]
1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.))
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Title from title screen (viewed March 20, 2018). - Date of publication from resource description page
"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page
Computer networks Security measures
Computer security
Computer crimes
Computer Security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Criminalité informatique
Computer crimes (OCoLC)fst00872063
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Electronic videos
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781788478878/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Cybersecurity attacks (Red Team activity)
Computer networks Security measures
Computer security
Computer crimes
Computer Security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Criminalité informatique
Computer crimes (OCoLC)fst00872063
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Electronic videos
subject_GND (OCoLC)fst00872063
(OCoLC)fst00872341
(OCoLC)fst00872484
title Cybersecurity attacks (Red Team activity)
title_auth Cybersecurity attacks (Red Team activity)
title_exact_search Cybersecurity attacks (Red Team activity)
title_full Cybersecurity attacks (Red Team activity) Sergii Nesterenko
title_fullStr Cybersecurity attacks (Red Team activity) Sergii Nesterenko
title_full_unstemmed Cybersecurity attacks (Red Team activity) Sergii Nesterenko
title_short Cybersecurity attacks (Red Team activity)
title_sort cybersecurity attacks red team activity
topic Computer networks Security measures
Computer security
Computer crimes
Computer Security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Criminalité informatique
Computer crimes (OCoLC)fst00872063
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Electronic videos
topic_facet Computer networks Security measures
Computer security
Computer crimes
Computer Security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Sécurité informatique
Criminalité informatique
Computer networks ; Security measures
Electronic videos
url https://learning.oreilly.com/library/view/-/9781788478878/?ar
work_keys_str_mv AT nesterenkosergii cybersecurityattacksredteamactivity