Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system

Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will lear...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Diogenes, Yuri (VerfasserIn), Ozkaya, Erdal (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing 2022
Ausgabe:Third edition.
Schriftenreihe:Expert insight
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-082537674
003 DE-627-1
005 20240228121825.0
007 cr uuu---uuuuu
008 221111s2022 xx |||||o 00| ||eng c
020 |a 9781803243955  |c electronic book  |9 978-1-80324-395-5 
020 |a 1803243953  |c electronic book  |9 1-80324-395-3 
020 |a 9781803248776  |9 978-1-80324-877-6 
035 |a (DE-627-1)082537674 
035 |a (DE-599)KEP082537674 
035 |a (ORHE)9781803248776 
035 |a (DE-627-1)082537674 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20221011 
100 1 |a Diogenes, Yuri  |e VerfasserIn  |4 aut 
245 1 0 |a Cybersecurity  |b attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system  |c Yuri Diogenes, Dr. Erdal Ozkaya 
250 |a Third edition. 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2022 
264 4 |c ©2022 
300 |a 1 online resource (570 pages) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Expert insight 
500 |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022) 
520 |a Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. 
650 0 |a Computer security 
650 4 |a Sécurité informatique 
650 4 |a Computer security 
700 1 |a Ozkaya, Erdal  |e VerfasserIn  |4 aut 
776 1 |z 9781803248776 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781803248776 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781803248776/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-082537674
_version_ 1818767249878548480
adam_text
any_adam_object
author Diogenes, Yuri
Ozkaya, Erdal
author_facet Diogenes, Yuri
Ozkaya, Erdal
author_role aut
aut
author_sort Diogenes, Yuri
author_variant y d yd
e o eo
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)082537674
(DE-599)KEP082537674
(ORHE)9781803248776
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition Third edition.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03039cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-082537674</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121825.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803243955</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-80324-395-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803243953</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-80324-395-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803248776</subfield><subfield code="9">978-1-80324-877-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082537674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803248776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221011</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system</subfield><subfield code="c">Yuri Diogenes, Dr. Erdal Ozkaya</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (570 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Expert insight</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781803248776</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781803248776</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803248776/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-082537674
illustrated Not Illustrated
indexdate 2024-12-18T08:46:53Z
institution BVB
isbn 9781803243955
1803243953
9781803248776
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (570 pages)
psigel ZDB-30-ORH
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Packt Publishing
record_format marc
series2 Expert insight
spelling Diogenes, Yuri VerfasserIn aut
Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya
Third edition.
Birmingham, UK Packt Publishing 2022
©2022
1 online resource (570 pages)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Expert insight
Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022)
Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
Computer security
Sécurité informatique
Ozkaya, Erdal VerfasserIn aut
9781803248776
Erscheint auch als Druck-Ausgabe 9781803248776
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781803248776/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Diogenes, Yuri
Ozkaya, Erdal
Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
Computer security
Sécurité informatique
title Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
title_auth Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
title_exact_search Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
title_full Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya
title_fullStr Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya
title_full_unstemmed Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya
title_short Cybersecurity
title_sort cybersecurity attack and defense strategies improve your security posture to mitigate risks and prevent attackers from infiltrating your system
title_sub attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
topic Computer security
Sécurité informatique
topic_facet Computer security
Sécurité informatique
url https://learning.oreilly.com/library/view/-/9781803248776/?ar
work_keys_str_mv AT diogenesyuri cybersecurityattackanddefensestrategiesimproveyoursecurityposturetomitigaterisksandpreventattackersfrominfiltratingyoursystem
AT ozkayaerdal cybersecurityattackanddefensestrategiesimproveyoursecurityposturetomitigaterisksandpreventattackersfrominfiltratingyoursystem