Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system
Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will lear...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2022
|
Ausgabe: | Third edition. |
Schriftenreihe: | Expert insight
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-082537674 | ||
003 | DE-627-1 | ||
005 | 20240228121825.0 | ||
007 | cr uuu---uuuuu | ||
008 | 221111s2022 xx |||||o 00| ||eng c | ||
020 | |a 9781803243955 |c electronic book |9 978-1-80324-395-5 | ||
020 | |a 1803243953 |c electronic book |9 1-80324-395-3 | ||
020 | |a 9781803248776 |9 978-1-80324-877-6 | ||
035 | |a (DE-627-1)082537674 | ||
035 | |a (DE-599)KEP082537674 | ||
035 | |a (ORHE)9781803248776 | ||
035 | |a (DE-627-1)082537674 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20221011 | |
100 | 1 | |a Diogenes, Yuri |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity |b attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system |c Yuri Diogenes, Dr. Erdal Ozkaya |
250 | |a Third edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2022 | |
264 | 4 | |c ©2022 | |
300 | |a 1 online resource (570 pages) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Expert insight | |
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022) | ||
520 | |a Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ozkaya, Erdal |e VerfasserIn |4 aut | |
776 | 1 | |z 9781803248776 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781803248776 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781803248776/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-082537674 |
---|---|
_version_ | 1818767249878548480 |
adam_text | |
any_adam_object | |
author | Diogenes, Yuri Ozkaya, Erdal |
author_facet | Diogenes, Yuri Ozkaya, Erdal |
author_role | aut aut |
author_sort | Diogenes, Yuri |
author_variant | y d yd e o eo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)082537674 (DE-599)KEP082537674 (ORHE)9781803248776 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Third edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03039cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-082537674</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121825.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">221111s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803243955</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-80324-395-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1803243953</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-80324-395-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781803248776</subfield><subfield code="9">978-1-80324-877-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP082537674</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781803248776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)082537674</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221011</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity</subfield><subfield code="b">attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system</subfield><subfield code="c">Yuri Diogenes, Dr. Erdal Ozkaya</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (570 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Expert insight</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781803248776</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781803248776</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781803248776/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-082537674 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:46:53Z |
institution | BVB |
isbn | 9781803243955 1803243953 9781803248776 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (570 pages) |
psigel | ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Packt Publishing |
record_format | marc |
series2 | Expert insight |
spelling | Diogenes, Yuri VerfasserIn aut Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya Third edition. Birmingham, UK Packt Publishing 2022 ©2022 1 online resource (570 pages) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Expert insight Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on November 11, 2022) Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. Computer security Sécurité informatique Ozkaya, Erdal VerfasserIn aut 9781803248776 Erscheint auch als Druck-Ausgabe 9781803248776 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781803248776/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Diogenes, Yuri Ozkaya, Erdal Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Computer security Sécurité informatique |
title | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system |
title_auth | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system |
title_exact_search | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system |
title_full | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya |
title_fullStr | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya |
title_full_unstemmed | Cybersecurity attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system Yuri Diogenes, Dr. Erdal Ozkaya |
title_short | Cybersecurity |
title_sort | cybersecurity attack and defense strategies improve your security posture to mitigate risks and prevent attackers from infiltrating your system |
title_sub | attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system |
topic | Computer security Sécurité informatique |
topic_facet | Computer security Sécurité informatique |
url | https://learning.oreilly.com/library/view/-/9781803248776/?ar |
work_keys_str_mv | AT diogenesyuri cybersecurityattackanddefensestrategiesimproveyoursecurityposturetomitigaterisksandpreventattackersfrominfiltratingyoursystem AT ozkayaerdal cybersecurityattackanddefensestrategiesimproveyoursecurityposturetomitigaterisksandpreventattackersfrominfiltratingyoursystem |