Cybersecurity – Attack and Defense Strategies (notice n° 76066)

détails MARC
000 -LEADER
fixed length control field 03714cam a2200289zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88938135
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250108000619.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250108s2022 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781803248776
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88938135
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Diogenes, Yuri
245 01 - TITLE STATEMENT
Title Cybersecurity – Attack and Defense Strategies
Remainder of title Improve your security posture to mitigate risks and prevent attackers from infiltrating your system
Statement of responsibility, etc. ['Diogenes, Yuri', 'Ozkaya, Dr. Erdal']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer Packt Publishing
Date of production, publication, distribution, manufacture, or copyright notice 2022
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape Key Features Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming Includes recent real-world examples to illustrate the best practices to improve security posture Book Description Cybersecurity – Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques. By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. What you will learn Learn to mitigate, recover from, and prevent future cybersecurity events Understand security hygiene and value of prioritizing protection of your workloads Explore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerations Adopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategies Explore legendary tools such as Nmap and Metasploit to supercharge your Red Team Discover identity security and how to perform policy enforcement Integrate threat detection systems into your SIEM solutions Discover the MITRE ATT&CK Framework and open-source tools to gather intelligence Who this book is for If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Diogenes, Yuri
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Ozkaya, Dr. Erdal
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88938135">https://international.scholarvox.com/netsen/book/88938135</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025