Search the Library Catalogue
000 -LEADER | |
---|---|
fixed length control field | 01789nam a2200205Ia 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240825s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781838827793 |
Paper back/Hardbound | pbk |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Item number | DIO |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Diogenes, Yuri |
245 #0 - TITLE STATEMENT | |
Title | Cybersecurity - Attack and Defense Strategies |
Statement of responsibility, etc | / Diogenes, Yuri |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | Packt |
Year of publication | 2019 |
Place of publication | UK |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xvi, 610p. |
Dimensions | 23cm. |
500 ## - GENERAL NOTE | |
General note | 1st Published 2018 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes index |
520 ## - SUMMARY, ETC. | |
Summary, etc | Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.<br/>In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.<br/>By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer Science |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | English Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 24.05.2024 | 2799.00 | 005.8 DIO | 687515 | 24.05.2024 | Reference |