Cybersecurity - Attack and Defense Strategies (Record no. 550551)

MARC details
000 -LEADER
fixed length control field 01789nam a2200205Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240825s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781838827793
Paper back/Hardbound pbk
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number DIO
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Diogenes, Yuri
245 #0 - TITLE STATEMENT
Title Cybersecurity - Attack and Defense Strategies
Statement of responsibility, etc / Diogenes, Yuri
250 ## - EDITION STATEMENT
Edition statement 2nd edition
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher Packt
Year of publication 2019
Place of publication UK
300 ## - PHYSICAL DESCRIPTION
Number of Pages xvi, 610p.
Dimensions 23cm.
500 ## - GENERAL NOTE
General note 1st Published 2018
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes index
520 ## - SUMMARY, ETC.
Summary, etc Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.<br/>In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.<br/>By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type English Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Full call number Accession Number Price effective from Koha item type
        Anna Centenary Library Anna Centenary Library 3RD FLOOR, A WING 24.05.2024 2799.00 005.8 DIO 687515 24.05.2024 Reference

Find us on the map