Search the Library Catalogue
| 000 -LEADER | |
|---|---|
| fixed length control field | 01545nam a2200193Ia 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 240825s9999 xx 000 0 und d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781801074292 |
| Paper back/Hardbound | pbk |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | ROU |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Routin, David |
| 245 #0 - TITLE STATEMENT | |
| Title | Purple Team Strategies : enhancing global security posture through uniting red and blue teams with adversary emulation |
| Statement of responsibility, etc | / David Routin, Simon Thoores , Samuel Rossier |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 1st edition |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Name of publisher | Packt |
| Year of publication | 2022 |
| Place of publication | Birmingham, UK |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xviii, 430 pages,: |
| Other physical details | ill,; |
| Dimensions | 22 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features Apply real-world strategies to strengthen the capabilities of your organization's security system Learn to not only defend your system but also think from an attacker's perspective Ensure the ultimate effectiveness of an organization's red and blue teams with practical tips Book Description With small to large companies focusing on hardening their security systems, the term "purple team" has gained a lot of traction over the last couple of years. Purple teams represent a group of individuals responsible for securing an organization's environment using both red team and blue team testing and integration - if you're ready to join or advance their ranks, then this book is for you. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer Science Computer security Sécurity informatique |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Reference |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Accession Number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 24.05.2024 | 2999.00 | 005.8 ROU | 687831 | 24.05.2024 | Reference |