000 | 05700cam a2200769 a 4500 | ||
---|---|---|---|
001 | on1184233723 | ||
003 | OCoLC | ||
005 | 20240523125542.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200820s2020 inu o 000 0 eng d | ||
040 |
_aYDX _beng _epn _cYDX _dDG1 _dRECBK _dN$T _dTEFOD _dOCLCF _dUKAHL _dDG1 _dEBLCP _dK6U _dPIF _dOCLCO _dUKMGB _dNBJ _dOCLCO _dOCLCQ _dSFB _dIEEEE _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBC1D4210 _2bnb |
||
016 | 7 |
_a019896894 _2Uk |
|
019 | _a1195818267 | ||
020 |
_a9781119643432 _q(electronic bk. ; _qoBook) |
||
020 |
_a1119643430 _q(electronic bk. ; _qoBook) |
||
020 |
_a9781119643449 _q(electronic bk.) |
||
020 |
_a1119643449 _q(electronic bk.) |
||
020 |
_a9781119643425 _q(electronic bk.) |
||
020 |
_a1119643422 _q(electronic bk.) |
||
020 | _z1119643414 | ||
020 | _z9781119643418 | ||
024 | 7 |
_a10.1002/9781119643432 _2doi |
|
029 | 1 |
_aAU@ _b000068069114 |
|
029 | 1 |
_aAU@ _b000068845950 |
|
029 | 1 |
_aUKMGB _b019896894 |
|
029 | 1 |
_aAU@ _b000074010153 |
|
035 |
_a(OCoLC)1184233723 _z(OCoLC)1195818267 |
||
037 |
_a5A9AF837-61F0-4D1D-A3B7-800A87ACAD68 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
037 |
_a9820855 _bIEEE |
||
050 | 4 |
_aQA76.9.A25 _bC3673 2020 |
|
050 | 4 | _aTK5105.59 | |
082 | 0 | 4 |
_a005.8/7 _223 |
049 | _aMAIN | ||
100 | 1 |
_aCarey, Marcus J. _c(Cybersecurity professional) _1https://id.oclc.org/worldcat/entity/E39PCjw9rYcCTBW8PGfXjMkT6q |
|
245 | 1 | 0 |
_aTribe of hackers blue team : _btribal knowledge from the best in defensive cybersecurity / _cMarcus J. Carey & Jennifer Jin. |
260 |
_aIndianapolis : _bWiley, _c2020. |
||
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aTribe of Hackers Ser. | |
505 | 0 | _aFront Matter -- Marcus J. Carey -- Danny Akacki -- Ricky Banda -- William Bengtson -- Amanda Berlin -- O'Shea Bowens -- John Breth -- Lee Brotherston -- Ronald Bushar -- Christopher Caruso -- Eddie Clark -- Mark Clayton -- Ayman Elsawah -- Sahan Fernando -- Stephen Hilt -- Bea Hughes -- Terence Jackson -- Tanya Janca -- Ruth Juma -- Brendon Kelley -- Shawn Kirkland -- Sami Laiho -- Kat Maddox -- Jeffrey Man -- April Mardock -- Bright Gameli Mawudor -- Duncan McAlynn -- Frank McGovern -- Donald McFarlane -- Nathan McNulty -- James Medlock -- Daniel Miessler -- Alyssa Miller -- Maggie Morganti -- Justin Moss -- Mark Orlando -- Mitch Parker -- Stuart Peck -- Carlos Perez -- Quiessence Phillips -- Lauren Proehl -- Josh Rickard -- Megan Roddie -- Jason Schorr -- Chris Sistrunk -- Jayson E. Street -- Michael Tanji -- Ronnie Tokazowski -- Ashley Tolbert -- Ismael Valenzuela -- Dave Venable -- Robert "TProphet" Walker -- Jake Williams -- Robert Willis -- Get the Whole Tribe of Hackers Series! | |
520 | _aBlue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills. Learn how you can defend against physical and technical penetration testing. Understand the techniques that advanced red teamers use against high-value targets. Identify the most important tools to master as a blue teamer. Explore ways to harden systems against red team attacks. Stand out from the competition as you work to advance your cybersecurity career. Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aHacking. | |
650 | 0 | _aComputer security. | |
650 | 2 | _aComputer Security | |
650 | 6 | _aPiratage informatique. | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography & Encryption. _2bisacsh |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aHacking _2fast |
|
700 | 1 | _aJin, Jennifer. | |
758 |
_ihas work: _aTribe of hackers blue team (Text) _1https://id.oclc.org/worldcat/entity/E39PCFVWF6M4KHvc3g834b9Yyd _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z1119643414 _z9781119643418 _w(OCoLC)1114509668 |
830 | 0 | _aTribe of Hackers Ser. | |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119643432 |
938 |
_aAskews and Holts Library Services _bASKH _nAH37736364 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH37736272 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6301547 |
||
938 |
_aEBSCOhost _bEBSC _n2571355 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00834676 |
||
938 |
_aYBP Library Services _bYANK _n16892075 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12732 _d12732 |