Cybersecurity Ops with bash: attack, defend, and analyze from the command line
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Sebastopol, CA
O'Reilly Media
2019
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781492041306/?ar |
Zusammenfassung: | If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. |
Beschreibung: | Includes index. - Online resource; title from title page (Safari, viewed April 10, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 1492041319 9781492041313 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047628901 | ||
003 | DE-627-1 | ||
005 | 20240228120706.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx |||||o 00| ||eng c | ||
020 | |a 1492041319 |9 1-4920-4131-9 | ||
020 | |a 9781492041313 |9 978-1-4920-4131-3 | ||
035 | |a (DE-627-1)047628901 | ||
035 | |a (DE-599)KEP047628901 | ||
035 | |a (ORHE)9781492041306 | ||
035 | |a (DE-627-1)047628901 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Troncone, Paul |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity Ops with bash |b attack, defend, and analyze from the command line |c Paul Troncone and Carl Albing |
246 | 3 | 3 | |a Attack, defend, and analyze from the command line |
250 | |a First edition. | ||
264 | 1 | |a Sebastopol, CA |b O'Reilly Media |c 2019 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from title page (Safari, viewed April 10, 2019) | ||
520 | |a If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer crimes |x Economic aspects | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique ; Aspect économique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Albing, Carl |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781492041306/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047628901 |
---|---|
_version_ | 1821494870989078528 |
adam_text | |
any_adam_object | |
author | Troncone, Paul Albing, Carl |
author_facet | Troncone, Paul Albing, Carl |
author_role | aut aut |
author_sort | Troncone, Paul |
author_variant | p t pt c a ca |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047628901 (DE-599)KEP047628901 (ORHE)9781492041306 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02674cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047628901</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120706.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1492041319</subfield><subfield code="9">1-4920-4131-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781492041313</subfield><subfield code="9">978-1-4920-4131-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047628901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047628901</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781492041306</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047628901</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Troncone, Paul</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity Ops with bash</subfield><subfield code="b">attack, defend, and analyze from the command line</subfield><subfield code="c">Paul Troncone and Carl Albing</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Attack, defend, and analyze from the command line</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from title page (Safari, viewed April 10, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Aspect économique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Albing, Carl</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781492041306/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047628901 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:15Z |
institution | BVB |
isbn | 1492041319 9781492041313 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | O'Reilly Media |
record_format | marc |
spelling | Troncone, Paul VerfasserIn aut Cybersecurity Ops with bash attack, defend, and analyze from the command line Paul Troncone and Carl Albing Attack, defend, and analyze from the command line First edition. Sebastopol, CA O'Reilly Media 2019 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from title page (Safari, viewed April 10, 2019) If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. Computer security Computer networks Security measures Computer crimes Economic aspects Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures Albing, Carl VerfasserIn aut |
spellingShingle | Troncone, Paul Albing, Carl Cybersecurity Ops with bash attack, defend, and analyze from the command line Computer security Computer networks Security measures Computer crimes Economic aspects Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
title | Cybersecurity Ops with bash attack, defend, and analyze from the command line |
title_alt | Attack, defend, and analyze from the command line |
title_auth | Cybersecurity Ops with bash attack, defend, and analyze from the command line |
title_exact_search | Cybersecurity Ops with bash attack, defend, and analyze from the command line |
title_full | Cybersecurity Ops with bash attack, defend, and analyze from the command line Paul Troncone and Carl Albing |
title_fullStr | Cybersecurity Ops with bash attack, defend, and analyze from the command line Paul Troncone and Carl Albing |
title_full_unstemmed | Cybersecurity Ops with bash attack, defend, and analyze from the command line Paul Troncone and Carl Albing |
title_short | Cybersecurity Ops with bash |
title_sort | cybersecurity ops with bash attack defend and analyze from the command line |
title_sub | attack, defend, and analyze from the command line |
topic | Computer security Computer networks Security measures Computer crimes Economic aspects Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer crimes Economic aspects Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
work_keys_str_mv | AT tronconepaul cybersecurityopswithbashattackdefendandanalyzefromthecommandline AT albingcarl cybersecurityopswithbashattackdefendandanalyzefromthecommandline AT tronconepaul attackdefendandanalyzefromthecommandline AT albingcarl attackdefendandanalyzefromthecommandline |