Cybersecurity, attack and defense strategies: infrastructure security with Red Team and Blue Team tactics
With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetra...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781788475297/?ar |
Zusammenfassung: | With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ... |
Beschreibung: | Includes bibliographical references. - Online resource; title from title page (Safari, viewed February 22, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781788473859 178847385X 1788475291 9781788475297 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047714999 | ||
003 | DE-627-1 | ||
005 | 20240228120436.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781788473859 |c electronic bk. |9 978-1-78847-385-9 | ||
020 | |a 178847385X |c electronic bk. |9 1-78847-385-X | ||
020 | |a 1788475291 |9 1-78847-529-1 | ||
020 | |a 9781788475297 |9 978-1-78847-529-7 | ||
020 | |a 9781788475297 |9 978-1-78847-529-7 | ||
035 | |a (DE-627-1)047714999 | ||
035 | |a (DE-599)KEP047714999 | ||
035 | |a (ORHE)9781788475297 | ||
035 | |a (DE-627-1)047714999 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Diogenes, Yuri |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity, attack and defense strategies |b infrastructure security with Red Team and Blue Team tactics |c Yuri Diogenes, Erdal Ozkaya |
246 | 3 | 3 | |a Infrastructure security with Red Team and Blue Team tactics |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed February 22, 2018) | ||
520 | |a With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ... | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer crimes | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique | |
650 | 4 | |a Operating systems | |
650 | 4 | |a Network security | |
650 | 4 | |a Computer security | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ozkaya, Erdal |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781788475297/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047714999 |
---|---|
_version_ | 1821494861000343552 |
adam_text | |
any_adam_object | |
author | Diogenes, Yuri Ozkaya, Erdal |
author_facet | Diogenes, Yuri Ozkaya, Erdal |
author_role | aut aut |
author_sort | Diogenes, Yuri |
author_variant | y d yd e o eo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047714999 (DE-599)KEP047714999 (ORHE)9781788475297 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02527cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047714999</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120436.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788473859</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78847-385-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178847385X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78847-385-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788475291</subfield><subfield code="9">1-78847-529-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788475297</subfield><subfield code="9">978-1-78847-529-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788475297</subfield><subfield code="9">978-1-78847-529-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047714999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047714999</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788475297</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047714999</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diogenes, Yuri</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity, attack and defense strategies</subfield><subfield code="b">infrastructure security with Red Team and Blue Team tactics</subfield><subfield code="c">Yuri Diogenes, Erdal Ozkaya</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Infrastructure security with Red Team and Blue Team tactics</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed February 22, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ozkaya, Erdal</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788475297/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047714999 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:06Z |
institution | BVB |
isbn | 9781788473859 178847385X 1788475291 9781788475297 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing |
record_format | marc |
spelling | Diogenes, Yuri VerfasserIn aut Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics Yuri Diogenes, Erdal Ozkaya Infrastructure security with Red Team and Blue Team tactics Birmingham, UK Packt Publishing 2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed February 22, 2018) With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ... Computer security Computer networks Security measures Computer crimes Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique Operating systems Network security COMPUTERS ; Security ; Networking Computer networks ; Security measures Ozkaya, Erdal VerfasserIn aut |
spellingShingle | Diogenes, Yuri Ozkaya, Erdal Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics Computer security Computer networks Security measures Computer crimes Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique Operating systems Network security COMPUTERS ; Security ; Networking Computer networks ; Security measures |
title | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics |
title_alt | Infrastructure security with Red Team and Blue Team tactics |
title_auth | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics |
title_exact_search | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics |
title_full | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics Yuri Diogenes, Erdal Ozkaya |
title_fullStr | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics Yuri Diogenes, Erdal Ozkaya |
title_full_unstemmed | Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics Yuri Diogenes, Erdal Ozkaya |
title_short | Cybersecurity, attack and defense strategies |
title_sort | cybersecurity attack and defense strategies infrastructure security with red team and blue team tactics |
title_sub | infrastructure security with Red Team and Blue Team tactics |
topic | Computer security Computer networks Security measures Computer crimes Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique Operating systems Network security COMPUTERS ; Security ; Networking Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer crimes Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique Operating systems Network security COMPUTERS ; Security ; Networking Computer networks ; Security measures |
work_keys_str_mv | AT diogenesyuri cybersecurityattackanddefensestrategiesinfrastructuresecuritywithredteamandblueteamtactics AT ozkayaerdal cybersecurityattackanddefensestrategiesinfrastructuresecuritywithredteamandblueteamtactics AT diogenesyuri infrastructuresecuritywithredteamandblueteamtactics AT ozkayaerdal infrastructuresecuritywithredteamandblueteamtactics |