Tribe of hackers blue team: tribal knowledge from the best in defensive cybersecurity
Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden s...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis
Wiley
2020
|
Series: | Tribe of Hackers Ser
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119643418/?ar |
Summary: | Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills. Learn how you can defend against physical and technical penetration testing. Understand the techniques that advanced red teamers use against high-value targets. Identify the most important tools to master as a blue teamer. Explore ways to harden systems against red team attacks. Stand out from the competition as you work to advance your cybersecurity career. Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense. |
Physical Description: | 1 online resource |
ISBN: | 9781119643432 1119643430 9781119643449 1119643449 9781119643425 1119643422 9781119643418 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-059853514 | ||
003 | DE-627-1 | ||
005 | 20240228121131.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201119s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781119643432 |c electronic bk. ; |9 978-1-119-64343-2 | ||
020 | |a 1119643430 |c electronic bk. ; |9 1-119-64343-0 | ||
020 | |a 9781119643449 |c electronic bk. |9 978-1-119-64344-9 | ||
020 | |a 1119643449 |c electronic bk. |9 1-119-64344-9 | ||
020 | |a 9781119643425 |c electronic bk. |9 978-1-119-64342-5 | ||
020 | |a 1119643422 |c electronic bk. |9 1-119-64342-2 | ||
020 | |a 9781119643418 |9 978-1-119-64341-8 | ||
035 | |a (DE-627-1)059853514 | ||
035 | |a (DE-599)KEP059853514 | ||
035 | |a (ORHE)9781119643418 | ||
035 | |a (DE-627-1)059853514 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8/7 |2 23 | |
100 | 1 | |a Carey, Marcus J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Tribe of hackers blue team |b tribal knowledge from the best in defensive cybersecurity |c Marcus J. Carey & Jennifer Jin |
264 | 1 | |a Indianapolis |b Wiley |c 2020 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Tribe of Hackers Ser | |
520 | |a Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills. Learn how you can defend against physical and technical penetration testing. Understand the techniques that advanced red teamers use against high-value targets. Identify the most important tools to master as a blue teamer. Explore ways to harden systems against red team attacks. Stand out from the competition as you work to advance your cybersecurity career. Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense. | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Security ; Cryptography & Encryption | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hacking | |
700 | 1 | |a Jin, Jennifer |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1119643414 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119643414 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119643418/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-059853514 |
---|---|
_version_ | 1833357043042353152 |
adam_text | |
any_adam_object | |
author | Carey, Marcus J. |
author2 | Jin, Jennifer |
author2_role | ctb |
author2_variant | j j jj |
author_facet | Carey, Marcus J. Jin, Jennifer |
author_role | aut |
author_sort | Carey, Marcus J. |
author_variant | m j c mj mjc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)059853514 (DE-599)KEP059853514 (ORHE)9781119643418 |
dewey-full | 005.8/7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/7 |
dewey-search | 005.8/7 |
dewey-sort | 15.8 17 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03586cam a22005412c 4500</leader><controlfield tag="001">ZDB-30-ORH-059853514</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121131.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201119s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643432</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">978-1-119-64343-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643430</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">1-119-64343-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643449</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64344-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643449</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-64344-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643425</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64342-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643422</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-64342-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643418</subfield><subfield code="9">978-1-119-64341-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059853514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP059853514</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119643418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059853514</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carey, Marcus J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tribe of hackers blue team</subfield><subfield code="b">tribal knowledge from the best in defensive cybersecurity</subfield><subfield code="c">Marcus J. Carey & Jennifer Jin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis</subfield><subfield code="b">Wiley</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Tribe of Hackers Ser</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills. Learn how you can defend against physical and technical penetration testing. Understand the techniques that advanced red teamers use against high-value targets. Identify the most important tools to master as a blue teamer. Explore ways to harden systems against red team attacks. Stand out from the competition as you work to advance your cybersecurity career. Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Cryptography & Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Jennifer</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119643414</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119643414</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119643418/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-059853514 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:24Z |
institution | BVB |
isbn | 9781119643432 1119643430 9781119643449 1119643449 9781119643425 1119643422 9781119643418 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley |
record_format | marc |
series2 | Tribe of Hackers Ser |
spelling | Carey, Marcus J. VerfasserIn aut Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity Marcus J. Carey & Jennifer Jin Indianapolis Wiley 2020 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Tribe of Hackers Ser Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills. Learn how you can defend against physical and technical penetration testing. Understand the techniques that advanced red teamers use against high-value targets. Identify the most important tools to master as a blue teamer. Explore ways to harden systems against red team attacks. Stand out from the competition as you work to advance your cybersecurity career. Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense. Hacking Computer security Computer Security Piratage informatique Sécurité informatique COMPUTERS ; Security ; Cryptography & Encryption Jin, Jennifer MitwirkendeR ctb 1119643414 Erscheint auch als Druck-Ausgabe 1119643414 |
spellingShingle | Carey, Marcus J. Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity Hacking Computer security Computer Security Piratage informatique Sécurité informatique COMPUTERS ; Security ; Cryptography & Encryption |
title | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity |
title_auth | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity |
title_exact_search | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity |
title_full | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity Marcus J. Carey & Jennifer Jin |
title_fullStr | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity Marcus J. Carey & Jennifer Jin |
title_full_unstemmed | Tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity Marcus J. Carey & Jennifer Jin |
title_short | Tribe of hackers blue team |
title_sort | tribe of hackers blue team tribal knowledge from the best in defensive cybersecurity |
title_sub | tribal knowledge from the best in defensive cybersecurity |
topic | Hacking Computer security Computer Security Piratage informatique Sécurité informatique COMPUTERS ; Security ; Cryptography & Encryption |
topic_facet | Hacking Computer security Computer Security Piratage informatique Sécurité informatique COMPUTERS ; Security ; Cryptography & Encryption |
work_keys_str_mv | AT careymarcusj tribeofhackersblueteamtribalknowledgefromthebestindefensivecybersecurity AT jinjennifer tribeofhackersblueteamtribalknowledgefromthebestindefensivecybersecurity |