Jissen bash ni yoru saibā sekyuriti taisaku: sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu /
実践bashによるサイバーセキュリティ対策 : セキュリティ技術者のためのシェルスクリプト活用術 /
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexi...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Japanisch |
Veröffentlicht: |
Tōkyō-to Shinjuku-ku
Orairī Japan
2020
|
Ausgabe: | Shohan. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9784873119052/?ar |
Zusammenfassung: | If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. |
Beschreibung: | Online resource; title from title details screen (O'Reilly, viewed April 20, 2022) |
Umfang: | 1 Online-Ressource (352 Seiten) |
ISBN: | 9784873119052 4873119057 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-078668891 | ||
003 | DE-627-1 | ||
005 | 20240228121642.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220609s2020 xx |||||o 00| ||jpn c | ||
020 | |a 9784873119052 |c electronic bk. |9 978-4-87311-905-2 | ||
020 | |a 4873119057 |c electronic bk. |9 4-87311-905-7 | ||
035 | |a (DE-627-1)078668891 | ||
035 | |a (DE-599)KEP078668891 | ||
035 | |a (ORHE)9784873119052 | ||
035 | |a (DE-627-1)078668891 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a jpn | ||
082 | 0 | |a 005.8 |2 23/eng/20220420 | |
100 | 1 | |a Troncone, Paul |e VerfasserIn |4 aut | |
240 | 1 | 0 | |a Cybersecurity Ops with bash |
245 | 1 | 0 | |6 880-01 |a Jissen bash ni yoru saibā sekyuriti taisaku |b sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / |c Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing |
250 | |6 880-02 |a Shohan. | ||
264 | 1 | |6 880-03 |a Tōkyō-to Shinjuku-ku |b Orairī Japan |c 2020 | |
300 | |a 1 Online-Ressource (352 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title details screen (O'Reilly, viewed April 20, 2022) | ||
520 | |a If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer crimes |x Economic aspects | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Criminalité informatique ; Aspect économique | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Albing, Carl |e VerfasserIn |4 aut | |
700 | 1 | |a Takahashi, Motonobu |e ÜbersetzerIn |4 trl | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9784873119052/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
880 | 1 | 0 | |6 245-01/Chin |a 実践bashによるサイバーセキュリティ対策 : |b セキュリティ技術者のためのシェルスクリプト活用術 / |c Paul Troncone, Carl Albing著 ; 高橋基信訳 = Cybersecurity Ops with bash / Paul Troncone, Carl Albing. |
880 | |6 250-02/Chin |a 初版. | ||
880 | 1 | |6 264-03/Chin |a 東京都新宿区 |b オライリー・ジャパン |c 2020 | |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-078668891 |
---|---|
_version_ | 1821494821404016640 |
adam_text | |
any_adam_object | |
author | Troncone, Paul Albing, Carl |
author2 | Takahashi, Motonobu |
author2_role | trl |
author2_variant | m t mt |
author_facet | Troncone, Paul Albing, Carl Takahashi, Motonobu |
author_role | aut aut |
author_sort | Troncone, Paul |
author_variant | p t pt c a ca |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)078668891 (DE-599)KEP078668891 (ORHE)9784873119052 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Shohan. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03323cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-078668891</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121642.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220609s2020 xx |||||o 00| ||jpn c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9784873119052</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-4-87311-905-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">4873119057</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">4-87311-905-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078668891</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP078668891</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9784873119052</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)078668891</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">jpn</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220420</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Troncone, Paul</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="240" ind1="1" ind2="0"><subfield code="a">Cybersecurity Ops with bash</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="6">880-01</subfield><subfield code="a">Jissen bash ni yoru saibā sekyuriti taisaku</subfield><subfield code="b">sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu /</subfield><subfield code="c">Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="6">880-02</subfield><subfield code="a">Shohan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="6">880-03</subfield><subfield code="a">Tōkyō-to Shinjuku-ku</subfield><subfield code="b">Orairī Japan</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (352 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title details screen (O'Reilly, viewed April 20, 2022)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Aspect économique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Albing, Carl</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Takahashi, Motonobu</subfield><subfield code="e">ÜbersetzerIn</subfield><subfield code="4">trl</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9784873119052/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="880" ind1="1" ind2="0"><subfield code="6">245-01/Chin</subfield><subfield code="a">実践bashによるサイバーセキュリティ対策 :</subfield><subfield code="b">セキュリティ技術者のためのシェルスクリプト活用術 /</subfield><subfield code="c">Paul Troncone, Carl Albing著 ; 高橋基信訳 = Cybersecurity Ops with bash / Paul Troncone, Carl Albing.</subfield></datafield><datafield tag="880" ind1=" " ind2=" "><subfield code="6">250-02/Chin</subfield><subfield code="a">初版.</subfield></datafield><datafield tag="880" ind1=" " ind2="1"><subfield code="6">264-03/Chin</subfield><subfield code="a">東京都新宿区</subfield><subfield code="b">オライリー・ジャパン</subfield><subfield code="c">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-078668891 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:28Z |
institution | BVB |
isbn | 9784873119052 4873119057 |
language | Japanese |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (352 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Orairī Japan |
record_format | marc |
spelling | Troncone, Paul VerfasserIn aut Cybersecurity Ops with bash 880-01 Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing 880-02 Shohan. 880-03 Tōkyō-to Shinjuku-ku Orairī Japan 2020 1 Online-Ressource (352 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title details screen (O'Reilly, viewed April 20, 2022) If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash cookbook (O'Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. Computer security Computer networks Security measures Computer crimes Economic aspects Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures Albing, Carl VerfasserIn aut Takahashi, Motonobu ÜbersetzerIn trl 245-01/Chin 実践bashによるサイバーセキュリティ対策 : セキュリティ技術者のためのシェルスクリプト活用術 / Paul Troncone, Carl Albing著 ; 高橋基信訳 = Cybersecurity Ops with bash / Paul Troncone, Carl Albing. 250-02/Chin 初版. 264-03/Chin 東京都新宿区 オライリー・ジャパン 2020 |
spellingShingle | Troncone, Paul Albing, Carl Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / Computer security Computer networks Security measures Computer crimes Economic aspects Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
title | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / |
title_alt | Cybersecurity Ops with bash |
title_auth | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / |
title_exact_search | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / |
title_full | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing |
title_fullStr | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing |
title_full_unstemmed | Jissen bash ni yoru saibā sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / Paul Troncone, Carl Albing cho ; Takahashi Motonobu yaku = Cybersecurity Ops with bash / Paul Troncone, Carl Albing |
title_short | Jissen bash ni yoru saibā sekyuriti taisaku |
title_sort | jissen bash ni yoru saiba sekyuriti taisaku sekyuriti gijutsusha no tame no sheru sukuriputo katsuyojutsu |
title_sub | sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu / |
topic | Computer security Computer networks Security measures Computer crimes Economic aspects Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
topic_facet | Computer security Computer networks Security measures Computer crimes Economic aspects Computer Security Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Criminalité informatique ; Aspect économique Computer networks ; Security measures |
work_keys_str_mv | AT tronconepaul cybersecurityopswithbash AT albingcarl cybersecurityopswithbash AT takahashimotonobu cybersecurityopswithbash AT tronconepaul jissenbashniyorusaibasekyurititaisakusekyuritigijutsushanotamenosherusukuriputokatsuyojutsu AT albingcarl jissenbashniyorusaibasekyurititaisakusekyuritigijutsushanotamenosherusukuriputokatsuyojutsu AT takahashimotonobu jissenbashniyorusaibasekyurititaisakusekyuritigijutsushanotamenosherusukuriputokatsuyojutsu |