The art of cyber defense: from risk assessment to threat intelligence
"The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the in...
Gespeichert in:
Weitere beteiligte Personen: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2025
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781040124222/?ar |
Zusammenfassung: | "The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures. Delving into the nuances of modern cyber threats, the book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed |
Umfang: | 1 Online-Ressource |
ISBN: | 9781032714806 1032714808 9781040124130 1040124135 9781040124222 1040124224 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-110158326 | ||
003 | DE-627-1 | ||
005 | 20241202095349.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241202s2025 xx |||||o 00| ||eng c | ||
020 | |a 9781032714806 |c ebk |9 978-1-032-71480-6 | ||
020 | |a 1032714808 |9 1-032-71480-8 | ||
020 | |a 9781040124130 |c electronic bk. : PDF |9 978-1-040-12413-0 | ||
020 | |a 1040124135 |c electronic bk. : PDF |9 1-040-12413-5 | ||
020 | |a 9781040124222 |c electronic bk. : EPUB |9 978-1-040-12422-2 | ||
020 | |a 1040124224 |c electronic bk. : EPUB |9 1-040-12422-4 | ||
035 | |a (DE-627-1)110158326 | ||
035 | |a (DE-599)KEP110158326 | ||
035 | |a (ORHE)9781040124222 | ||
035 | |a (DE-627-1)110158326 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20241003 | |
245 | 1 | 4 | |a The art of cyber defense |b from risk assessment to threat intelligence |c edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others] |
250 | |a First edition. | ||
263 | |a 2409 | ||
264 | 1 | |a Boca Raton |b CRC Press |c 2025 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed | ||
520 | |a "The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures. Delving into the nuances of modern cyber threats, the book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks"-- | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Security / Viruses | |
650 | 4 | |a COMPUTERS / Cryptography | |
700 | 1 | |a Baddi, Youssef |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781032714783 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032714783 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781040124222/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-110158326 |
---|---|
_version_ | 1821494924145590272 |
adam_text | |
any_adam_object | |
author2 | Baddi, Youssef |
author2_role | edt |
author2_variant | y b yb |
author_facet | Baddi, Youssef |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)110158326 (DE-599)KEP110158326 (ORHE)9781040124222 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02859nam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-110158326</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241202095349.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241202s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032714806</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-032-71480-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1032714808</subfield><subfield code="9">1-032-71480-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040124130</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">978-1-040-12413-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1040124135</subfield><subfield code="c">electronic bk. : PDF</subfield><subfield code="9">1-040-12413-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781040124222</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-040-12422-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1040124224</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-040-12422-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110158326</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP110158326</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781040124222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110158326</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20241003</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The art of cyber defense</subfield><subfield code="b">from risk assessment to threat intelligence</subfield><subfield code="c">edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">2409</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures. Delving into the nuances of modern cyber threats, the book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Viruses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baddi, Youssef</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032714783</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032714783</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781040124222/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-110158326 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:06Z |
institution | BVB |
isbn | 9781032714806 1032714808 9781040124130 1040124135 9781040124222 1040124224 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | CRC Press |
record_format | marc |
spelling | The art of cyber defense from risk assessment to threat intelligence edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others] First edition. 2409 Boca Raton CRC Press 2025 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on print version record and CIP data provided by publisher; resource not viewed "The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This book provides invaluable insights into the intricacies of cyber defense, guiding readers through a journey from understanding risk assessment methodologies to leveraging threat intelligence for proactive defense measures. Delving into the nuances of modern cyber threats, the book equips readers with the knowledge and tools necessary to navigate the complex landscape of cybersecurity. Through a multidisciplinary approach, it addresses the pressing challenges organizations face in securing their digital infrastructure and sensitive data from cyber-attacks"-- Computer security Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Security / Viruses COMPUTERS / Cryptography Baddi, Youssef HerausgeberIn edt 9781032714783 Erscheint auch als Druck-Ausgabe 9781032714783 |
spellingShingle | The art of cyber defense from risk assessment to threat intelligence Computer security Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Security / Viruses COMPUTERS / Cryptography |
title | The art of cyber defense from risk assessment to threat intelligence |
title_auth | The art of cyber defense from risk assessment to threat intelligence |
title_exact_search | The art of cyber defense from risk assessment to threat intelligence |
title_full | The art of cyber defense from risk assessment to threat intelligence edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others] |
title_fullStr | The art of cyber defense from risk assessment to threat intelligence edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others] |
title_full_unstemmed | The art of cyber defense from risk assessment to threat intelligence edited by Youssef Baddi, Chouaib Doukkali University, El Jadida, Morocco [and three others] |
title_short | The art of cyber defense |
title_sort | art of cyber defense from risk assessment to threat intelligence |
title_sub | from risk assessment to threat intelligence |
topic | Computer security Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Security / Viruses COMPUTERS / Cryptography |
topic_facet | Computer security Sécurité informatique COMPUTERS / Networking / Security COMPUTERS / Security / Viruses COMPUTERS / Cryptography |
work_keys_str_mv | AT baddiyoussef theartofcyberdefensefromriskassessmenttothreatintelligence AT baddiyoussef artofcyberdefensefromriskassessmenttothreatintelligence |