Tribe of Hackers Blue Team: (Record no. 7880)

MARC details
000 -LEADER
fixed length control field 01841nam a22001935i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251224122609.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200708s2020 inu 000 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119643418
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number CarT
100 1# - MAIN ENTRY--AUTHOR NAME
Personal name Carey, Marcus J
245 10 - TITLE STATEMENT
Title Tribe of Hackers Blue Team:
Remainder of title Tribal Knowledge from the Best in Defensive Cybersecurity /
Statement of responsibility, etc Marcus J Carey and Jennifer Jin.
300 ## - PHYSICAL DESCRIPTION
Number of Pages pages cm
520 ## - SUMMARY, ETC.
Summary, etc The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity.<br/><br/>Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.<br/><br/>Discover what it takes to get started building blue team skills<br/>Learn how you can defend against physical and technical penetration testing<br/>Understand the techniques that advanced red teamers use against high-value targets<br/>Identify the most important tools to master as a blue teamer<br/>Explore ways to harden systems against red team attacks<br/>Stand out from the competition as you work to advance your cybersecurity career
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer programming
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Jin, Jennifer
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9820855
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-Books

No items available.