Tribe of Hackers Blue Team: (Record no. 7880)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01841nam a22001935i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20251224122609.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 200708s2020 inu 000 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781119643418 |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | CarT |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Carey, Marcus J |
| 245 10 - TITLE STATEMENT | |
| Title | Tribe of Hackers Blue Team: |
| Remainder of title | Tribal Knowledge from the Best in Defensive Cybersecurity / |
| Statement of responsibility, etc | Marcus J Carey and Jennifer Jin. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | pages cm |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You’ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn’t in the real world of cybersecurity.<br/><br/>Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.<br/><br/>Discover what it takes to get started building blue team skills<br/>Learn how you can defend against physical and technical penetration testing<br/>Understand the techniques that advanced red teamers use against high-value targets<br/>Identify the most important tools to master as a blue teamer<br/>Explore ways to harden systems against red team attacks<br/>Stand out from the competition as you work to advance your cybersecurity career |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer programming |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Jin, Jennifer |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | https://ieeexplore.ieee.org/servlet/opac?bknumber=9820855 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | E-Books |
No items available.