Cybersecurity attack and defense strategies

Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threa...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuri, Diogenes (Author), Ozkaya, Erdal (Author)
Format: Book
Language:English
Published: Birmingham, UK Packt Publishing Ltd. 2019
Edition:Second edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 94331
003 MY-KLNDU
005 20241220004046.0
008 230529 2019 xxka 001 0 eng d
020 |a 9781838827793 (pbk) 
039 9 |a 202401110911  |b rafizah  |c 202401031601  |d sani  |y 202305290840  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a QA 76.9.A25 
090 |a QA 76.9.A25  |b D56 2019 
100 1 |a Yuri, Diogenes  |e author 
245 1 0 |a Cybersecurity  |b attack and defense strategies  |c Yuri Diogenes, Erdal Ozkaya 
250 |a Second edition 
264 1 |a Birmingham, UK  |b Packt Publishing Ltd.  |c 2019 
264 4 |c © 2019 
300 |a xvi, 610 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
520 |a Cybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. 
592 |a 00017209-23  |b 28/6/2023  |c RM790.77  |h AREESH 
650 0 |a Computer security 
650 0 |a Computer crimes 
650 0 |a Computer networks  |x Security measures 
700 1 |a Ozkaya, Erdal  |e author 
999 |a vtls000105487  |c 94331  |d 94331