|
|
|
|
| LEADER |
04866cam a2200553 i 4500 |
| 001 |
koha001013651 |
| 003 |
OCoLC |
| 005 |
20250222070008.0 |
| 006 |
m d |
| 007 |
cr cnu---unuuu |
| 008 |
211106s2022 alu o 000 0 eng d |
| 035 |
|
|
|a koha001013651
|
| 040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d UKMGB
|d OCLCF
|d UKAHL
|d OCLCO
|d ORMDA
|d OCLCO
|d YDX
|d OCLCQ
|d N$T
|
| 015 |
|
|
|a GBC1F4937
|2 bnb
|
| 016 |
7 |
|
|a 020328577
|2 Uk
|
| 019 |
|
|
|a 1281977424
|
| 020 |
|
|
|a 1800206097
|q (electronic book)
|
| 020 |
|
|
|a 9781800206090
|q (electronic bk.)
|
| 020 |
|
|
|z 9781800208162
|q (paperback)
|
| 037 |
|
|
|a 9781800206090
|b Packt Publishing Pvt. Ltd
|
| 037 |
|
|
|a 9781800208162
|b O'Reilly Media
|
| 050 |
|
4 |
|a QA76.9.A25
|b B73 2022
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 049 |
|
|
|a MAIN
|
| 100 |
1 |
|
|a Bravo, Cesar.
|9 912177
|
| 245 |
1 |
0 |
|a Mastering Defensive Security
|b Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure.
|
| 264 |
|
1 |
|a Birmingham
|b Packt Publishing, Limited,
|c 2022.
|
| 300 |
|
|
|a 1 online resource (528 pages)
|
| 505 |
0 |
|
|a Cover -- Title page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Section 1: Mastering Defensive Security Concepts -- Chapter 1: A Refresher on Defensive Security Concepts -- Technical requirements -- Deep dive into the core of cybersecurity -- The cybersecurity triad -- Types of attacks -- Managing cybersecurity's legendary pain point: Passwords -- Password breaches -- Social engineering attacks using compromised passwords -- Brute-force attacks -- Dictionary attacks -- Creating a secure password
|
| 505 |
8 |
|
|a Managing passwords at the enterprise level -- Bonus track -- Mastering defense in depth -- Factors to consider when creating DiD models -- Asset identification -- Defense by layers -- Bonus track -- Comparing the blue and red teams -- Summary -- Further reading -- Chapter 2: Managing Threats, Vulnerabilities, and Risks -- Technical requirements -- Understanding cybersecurity vulnerabilities and threats -- Performing a vulnerability assessment -- The vulnerability assessment process -- When should you check for vulnerabilities? -- Types of vulnerabilities -- USB HID vulnerabilities
|
| 505 |
8 |
|
|a Types of USB HID attacks -- A false sense of security -- Protecting against USB HID attacks -- Managing cybersecurity risks -- Risk identification -- Risk assessment -- Risk response -- Risk monitoring -- The NIST Cybersecurity Framework -- Identify -- Protect -- Detect -- Respond -- Recover -- Creating an effective Business Continuity Plan (BCP) -- Creating a Business Impact Analysis (BIA) -- Business Continuity Planning (BCP) -- Implementing a best-in-class DRP -- Creating a DRP -- Implementing the DRP -- Summary -- Further reading
|
| 505 |
8 |
|
|a Chapter 3: Comprehending Policies, Procedures, Compliance, and Audits -- Creating world-class cybersecurity policies and procedures -- Cybersecurity policies -- Cybersecurity procedures -- The CUDSE method -- Understanding and achieving compliance -- Types of regulations -- Achieving compliance -- Exploring, creating, and managing audits -- Internal cybersecurity audits -- External cybersecurity audits -- Data management during audits -- Types of cybersecurity audit -- What triggers an audit? -- Applying a CMM -- The goals of a CMM -- Characteristics of a good CMM -- The structure of a good CMM
|
| 505 |
8 |
|
|a Analyzing the results -- Advantages of a CMM -- Summary -- Further reading -- Chapter 4: Patching Layer 8 -- Understanding layer 8 -- the insider threat -- The inadvertent user -- The malicious insider -- How do you spot a malicious insider? -- Protecting your infrastructure against malicious insiders -- Mastering the art of social engineering -- The social engineering cycle -- Social engineering techniques -- Types of social engineering attacks -- Defending against social engineering attacks (patching layer 8) -- Creating your training strategy -- Admin rights -- Implementing a strong BYOD policy
|
| 500 |
|
|
|a Performing random social engineering campaigns.
|
| 653 |
|
0 |
|a Computer security.
|
| 653 |
|
0 |
|a Information technology
|x Security measures.
|
| 653 |
|
2 |
|a Computer Security
|
| 653 |
|
6 |
|a Sécurité informatique.
|
| 653 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
| 653 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
| 653 |
|
7 |
|a Information technology
|x Security measures.
|2 fast
|0 (OCoLC)fst00973129
|
| 655 |
|
0 |
|a EBSCO eBooks
|9 905790
|
| 655 |
|
4 |
|a Electronic books.
|9 899821
|
| 700 |
1 |
|
|a Kitchen, Darren.
|9 912178
|
| 856 |
4 |
0 |
|3 EBSCOhost
|u https://www.lib.tsu.ru/limit/2023/EBSCO/3072391.pdf
|
| 856 |
|
|
|y Перейти в каталог НБ ТГУ
|u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013651
|
| 910 |
|
|
|a EBSCO eBooks
|
| 999 |
|
|
|c 1013651
|d 1013651
|
| 039 |
|
|
|