MARC details
| 000 -LEADER |
| fixed length control field |
02198nam a22003615i 4500 |
| 001 - CONTROL NUMBER |
| control field |
20839464 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20240802094330.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
190205s2019 inu 000 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2019933354 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119552932 (pbk) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
TUPM |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
pcc |
| 050 #0 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA |
| Item number |
76.9.A25 T36 2019 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Tanner, Nadean. |
| 245 00 - TITLE STATEMENT |
| Title |
Cybersecurity blue team toolkit / |
| Statement of responsibility, etc. |
Nadean Tanner. |
| 263 ## - PROJECTED PUBLICATION DATE |
| Projected publication date |
1903 |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
| Name of producer, publisher, distributor, manufacturer |
John Wiley and Sons, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2019. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxiv, 262 pages : |
| Other physical details |
illustrations ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes index and bibliographical references |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity... |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Computer Security |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Data protection |
| 650 10 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Internet Security measures |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
0 |
| b |
ibc |
| c |
orignew |
| d |
2 |
| e |
epcn |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Library of Congress Classification |
| Koha item type |
Book |