Amazon cover image
Image from Amazon.com
Image from Coce
Image from OpenLibrary
Custom cover image
Custom cover image

Cybersecurity blue team toolkit / Nadean Tanner.

By: Material type: TextTextPublisher: Indianapolis, IN : John Wiley and Sons, 2019Description: xxiv, 262 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119552932 (pbk)
Subject(s): LOC classification:
  • QA 76.9.A25 T36 2019
Contents:
Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs
Summary: A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Status Date due Barcode
Book Book TUP Manila Library NFIC General Circulation Section-GF QA 76.9.A25 T36 2019 (Browse shelf(Opens below)) Available P00033825
Browsing TUP Manila Library shelves, Shelving location: General Circulation Section-GF Close shelf browser (Hides shelf browser)
Cover image
Cover image
Cover image
Cover image
No cover image available
Cover image
Cover image
Cover image
QA 76.76 D47 T47 2018 Software development/ QA 76.76 E95 T47 2018 Basic surveying/ QA 76.889 L35 2019 Quantum computing : a beginner's introduction / QA 76.9.A25 T36 2019 Cybersecurity blue team toolkit / QA 76.9 A25 W35 2019 CEH certified ethical hacker all-in-one exam guide / QA 76.9 D3 S73 2019 Concepts of database management / QA 76.9 D3 T47 2017 Database systems /

Includes index and bibliographical references

Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs

A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...

There are no comments on this title.

to post a comment.



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha