Cybersecurity blue team toolkit / Nadean Tanner.
Material type:
TextPublisher: Indianapolis, IN : John Wiley and Sons, 2019Description: xxiv, 262 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9781119552932 (pbk)
- QA 76.9.A25 T36 2019
| Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode |
|---|---|---|---|---|---|---|---|
Book
|
TUP Manila Library | NFIC | General Circulation Section-GF | QA 76.9.A25 T36 2019 (Browse shelf(Opens below)) | Available | P00033825 |
Browsing TUP Manila Library shelves, Shelving location: General Circulation Section-GF Close shelf browser (Hides shelf browser)
|
|
|
|
No cover image available
|
|
|
||
| QA 76.76 D47 T47 2018 Software development/ | QA 76.76 E95 T47 2018 Basic surveying/ | QA 76.889 L35 2019 Quantum computing : a beginner's introduction / | QA 76.9.A25 T36 2019 Cybersecurity blue team toolkit / | QA 76.9 A25 W35 2019 CEH certified ethical hacker all-in-one exam guide / | QA 76.9 D3 S73 2019 Concepts of database management / | QA 76.9 D3 T47 2017 Database systems / |
Includes index and bibliographical references
Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs
A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...
There are no comments on this title.