Amazon cover image
Image from Amazon.com
Image from Coce
Image from OpenLibrary
Custom cover image
Custom cover image

Cybersecurity blue team toolkit / Nadean Tanner.

By: Material type: TextTextPublisher: Indianapolis, IN : John Wiley and Sons, 2019Description: xxiv, 262 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119552932 (pbk)
Subject(s): LOC classification:
  • QA 76.9.A25 T36 2019
Contents:
Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs
Summary: A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Shelving location Call number Status Date due Barcode
Book Book TUP Manila Library NFIC General Circulation Section-GF QA 76.9.A25 T36 2019 (Browse shelf(Opens below)) Available P00033825

Includes index and bibliographical references

Chapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs

A practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...

There are no comments on this title.

to post a comment.



© 2025 Technological University of the Philippines.
All Rights Reserved.

Powered by Koha