000 02198nam a22003615i 4500
001 20839464
003 OSt
005 20240802094330.0
008 190205s2019 inu 000 0 eng
010 _a 2019933354
020 _a9781119552932 (pbk)
040 _aDLC
_beng
_erda
_cTUPM
042 _apcc
050 0 _aQA
_b76.9.A25 T36 2019
100 1 _aTanner, Nadean.
245 0 0 _aCybersecurity blue team toolkit /
_cNadean Tanner.
263 _a1903
264 1 _aIndianapolis, IN :
_bJohn Wiley and Sons,
_c2019.
300 _a xxiv, 262 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes index and bibliographical references
505 0 _aChapter 1. Fundamental Networking and Security Tools Chapter 2. Troubleshooting Microsoft Windows Chapter 3. Nmap Chapter 4. Vulnerability Management Chapter 5. Monitoring with OSSEC Chapter 6. Protecting Wireless Communication Chapter 7. Wireshark Chapter 8. Access Management Chapter 9. Managing Logs Chapter 10. Metasploit Chapter 11. Web Application Security Chapter 12. Patch and Configuration Management Chapter 13. Securing OSI Layer 8 Chapter 14. Kali Linux Chapter 15. CISv7 Controls and Best Practices CIS Basic Controls-The Top Six Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Maintenance, Monitoring, and Analysis of Audit Logs
520 _aA practical handbook to cybersecurity for both tech and non-tech professionals. As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity...
650 1 0 _a Computer Security
650 1 0 _aData protection
650 1 0 _aInternet Security measures
906 _a0
_bibc
_corignew
_d2
_eepcn
_f20
_gy-gencatlg
942 _2lcc
_cBK
999 _c3593
_d3593