Cybersecurity blue team strategies: uncover the secrets of blue teams to combat cyber threats in your organization
This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing, Limited
2023
|
Ausgabe: | First published |
Schlagworte: | |
Online-Zugang: | FHA01 FHI01 FLA01 UBY01 |
Zusammenfassung: | This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch. |
Beschreibung: | 1st edition - Cover Description based upon print version of record. - Corrective controls |
Beschreibung: | 1 Online-Ressource (xvii, 191 Seiten) Illustrationen |
ISBN: | 9781801073615 1801073619 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV048901798 | ||
003 | DE-604 | ||
005 | 20240119 | ||
007 | cr|uuu---uuuuu | ||
008 | 230417s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781801073615 |c EBook (PDF) |9 978-1-80107-361-5 | ||
020 | |a 1801073619 |c EBook (PDF) |9 1-80107-361-9 | ||
035 | |a (ZDB-221-PCL)978-1-80107-361-5 | ||
035 | |a (OCoLC)1376411013 | ||
035 | |a (DE-599)KEP089973283 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-706 |a DE-Aug4 |a DE-573 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sehgal, Kunal |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cybersecurity blue team strategies |b uncover the secrets of blue teams to combat cyber threats in your organization |c Kunal Sehgal, Nikolaos Thymianis |
250 | |a First published | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing, Limited |c 2023 | |
300 | |a 1 Online-Ressource (xvii, 191 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a 1st edition - Cover | ||
500 | |a Description based upon print version of record. - Corrective controls | ||
520 | 3 | |a This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch. | |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer crimes | |
700 | 1 | |a Thymianis, Nikolaos |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781801072472 |
912 | |a ZDB-30-ORH |a ZDB-221-PCL |a ZDB-221-PCR |a ZDB-30-PQE |a ZDB-221-PPK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034166197 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006535.html |l FHA01 |p ZDB-221-PCL |q FHA_PDA_PCL |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006535.html |l FHI01 |p ZDB-221-PCL |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006535.html |l FLA01 |p ZDB-221-PCL |q FLA_PCL_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0006535.html |l UBY01 |p ZDB-221-PCL |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185066151084032 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Sehgal, Kunal Thymianis, Nikolaos |
author_facet | Sehgal, Kunal Thymianis, Nikolaos |
author_role | aut aut |
author_sort | Sehgal, Kunal |
author_variant | k s ks n t nt |
building | Verbundindex |
bvnumber | BV048901798 |
collection | ZDB-30-ORH ZDB-221-PCL ZDB-221-PCR ZDB-30-PQE ZDB-221-PPK |
ctrlnum | (ZDB-221-PCL)978-1-80107-361-5 (OCoLC)1376411013 (DE-599)KEP089973283 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | First published |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02274nmm a22004571c 4500</leader><controlfield tag="001">BV048901798</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240119 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230417s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801073615</subfield><subfield code="c">EBook (PDF)</subfield><subfield code="9">978-1-80107-361-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1801073619</subfield><subfield code="c">EBook (PDF)</subfield><subfield code="9">1-80107-361-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCL)978-1-80107-361-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1376411013</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089973283</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sehgal, Kunal</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity blue team strategies</subfield><subfield code="b">uncover the secrets of blue teams to combat cyber threats in your organization</subfield><subfield code="c">Kunal Sehgal, Nikolaos Thymianis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 191 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1st edition - Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - Corrective controls</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thymianis, Nikolaos</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781801072472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield><subfield code="a">ZDB-221-PCL</subfield><subfield code="a">ZDB-221-PCR</subfield><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-221-PPK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034166197</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006535.html</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">FHA_PDA_PCL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006535.html</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006535.html</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">FLA_PCL_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0006535.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048901798 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:51:10Z |
indexdate | 2024-07-10T09:49:19Z |
institution | BVB |
isbn | 9781801073615 1801073619 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034166197 |
oclc_num | 1376411013 |
open_access_boolean | |
owner | DE-860 DE-706 DE-Aug4 DE-573 |
owner_facet | DE-860 DE-706 DE-Aug4 DE-573 |
physical | 1 Online-Ressource (xvii, 191 Seiten) Illustrationen |
psigel | ZDB-30-ORH ZDB-221-PCL ZDB-221-PCR ZDB-30-PQE ZDB-221-PPK ZDB-221-PCL FHA_PDA_PCL ZDB-221-PCL FLA_PCL_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Sehgal, Kunal Verfasser aut Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization Kunal Sehgal, Nikolaos Thymianis First published Birmingham ; Mumbai Packt Publishing, Limited 2023 1 Online-Ressource (xvii, 191 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier 1st edition - Cover Description based upon print version of record. - Corrective controls This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch. Computer security Computer networks / Security measures Computer crimes Thymianis, Nikolaos Verfasser aut Erscheint auch als Druck-Ausgabe 9781801072472 |
spellingShingle | Sehgal, Kunal Thymianis, Nikolaos Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title_auth | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title_exact_search | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title_exact_search_txtP | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title_full | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization Kunal Sehgal, Nikolaos Thymianis |
title_fullStr | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization Kunal Sehgal, Nikolaos Thymianis |
title_full_unstemmed | Cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization Kunal Sehgal, Nikolaos Thymianis |
title_short | Cybersecurity blue team strategies |
title_sort | cybersecurity blue team strategies uncover the secrets of blue teams to combat cyber threats in your organization |
title_sub | uncover the secrets of blue teams to combat cyber threats in your organization |
work_keys_str_mv | AT sehgalkunal cybersecurityblueteamstrategiesuncoverthesecretsofblueteamstocombatcyberthreatsinyourorganization AT thymianisnikolaos cybersecurityblueteamstrategiesuncoverthesecretsofblueteamstocombatcyberthreatsinyourorganization |