Offensive and defensive cyber security strategies: fundamentals, theory and practices
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines ne...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
[2025]
|
Schriftenreihe: | Cyber Shorts Series
|
Schlagworte: | |
Zusammenfassung: | The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks. |
Beschreibung: | x, 105 Seiten 453 gr |
ISBN: | 9781032833804 9781032823416 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV050146939 | ||
003 | DE-604 | ||
005 | 20250310 | ||
007 | t| | ||
008 | 250130s2025 xx |||| 00||| eng d | ||
020 | |a 9781032833804 |c pbk |9 978-1-032-83380-4 | ||
020 | |a 9781032823416 |c hbk |9 978-1-032-82341-6 | ||
024 | 3 | |a 9781032833804 | |
035 | |a (DE-599)BVBBV050146939 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Ouaissa, Mariya |e Verfasser |0 (DE-588)1272975355 |4 aut | |
245 | 1 | 0 | |a Offensive and defensive cyber security strategies |b fundamentals, theory and practices |c Mariya Ouaissa and Mariyam Ouaissa |
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c [2025] | |
300 | |a x, 105 Seiten |c 453 gr | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Cyber Shorts Series | |
520 | |a The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks. | ||
650 | 4 | |a bicssc / Privacy & data protection | |
650 | 4 | |a bicssc / Network management | |
650 | 4 | |a bicssc / Causes & prevention of crime | |
650 | 4 | |a bicssc / Computer science | |
650 | 4 | |a bicssc / Legal aspects of IT | |
650 | 4 | |a bicssc / Security services | |
650 | 4 | |a bicssc / Criminology - legal aspects | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Cryptography & Encryption | |
650 | 4 | |a bisacsh / COMPUTERS / Internet / Online Safety & Privacy | |
650 | 4 | |a bisacsh / ARCHITECTURE / Security Design | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Network Security | |
650 | 4 | |a bisacsh / COMPUTERS / Security / Viruses & Malware | |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Ouaissa, Mariyam |e Verfasser |0 (DE-588)1259340570 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-003-50908-0 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035483340 |
Datensatz im Suchindex
_version_ | 1826189491560251392 |
---|---|
adam_text | |
any_adam_object | |
author | Ouaissa, Mariya Ouaissa, Mariyam |
author_GND | (DE-588)1272975355 (DE-588)1259340570 |
author_facet | Ouaissa, Mariya Ouaissa, Mariyam |
author_role | aut aut |
author_sort | Ouaissa, Mariya |
author_variant | m o mo m o mo |
building | Verbundindex |
bvnumber | BV050146939 |
ctrlnum | (DE-599)BVBBV050146939 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV050146939</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250310</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">250130s2025 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032833804</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-032-83380-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032823416</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-032-82341-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781032833804</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050146939</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariya</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1272975355</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Offensive and defensive cyber security strategies</subfield><subfield code="b">fundamentals, theory and practices</subfield><subfield code="c">Mariya Ouaissa and Mariyam Ouaissa</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">x, 105 Seiten</subfield><subfield code="c">453 gr</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cyber Shorts Series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Privacy & data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Network management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Causes & prevention of crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Legal aspects of IT</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Security services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc / Criminology - legal aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Cryptography & Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Internet / Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / ARCHITECTURE / Security Design</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh / COMPUTERS / Security / Viruses & Malware</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ouaissa, Mariyam</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1259340570</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-003-50908-0</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035483340</subfield></datafield></record></collection> |
id | DE-604.BV050146939 |
illustrated | Not Illustrated |
indexdate | 2025-03-10T07:00:14Z |
institution | BVB |
isbn | 9781032833804 9781032823416 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035483340 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | x, 105 Seiten 453 gr |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
series2 | Cyber Shorts Series |
spelling | Ouaissa, Mariya Verfasser (DE-588)1272975355 aut Offensive and defensive cyber security strategies fundamentals, theory and practices Mariya Ouaissa and Mariyam Ouaissa Boca Raton CRC Press, Taylor & Francis Group [2025] x, 105 Seiten 453 gr txt rdacontent n rdamedia nc rdacarrier Cyber Shorts Series The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks. bicssc / Privacy & data protection bicssc / Network management bicssc / Causes & prevention of crime bicssc / Computer science bicssc / Legal aspects of IT bicssc / Security services bicssc / Criminology - legal aspects bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / ARCHITECTURE / Security Design bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / Viruses & Malware Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Computerkriminalität (DE-588)4010452-7 s Risikoanalyse (DE-588)4137042-9 s DE-604 Ouaissa, Mariyam Verfasser (DE-588)1259340570 aut Erscheint auch als Online-Ausgabe 978-1-003-50908-0 |
spellingShingle | Ouaissa, Mariya Ouaissa, Mariyam Offensive and defensive cyber security strategies fundamentals, theory and practices bicssc / Privacy & data protection bicssc / Network management bicssc / Causes & prevention of crime bicssc / Computer science bicssc / Legal aspects of IT bicssc / Security services bicssc / Criminology - legal aspects bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / ARCHITECTURE / Security Design bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / Viruses & Malware Risikoanalyse (DE-588)4137042-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4137042-9 (DE-588)4274324-2 (DE-588)4010452-7 |
title | Offensive and defensive cyber security strategies fundamentals, theory and practices |
title_auth | Offensive and defensive cyber security strategies fundamentals, theory and practices |
title_exact_search | Offensive and defensive cyber security strategies fundamentals, theory and practices |
title_full | Offensive and defensive cyber security strategies fundamentals, theory and practices Mariya Ouaissa and Mariyam Ouaissa |
title_fullStr | Offensive and defensive cyber security strategies fundamentals, theory and practices Mariya Ouaissa and Mariyam Ouaissa |
title_full_unstemmed | Offensive and defensive cyber security strategies fundamentals, theory and practices Mariya Ouaissa and Mariyam Ouaissa |
title_short | Offensive and defensive cyber security strategies |
title_sort | offensive and defensive cyber security strategies fundamentals theory and practices |
title_sub | fundamentals, theory and practices |
topic | bicssc / Privacy & data protection bicssc / Network management bicssc / Causes & prevention of crime bicssc / Computer science bicssc / Legal aspects of IT bicssc / Security services bicssc / Criminology - legal aspects bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / ARCHITECTURE / Security Design bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / Viruses & Malware Risikoanalyse (DE-588)4137042-9 gnd Computersicherheit (DE-588)4274324-2 gnd Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | bicssc / Privacy & data protection bicssc / Network management bicssc / Causes & prevention of crime bicssc / Computer science bicssc / Legal aspects of IT bicssc / Security services bicssc / Criminology - legal aspects bisacsh / COMPUTERS / Security / Cryptography & Encryption bisacsh / COMPUTERS / Internet / Online Safety & Privacy bisacsh / ARCHITECTURE / Security Design bisacsh / COMPUTERS / Security / Network Security bisacsh / COMPUTERS / Security / Viruses & Malware Risikoanalyse Computersicherheit Computerkriminalität |
work_keys_str_mv | AT ouaissamariya offensiveanddefensivecybersecuritystrategiesfundamentalstheoryandpractices AT ouaissamariyam offensiveanddefensivecybersecuritystrategiesfundamentalstheoryandpractices |