語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Modern cybersecurity practices / Pascal Ackerman.
其他題名:
exploring and implementing agile cybersecurity frameworks and strategies for your organization /
作者:
Ackerman, Pascal.
面頁冊數:
1 online resource (410 pages)
標題:
COMPUTERS / System Administration / Windows Administration. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000092.html
ISBN:
9789389328257
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
Ackerman, Pascal.
Modern cybersecurity practices
exploring and implementing agile cybersecurity frameworks and strategies for your organization /[electronic resource] :Pascal Ackerman. - 1 online resource (410 pages)
Includes bibliographical references and index.
Modern cybersecurity practices : exploring and implementing agile cybersecurity frameworks and strategies for your organization -- About the Author -- Acknowledgement -- Preface -- Errata -- Table of Contents -- Part I Setting the Stage - System Pwnage -- Chapter 1 What’s at Stake? -- Chapter 2 Example Attack - The Initial Breach -- Chapter 3 Example Attack - Lateral Movement -- Chapter 4 Example Attack - Data Exfiltration -- Chapter 5 Example Attack - Going Out with a Bang -- Part II Security Program Implementation -- Chapter 6 Scrutinizing the Example Attack -- Chapter 7 Adhere to a Security Standard -- Chapter 8 Defining Security Policies, Procedures, Standards, and Guidelines -- Chapter 9 Kicking Off the Security Program -- Part III Security Monitoring for Continuous Improvement -- Chapter 10 Passive Security Monitoring -- Chapter 11 Active Security Monitoring -- Chapter 12 Threat Hunting -- Chapter 13 The Continuous Battle.
Access restricted to authorized users and institutions.
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture. After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS' and endpoint protection solutions.
Mode of access: World Wide Web.
ISBN: 9789389328257Subjects--Topical Terms:
1483849
COMPUTERS / System Administration / Windows Administration.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 004
Modern cybersecurity practices = exploring and implementing agile cybersecurity frameworks and strategies for your organization /
LDR
:03649nam a2200289 i 4500
001
1157284
006
m eo d
007
cr cn |||m|||a
008
250717s2020 ob 000 0 eng d
020
$a
9789389328257
020
$a
9789389328264
035
$a
BPB0000092
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
004
100
1
$a
Ackerman, Pascal.
$3
1483848
245
1 0
$a
Modern cybersecurity practices
$h
[electronic resource] :
$b
exploring and implementing agile cybersecurity frameworks and strategies for your organization /
$c
Pascal Ackerman.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2020.
264
4
$c
©2020
300
$a
1 online resource (410 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Modern cybersecurity practices : exploring and implementing agile cybersecurity frameworks and strategies for your organization -- About the Author -- Acknowledgement -- Preface -- Errata -- Table of Contents -- Part I Setting the Stage - System Pwnage -- Chapter 1 What’s at Stake? -- Chapter 2 Example Attack - The Initial Breach -- Chapter 3 Example Attack - Lateral Movement -- Chapter 4 Example Attack - Data Exfiltration -- Chapter 5 Example Attack - Going Out with a Bang -- Part II Security Program Implementation -- Chapter 6 Scrutinizing the Example Attack -- Chapter 7 Adhere to a Security Standard -- Chapter 8 Defining Security Policies, Procedures, Standards, and Guidelines -- Chapter 9 Kicking Off the Security Program -- Part III Security Monitoring for Continuous Improvement -- Chapter 10 Passive Security Monitoring -- Chapter 11 Active Security Monitoring -- Chapter 12 Threat Hunting -- Chapter 13 The Continuous Battle.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on Company-X's environment, shows how an attacker could use information and tools to infiltrate the companies network, exfiltrate sensitive data and then leave the company in disarray by leaving behind a little surprise for any users to find the next time they open their computer. After we see how an attacker pulls off their malicious goals, the next part of the book will have your pick, design, and implement a security program that best reflects your specific situation and requirements. Along the way, we will look at a variety of methodologies, concepts, and tools that are typically used during the activities that are involved with the design, implementation, and improvement of one's cybersecurity posture. After having implemented a fitting cybersecurity program and kickstarted the improvement of our cybersecurity posture improvement activities we then go and look at all activities, requirements, tools, and methodologies behind keeping an eye on the state of our cybersecurity posture with active and passive cybersecurity monitoring tools and activities as well as the use of threat hunting exercises to find malicious activity in our environment that typically stays under the radar of standard detection methods like firewall, IDS' and endpoint protection solutions.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / System Administration / Windows Administration.
$2
bisacsh
$3
1483849
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Security / Viruses & Malware.
$2
bisacsh
$3
1483841
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000092.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入