Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Cybersecurity: attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system. Diogenes, Yuri & Ozkaya Erdal

By: Material type: TextTextPublication details: Birmingham, UK,: Packt Publishing, 2022.Edition: 3rd edDescription: xxii, 546p.: ill., 28cmISBN:
  • 9781803248776
LOC classification:
  • U163 .D56 2022
Contents:
Security Posture--Incident Response Process--What is a Cyber Strategy?--Understanding the Cybersecurity Kill Chain--Reconnaissance--Compromising the System--Chasing a User’s Identity--Lateral Movement--Privilege Escalation Security Policy--Network Security--Active Sensors--Threat Intelligence--Investigating an Incident--Recovery Process--Vulnerability Management--Log Analysis.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - Mang'u General Stacks Non-fiction U163 .D56 2022 (Browse shelf(Opens below)) C1 Available Z011540
Books Books Zetech Library - TRC General Stacks Non-fiction U163 .D56 2022 (Browse shelf(Opens below)) C1 Available Z011539

Security Posture--Incident Response Process--What is a Cyber Strategy?--Understanding the Cybersecurity Kill Chain--Reconnaissance--Compromising the System--Chasing a User’s Identity--Lateral Movement--Privilege Escalation Security Policy--Network Security--Active Sensors--Threat Intelligence--Investigating an Incident--Recovery Process--Vulnerability Management--Log Analysis.

There are no comments on this title.

to post a comment.