Cybersecurity: attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system. Diogenes, Yuri & Ozkaya Erdal
Material type: TextPublication details: Birmingham, UK,: Packt Publishing, 2022.Edition: 3rd edDescription: xxii, 546p.: ill., 28cmISBN:- 9781803248776
- U163 .D56 2022
Contents:
Security Posture--Incident Response Process--What is a Cyber Strategy?--Understanding the Cybersecurity Kill Chain--Reconnaissance--Compromising the System--Chasing a User’s Identity--Lateral Movement--Privilege Escalation Security Policy--Network Security--Active Sensors--Threat Intelligence--Investigating an Incident--Recovery Process--Vulnerability Management--Log Analysis.
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Zetech Library - Mang'u General Stacks | Non-fiction | U163 .D56 2022 (Browse shelf(Opens below)) | C1 | Available | Z011540 | ||
Books | Zetech Library - TRC General Stacks | Non-fiction | U163 .D56 2022 (Browse shelf(Opens below)) | C1 | Available | Z011539 |
Browsing Zetech Library - TRC shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
U33 .C76 2012 The psychology of the Athenian hoplite : | U163.D46 1999 Information warfare and security / | U163.D46 1999 Information warfare and security / | U163 .D56 2022 Cybersecurity: attack and defense strategies : improve your security posture to mitigate risks and prevent attackers from infiltrating your system. | UA646.3 .R33 2022 NATO in the cold war : contested histories and future directions / | UA646.3 .R33 2022 NATO in the cold war : contested histories and future directions / | Z52.5 .M52 .A39 2003 Advanced Applications using Microsoft Access 2003 / |
Security Posture--Incident Response Process--What is a Cyber Strategy?--Understanding the Cybersecurity Kill Chain--Reconnaissance--Compromising the System--Chasing a User’s Identity--Lateral Movement--Privilege Escalation Security Policy--Network Security--Active Sensors--Threat Intelligence--Investigating an Incident--Recovery Process--Vulnerability Management--Log Analysis.
There are no comments on this title.
Log in to your account to post a comment.