000 | 06443cam a2200625Ii 4500 | ||
---|---|---|---|
001 | on1091899484 | ||
003 | OCoLC | ||
005 | 20220711203512.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190408s2019 inu o 000 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dDG1 _dYDX _dEBLCP _dUKMGB _dRECBK _dOCLCF _dOCLCQ _dUPM _dUKAHL |
||
015 |
_aGBB973474 _2bnb |
||
016 | 7 |
_a019364420 _2Uk |
|
019 |
_a1096287170 _a1096489515 |
||
020 |
_a9781119552949 _q(electronic bk.) |
||
020 |
_a111955294X _q(electronic bk.) |
||
020 |
_a9781119552956 _q(electronic bk.) |
||
020 |
_a1119552958 _q(electronic bk.) |
||
020 |
_a9781119552963 _q(electronic bk.) |
||
020 |
_a1119552966 _q(electronic bk.) |
||
020 | _z9781119552932 | ||
020 | _z1119552931 | ||
029 | 1 |
_aCHNEW _b001050891 |
|
029 | 1 |
_aCHVBK _b567422445 |
|
029 | 1 |
_aUKMGB _b019364420 |
|
035 |
_a(OCoLC)1091899484 _z(OCoLC)1096287170 _z(OCoLC)1096489515 |
||
037 |
_a9781119552949 _bWiley |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aTanner, Nadean H., _eauthor. _98286 |
|
245 | 1 | 0 |
_aCybersecurity blue team toolkit / _cNadean H. Tanner. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c2019. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed April 9, 2019) | |
505 | 0 | _aCover; Title Page; Copyright; About the Author; About the Technical Editor; Credits; Acknowledgments; Contents at a glance; Contents; Foreword; Introduction; Chapter 1 Fundamental Networking and Security Tools; Ping; IPConfig; NSLookup; Tracert; NetStat; PuTTY; Chapter 2 Troubleshooting Microsoft Windows; RELI; PSR; PathPing; MTR; Sysinternals; The Legendary God Mode; Chapter 3 Nmap-The Network Mapper; Network Mapping; Port Scanning; Services Running; Operating Systems; Zenmap; Chapter 4 Vulnerability Management; Managing Vulnerabilities; OpenVAS; Nexpose Community | |
505 | 8 | _aChapter 5 Monitoring with OSSECLog-Based Intrusion Detection Systems; Agents; Adding an Agent; Extracting the Key for an Agent; Removing an Agent; Log Analysis; Chapter 6 Protecting Wireless Communication; 802.11; inSSIDer; Wireless Network Watcher; Hamachi; Tor; Chapter 7 Wireshark; Wireshark; OSI Model; Capture; Filters and Colors; Inspection; Chapter 8 Access Management; AAA; Least Privilege; Single Sign-On; JumpCloud; Chapter 9 Managing Logs; Windows Event Viewer; Windows PowerShell; BareTail; Syslog; SolarWinds Kiwi; Chapter 10 Metasploit; Reconnaissance; Installation; Gaining Access | |
505 | 8 | _aMetasploitable2Vulnerable Web Services; Meterpreter; Chapter 11 Web Application Security; Web Development; Information Gathering; DNS; Defense in Depth; Burp Suite; Chapter 12 Patch and Configuration Management; Patch Management; Configuration Management; Clonezilla Live; Chapter 13 Securing OSI Layer 8; Human Nature; Human Attacks; Education; The Social Engineer Toolkit; Chapter 14 Kali Linux; Virtualization; Optimizing Kali Linux; Using Kali Linux Tools; Maltego; Recon-ng; Sparta; MacChanger; Nikto; Kismet; WiFite; John the Ripper; Hashcat; Chapter 15 CISv7 Controls and Best Practices | |
505 | 8 | _aCIS Basic Controls-The Top SixInventory and Control of Hardware Assets; Inventory and Control of Software Assets; Continuous Vulnerability Management; Controlled Use of Administrative Privileges; Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers; Maintenance, Monitoring, and Analysis of Audit Logs; In Conclusion; Index; EULA | |
520 | _aA practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive. | ||
650 | 0 |
_aComputer security. _93970 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh _98287 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
655 | 0 |
_aElectronic books. _93294 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_iPrint version: _aTanner, Nadean H. _tCybersecurity blue team toolkit. _dIndianapolis, IN : Wiley, 2019 _z1119552931 _z9781119552932 _w(OCoLC)1050964394 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119552963 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69058 _d69058 |