NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cybersecurity blue team toolkit / (Record no. 12597)

MARC details
000 -LEADER
fixed length control field 07555cam a2200817 i 4500
001 - CONTROL NUMBER
control field on1091899484
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125541.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190408s2019 inu o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- DG1
-- YDX
-- EBLCP
-- UKMGB
-- RECBK
-- OCLCF
-- OCLCQ
-- UPM
-- UKAHL
-- OCLCQ
-- CDN
-- COO
-- TEFOD
-- OCLCQ
-- K6U
-- TOH
-- OCLCQ
-- OCLCO
-- IEEEE
-- OCLCQ
-- OCLCO
-- VLB
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB973474
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 019364420
Source Uk
019 ## -
-- 1096287170
-- 1096489515
-- 1228513105
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119552949
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111955294X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119552956
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119552958
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119552963
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119552966
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119552932
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119552931
024 8# - OTHER STANDARD IDENTIFIER
Standard number or code 9781119552932
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119552963
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001050891
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 567422445
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 019364420
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1091899484
Canceled/invalid control number (OCoLC)1096287170
-- (OCoLC)1096489515
-- (OCoLC)1228513105
037 ## - SOURCE OF ACQUISITION
Stock number 9781119552949
Source of stock number/acquisition Wiley
037 ## - SOURCE OF ACQUISITION
Stock number B9BA7111-03C7-4F09-9167-E688E8206742
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
037 ## - SOURCE OF ACQUISITION
Stock number 9820820
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number T36 2019eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Tanner, Nadean H.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity blue team toolkit /
Statement of responsibility, etc. Nadean H. Tanner.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2019]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xxiv, 262 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
500 ## - GENERAL NOTE
General note Includes index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (EBSCO, viewed April 9, 2019)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Title Page; Copyright; About the Author; About the Technical Editor; Credits; Acknowledgments; Contents at a glance; Contents; Foreword; Introduction; Chapter 1 Fundamental Networking and Security Tools; Ping; IPConfig; NSLookup; Tracert; NetStat; PuTTY; Chapter 2 Troubleshooting Microsoft Windows; RELI; PSR; PathPing; MTR; Sysinternals; The Legendary God Mode; Chapter 3 Nmap-The Network Mapper; Network Mapping; Port Scanning; Services Running; Operating Systems; Zenmap; Chapter 4 Vulnerability Management; Managing Vulnerabilities; OpenVAS; Nexpose Community
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 5 Monitoring with OSSECLog-Based Intrusion Detection Systems; Agents; Adding an Agent; Extracting the Key for an Agent; Removing an Agent; Log Analysis; Chapter 6 Protecting Wireless Communication; 802.11; inSSIDer; Wireless Network Watcher; Hamachi; Tor; Chapter 7 Wireshark; Wireshark; OSI Model; Capture; Filters and Colors; Inspection; Chapter 8 Access Management; AAA; Least Privilege; Single Sign-On; JumpCloud; Chapter 9 Managing Logs; Windows Event Viewer; Windows PowerShell; BareTail; Syslog; SolarWinds Kiwi; Chapter 10 Metasploit; Reconnaissance; Installation; Gaining Access
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Metasploitable2Vulnerable Web Services; Meterpreter; Chapter 11 Web Application Security; Web Development; Information Gathering; DNS; Defense in Depth; Burp Suite; Chapter 12 Patch and Configuration Management; Patch Management; Configuration Management; Clonezilla Live; Chapter 13 Securing OSI Layer 8; Human Nature; Human Attacks; Education; The Social Engineer Toolkit; Chapter 14 Kali Linux; Virtualization; Optimizing Kali Linux; Using Kali Linux Tools; Maltego; Recon-ng; Sparta; MacChanger; Nikto; Kismet; WiFite; John the Ripper; Hashcat; Chapter 15 CISv7 Controls and Best Practices
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note CIS Basic Controls-The Top SixInventory and Control of Hardware Assets; Inventory and Control of Software Assets; Continuous Vulnerability Management; Controlled Use of Administrative Privileges; Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers; Maintenance, Monitoring, and Analysis of Audit Logs; In Conclusion; Index; EULA
520 ## - SUMMARY, ETC.
Summary, etc. A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.
542 ## - INFORMATION RELATING TO COPYRIGHT STATUS
Copyright statement Copyright � 2019 by John Wiley and Sons
Copyright date 2019
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cybersecurity Blue Team toolkit (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGtjTyT3RbHdtmmrPKjJym
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Tanner, Nadean H.
Title Cybersecurity blue team toolkit.
Place, publisher, and date of publication Indianapolis, IN : Wiley, 2019
International Standard Book Number 1119552931
-- 9781119552932
Record control number (OCoLC)1050964394
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119552963</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH35311499
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH35311498
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL5747366
938 ## -
-- EBSCOhost
-- EBSC
-- 2098142
938 ## -
-- Recorded Books, LLC
-- RECE
-- rbeEB00757871
938 ## -
-- YBP Library Services
-- YANK
-- 16179970
938 ## -
-- YBP Library Services
-- YANK
-- 16154916
938 ## -
-- YBP Library Services
-- YANK
-- 16161330
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha