語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Professional Red teaming = conductin...
~
Oakley, Jacob G.
FindBook
Google Book
Amazon
博客來
Professional Red teaming = conducting successful cybersecurity engagements /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Professional Red teaming/ by Jacob G. Oakley.
其他題名:
conducting successful cybersecurity engagements /
作者:
Oakley, Jacob G.
出版者:
Berkeley, CA :Apress : : 2019.,
面頁冊數:
xix, 210 p. :ill., digital ;24 cm.
內容註:
Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-4309-1
ISBN:
9781484243091
Professional Red teaming = conducting successful cybersecurity engagements /
Oakley, Jacob G.
Professional Red teaming
conducting successful cybersecurity engagements /[electronic resource] :by Jacob G. Oakley. - Berkeley, CA :Apress :2019. - xix, 210 p. :ill., digital ;24 cm.
Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-.
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming) This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.
ISBN: 9781484243091
Standard No.: 10.1007/978-1-4842-4309-1doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Professional Red teaming = conducting successful cybersecurity engagements /
LDR
:03050nmm a2200325 a 4500
001
2180828
003
DE-He213
005
20190308173920.0
006
m d
007
cr nn 008maaau
008
191122s2019 cau s 0 eng d
020
$a
9781484243091
$q
(electronic bk.)
020
$a
9781484243084
$q
(paper)
024
7
$a
10.1007/978-1-4842-4309-1
$2
doi
035
$a
978-1-4842-4309-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
O11 2019
100
1
$a
Oakley, Jacob G.
$3
3387239
245
1 0
$a
Professional Red teaming
$h
[electronic resource] :
$b
conducting successful cybersecurity engagements /
$c
by Jacob G. Oakley.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
xix, 210 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Red Teams in Cyberspace -- Chapter 2: Why Human Hackers? -- Chapter 3: The State of Modern Offensive Security -- Chapter 4: Shaping -- Chapter 5: Rules of Engagement -- Chapter 6: Executing -- Chapter 7: Reporting -- Chapter 8: Purple Teaming -- Chapter 9: Counter-APT Red Teaming -- Chapter 10: Outcome Oriented Scoping -- Chapter 11: Initialization Perspectives -- Chapter 12: Reverse Red Teaming -- Chapter 13: Evaluating Offensive Security Processes -- Chapter 14: Experimentation -- Chapter 15: Validation.-.
520
$a
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming) This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You'll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.
650
0
$a
Computer security.
$3
540555
650
1 4
$a
Security.
$3
3134865
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4309-1
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9370675
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入