Cybersecurity - Attack and Defense Strategies - Third Edition: Improve your security posture to mitigate risks and prevent attackers from infiltrating
暫譯: 網路安全 - 攻擊與防禦策略 - 第三版:提升安全姿態以降低風險並防止攻擊者滲透
Diogenes, Yuri, Ozkaya, Erdal
- 出版商: Packt Publishing
- 出版日期: 2022-09-30
- 售價: $1,760
- 貴賓價: 9.5 折 $1,672
- 語言: 英文
- 頁數: 570
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1803248777
- ISBN-13: 9781803248776
-
相關分類:
Penetration-test
-
相關翻譯:
紅藍攻防:技術與策略 (原書第3版) (簡中版)
立即出貨 (庫存=1)
買這商品的人也買了...
-
大話設計模式$620$490 -
Identity and Data Security for Web Development: Best Practices$1,292$1,224 -
Attacking Network Protocols|王牌駭客的網路攻防手法大公開 (Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation)$480$408 -
領域驅動設計:軟體核心複雜度的解決方法 (Domain-Driven Design: Tackling Complexity in the Heart of Software)$680$530 -
重構|改善既有程式的設計, 2/e (繁中平裝版)(Refactoring: Improving The Design of Existing Code, 2/e)$800$632 -
Kali Linux 滲透測試工具|花小錢做資安,你也是防駭高手, 3/e$880$748 -
$1,683Web Application Security: Exploitation and Countermeasures for Modern Web Applications -
$301Web 安全漏洞原理及實戰 -
神之手:動畫大神 加加美高浩的繪手神技$550$495 -
零信任網路|在不受信任的網路中建構安全系統 (Zero Trust Networks)$480$379 -
重新認識 Vue.js:008天絕對看不完的 Vue.js 3 指南$600$468 -
生活資安五四三!:從生活周遭看風險與資訊安全(iT邦幫忙鐵人賽系列書)$500$390 -
Windows APT Warfare:惡意程式前線戰術指南$600$468 -
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Paperback)$1,470$1,397 -
黑帽 Python|給駭客與滲透測試者的 Python 開發指南, 2/e (Black Hat Python : Python Programming for Hackers and Pentesters, 2/e)$450$356 -
不只是工程師才要懂的 App 資訊安全:取得資安檢測合格證書血淚史(iT邦幫忙鐵人賽系列書)$600$468 -
網路時代人人要學的資安基礎必修課 (How Cybersecurity Really Works)$480$379 -
Web API 設計原則|API 與微服務傳遞價值之道 (Principles of Web API Design: Delivering Value with APIs and Microservices)$520$411 -
駭客就在你旁邊:內網安全攻防滲透你死我活, 2/e$880$695 -
快速學會 Python 架站技術:活用 Django 4 建構動態網站的 16堂課$780$608 -
$764隱私保護計算實戰
商品描述
Updated edition of the bestselling guide for planning attack and defense strategies based on the current threat landscape
Key Features:
- Updated for ransomware prevention, security posture management in multi-cloud, Microsoft Defender for Cloud, MITRE ATT&CK Framework, and more
- Explore the latest tools for ethical hacking, pentesting, and Red/Blue teaming
- Includes recent real-world examples to illustrate the best practices to improve security posture
Book Description:
Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.
In this carefully revised new edition, you will learn about the Zero Trust approach and the initial Incident Response process. You will gradually become familiar with Red Team tactics, where you will learn basic syntax for commonly used tools to perform the necessary operations. You will also learn how to apply newer Red Team techniques with powerful tools. Simultaneously, Blue Team tactics are introduced to help you defend your system from complex cyber-attacks. This book provides a clear, in-depth understanding of attack/defense methods as well as patterns to recognize irregular behavior within your organization. Finally, you will learn how to analyze your network and address malware, while becoming familiar with mitigation and threat detection techniques.
By the end of this cybersecurity book, you will have discovered the latest tools to enhance the security of your system, learned about the security controls you need, and understood how to carry out each step of the incident response process.
What You Will Learn:
- Learn to mitigate, recover from, and prevent future cybersecurity events
- Understand security hygiene and value of prioritizing protection of your workloads
- Explore physical and virtual network segmentation, cloud network visibility, and Zero Trust considerations
- Adopt new methods to gather cyber intelligence, identify risk, and demonstrate impact with Red/Blue Team strategies
- Explore legendary tools such as Nmap and Metasploit to supercharge your Red Team
- Discover identity security and how to perform policy enforcement
- Integrate threat detection systems into your SIEM solutions
- Discover the MITRE ATT&CK Framework and open-source tools to gather intelligence
Who this book is for:
If you are an IT security professional who wants to venture deeper into cybersecurity domains, this book is for you. Cloud security administrators, IT pentesters, security consultants, and ethical hackers will also find this book useful. Basic understanding of operating systems, computer networking, and web applications will be helpful.
商品描述(中文翻譯)
根據當前威脅環境規劃攻擊和防禦策略的暢銷指南更新版
主要特色:
- 針對勒索病毒防護、多雲安全態勢管理、Microsoft Defender for Cloud、MITRE ATT&CK 框架等進行更新
- 探索最新的道德駭客、滲透測試及紅藍隊工具
- 包含近期的實際案例,以說明改善安全態勢的最佳實踐
書籍描述:
《網路安全 - 攻擊與防禦策略》第三版將幫助您了解威脅評估和安全衛生的關鍵方面、當前的威脅環境及其挑戰,以及如何維持強大的安全態勢。
在這本經過仔細修訂的新版本中,您將學習到零信任(Zero Trust)方法和初步的事件響應過程。您將逐漸熟悉紅隊戰術,學習常用工具的基本語法以執行必要的操作。您還將學習如何使用強大的工具應用更新的紅隊技術。同時,藍隊戰術也將被介紹,以幫助您防禦複雜的網路攻擊。本書提供了對攻擊/防禦方法的清晰、深入理解,以及識別組織內不規則行為的模式。最後,您將學習如何分析您的網路並處理惡意軟體,同時熟悉緩解和威脅檢測技術。
在這本網路安全書籍結束時,您將發現最新的工具來增強系統的安全性,了解所需的安全控制,並理解如何執行事件響應過程的每一步。
您將學到什麼:
- 學習減輕、恢復和防止未來的網路安全事件
- 理解安全衛生及優先保護工作負載的價值
- 探索實體和虛擬網路分段、雲端網路可見性及零信任考量
- 採用新方法收集網路情報、識別風險並展示影響,使用紅藍隊策略
- 探索傳奇工具如 Nmap 和 Metasploit,以強化您的紅隊
- 發現身份安全及如何執行政策強制
- 將威脅檢測系統整合到您的 SIEM 解決方案中
- 發現 MITRE ATT&CK 框架及開源工具以收集情報
本書適合誰:
如果您是希望深入網路安全領域的 IT 安全專業人士,這本書適合您。雲端安全管理員、IT 滲透測試人員、安全顧問和道德駭客也會發現這本書有用。對作業系統、計算機網路和網頁應用程式的基本理解將會有所幫助。