000 | 03470cam a2200565Ii 4500 | ||
---|---|---|---|
001 | ocn918135804 | ||
003 | OCoLC | ||
005 | 20190328114812.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150813s2015 mau o 000 0 eng d | ||
010 | _a 2017304254 | ||
040 |
_aN$T _beng _erda _epn _cN$T _dEBLCP _dN$T _dYDXCP _dIDEBK _dUMI _dUIU _dDEBSZ _dCDX _dDEBBG _dFEM _dOCLCQ _dMERUC _dOCLCQ _dWRM _dU3W _dD6H _dOCLCF _dCEF _dOCLCQ _dAU@ _dOCLCQ _dWYU _dCUY _dLOA _dZCU _dICG _dK6U _dCOCUF _dVT2 _dDKC |
||
019 |
_a919204810 _a968058098 _a969026911 _a1066463481 _a1088983340 |
||
020 |
_a9780128041864 _q(electronic bk.) |
||
020 |
_a0128041862 _q(electronic bk.) |
||
020 | _a0128041714 | ||
020 | _a9780128041710 | ||
020 | _z9780128041710 | ||
035 |
_a(OCoLC)918135804 _z(OCoLC)919204810 _z(OCoLC)968058098 _z(OCoLC)969026911 _z(OCoLC)1066463481 _z(OCoLC)1088983340 |
||
050 | 4 |
_aHD61.5 _b.D36 2015eb |
|
072 | 7 |
_aBUS _x082000 _2bisacsh |
|
072 | 7 |
_aBUS _x041000 _2bisacsh |
|
072 | 7 |
_aBUS _x042000 _2bisacsh |
|
072 | 7 |
_aBUS _x085000 _2bisacsh |
|
082 | 0 | 4 |
_a658.4/7 _223 |
100 | 1 |
_aDalziel, Henry, _eauthor. |
|
245 | 1 | 0 |
_aNext generation red teaming / _h[electronic resource] _cHenry Dalziel ; contributing editor, Robert Wood. |
264 | 1 |
_aWaltham, MA : _bElsevier : _bSyngress, _c2015 |
|
264 | 4 | _c�2015 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _2rda |
||
588 | 0 | _aVendor-supplied metadata. | |
520 | _aRed Teaming is can be described as a type of wargaming. In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization's security posture is. This course is particularly suited to CISO's and CTO's that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security. Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data Demonstrates the key differences between Red Teaming and Penetration Testing Shows how to build a Red Team and how to identify different operational threat environments. | ||
505 | 0 | _aFront Cover; Next Generation Red Teaming; Copyright Page; Contents; Author Biography; Contributing Editor Biography; 1 Introduction; 2 The Typical Approach; 3 Red Team Assessment; 4 Elements for Success; Composite Attack Case Study; 5 Who Are We Up Against; 6 Things to Keep in Mind; 7 Composite Attacks; 8 Conclusion. | |
650 | 0 |
_aBusiness enterprises _xSecurity measures. |
|
650 | 0 |
_aBusiness enterprises _xSecurity measures _xEvaluation. |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xIndustrial Management. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xManagement Science. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS _xOrganizational Behavior. _2bisacsh |
|
650 | 7 |
_aBusiness enterprises _xSecurity measures. _2fast _0(OCoLC)fst00842623 |
|
655 | 4 | _aElectronic books. | |
655 | 7 |
_aElectronic books. _2lcgft |
|
776 | 0 | 8 |
_iPrint version: _aDalziel, Henry. _tNext generation red teaming. _dAmsterdam, [Netherlands] : Syngress, c2015 _h36 pages _z9780128041710 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128041710 |
999 |
_c247132 _d247132 |