000 03470cam a2200565Ii 4500
001 ocn918135804
003 OCoLC
005 20190328114812.0
006 m o d
007 cr cnu|||unuuu
008 150813s2015 mau o 000 0 eng d
010 _a 2017304254
040 _aN$T
_beng
_erda
_epn
_cN$T
_dEBLCP
_dN$T
_dYDXCP
_dIDEBK
_dUMI
_dUIU
_dDEBSZ
_dCDX
_dDEBBG
_dFEM
_dOCLCQ
_dMERUC
_dOCLCQ
_dWRM
_dU3W
_dD6H
_dOCLCF
_dCEF
_dOCLCQ
_dAU@
_dOCLCQ
_dWYU
_dCUY
_dLOA
_dZCU
_dICG
_dK6U
_dCOCUF
_dVT2
_dDKC
019 _a919204810
_a968058098
_a969026911
_a1066463481
_a1088983340
020 _a9780128041864
_q(electronic bk.)
020 _a0128041862
_q(electronic bk.)
020 _a0128041714
020 _a9780128041710
020 _z9780128041710
035 _a(OCoLC)918135804
_z(OCoLC)919204810
_z(OCoLC)968058098
_z(OCoLC)969026911
_z(OCoLC)1066463481
_z(OCoLC)1088983340
050 4 _aHD61.5
_b.D36 2015eb
072 7 _aBUS
_x082000
_2bisacsh
072 7 _aBUS
_x041000
_2bisacsh
072 7 _aBUS
_x042000
_2bisacsh
072 7 _aBUS
_x085000
_2bisacsh
082 0 4 _a658.4/7
_223
100 1 _aDalziel, Henry,
_eauthor.
245 1 0 _aNext generation red teaming /
_h[electronic resource]
_cHenry Dalziel ; contributing editor, Robert Wood.
264 1 _aWaltham, MA :
_bElsevier :
_bSyngress,
_c2015
264 4 _c�2015
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_2rda
588 0 _aVendor-supplied metadata.
520 _aRed Teaming is can be described as a type of wargaming. In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization's security posture is. This course is particularly suited to CISO's and CTO's that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security. Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data Demonstrates the key differences between Red Teaming and Penetration Testing Shows how to build a Red Team and how to identify different operational threat environments.
505 0 _aFront Cover; Next Generation Red Teaming; Copyright Page; Contents; Author Biography; Contributing Editor Biography; 1 Introduction; 2 The Typical Approach; 3 Red Team Assessment; 4 Elements for Success; Composite Attack Case Study; 5 Who Are We Up Against; 6 Things to Keep in Mind; 7 Composite Attacks; 8 Conclusion.
650 0 _aBusiness enterprises
_xSecurity measures.
650 0 _aBusiness enterprises
_xSecurity measures
_xEvaluation.
650 7 _aBUSINESS & ECONOMICS
_xIndustrial Management.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xManagement Science.
_2bisacsh
650 7 _aBUSINESS & ECONOMICS
_xOrganizational Behavior.
_2bisacsh
650 7 _aBusiness enterprises
_xSecurity measures.
_2fast
_0(OCoLC)fst00842623
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
776 0 8 _iPrint version:
_aDalziel, Henry.
_tNext generation red teaming.
_dAmsterdam, [Netherlands] : Syngress, c2015
_h36 pages
_z9780128041710
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128041710
999 _c247132
_d247132