MARC 닫기
04921cam a2200481Mu 4500
000000534806
20210114162107
m d
cr cnu---unuuu
190615s2019 xx o 000 0 eng d
▼a 1789806933
▼a 9781789806939
▼q (electronic bk.)
▼a 2145643
▼b (N$T)
▼a (OCoLC)1103218694
▼a EBLCP
▼b eng
▼c EBLCP
▼d N$T
▼d 248023
▼a QA76.9.A25
▼a COM
▼x 032000
▼2 bisacsh
▼a COM
▼x 046000
▼2 bisacsh
▼a 005.8
▼2 23
▼a Ozkaya, Erdal.
▼a Cybersecurity: the beginner's guide
▼h [electronic resource]:
▼b A Comprehensive Guide to Getting Started in Cybersecurity.
▼a Birmingham:
▼b Packt Publishing, Limited,
▼c 2019.
▼a 1 online resource (384 p.).
▼a Description based upon print version of record.
▼a Social characteristics of hackers
▼a Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems
▼a Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale
▼a Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned ?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts
▼a Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration
▼a System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant
▼a Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
▼a Master record variable field(s) change: 050, 072, 082, 650
▼a Computer security.
▼a COMPUTERS / Information Technology
▼2 bisacsh
▼a COMPUTERS / Operating Systems / General
▼2 bisacsh
▼a Electronic books.
▼i Print version:
▼a Ozkaya, Erdal
▼t Cybersecurity: the Beginner's Guide.
▼d Birmingham : Packt Publishing, Limited,c2019,
▼z 9781789616194
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2145643
▼a EBL - Ebook Library
▼b EBLB
▼n EBL5781046
▼a EBSCOhost
▼b EBSC
▼n 2145643
▼a 강리원
▼a eBook
▼a 92
▼b N$T
| 자료유형 : | eBook |
|---|---|
| ISBN : | 1789806933 |
| ISBN : | 9781789806939 |
| 개인저자 : | Ozkaya, Erdal. |
| 서명/저자사항 : | Cybersecurity: the beginner's guide [electronic resource]: A Comprehensive Guide to Getting Started in Cybersecurity. |
| 발행사항 : | Birmingham: Packt Publishing, Limited, 2019. |
| 형태사항 : | 1 online resource (384 p.). |
| 일반주기 : | Description based upon print version of record. |
| 일반주기 : | Social characteristics of hackers |
| 내용주기 : | Cover; Title Page; Copyright and Credits; Acknowledment; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Importance of Cybersecurity; The history of data breaches; Scenarios for security; Understanding the attack surface; The threat landscape; The importance of securing the network and applications; The history of breaches; 1984 -- The TRW data breach; 1990s -- Beginning of computer viruses and worms; The years 2000-2010; How security helps to build trust; Summary; Chapter 2: Security Evolution -- From Legacy to Advanced, to ML and AI; Legacy cybersecurity systems |
| 내용주기 : | Signature-based security systemsNetwork cyber attacks; Network security tools; Transformations in cybersecurity; Layered security; New security threats; Responses to the new threats; Advancements in security technology to security 2.0; Anomaly-based security systems; How ML and AI will play a larger role in cybersecurity; Summary; Further reading; Chapter 3: Learning Cybersecurity Technologies; Mobile security; Loss or theft; Software-related security issues; Advanced data security; Cloud security; Modern day regulations; Incidence response and forensics; Enterprise security at scale |
| 내용주기 : | Penetration testingTruSec training; CQURE Academy; Training with Troy Hunt; Have I Been Pwned ?; DevSecOps; IoT security; User behavior analytics (UBA); Endpoint detection and response (EDR); Summary; Further reading; Chapter 4: Skills We Need for a Cybersecurity Career; General cybersecurity roles; Penetration testers and vulnerability testers; Cybersecurity consultants; Cybersecurity managers; Cybersecurity analysts; Cybersecurity engineers; Chief Information Security Officers (CISOs); Chief Security Officers (CSOs); Computer system administrators; Cryptographers; Computer forensic experts |
| 내용주기 : | Network security engineersInformation assurance technicians; Data security analysts; IT security compliance analysts; System security specialists; Skills to acquire in cybersecurity; Foundation skills; Risk management; Networking; Situational awareness; Toolkits; Security analyst skills; Threat assessment; Vulnerability assessment; Log collection and analysis; Active analysis; Incidence response; Disaster recovery; Forensics; Penetration testing skills; Intelligence gathering; Incidence reporting; Restraint; Security architecture skills; Identity and access management; Network configuration |
| 내용주기 : | System hardeningChoosing skills to pick up based on current professional experience and skills; Ethical hacking skills; Application security skills; Cloud security skills; DevSecOps skills; Threat and vulnerability assessment skills; Information security management skills; Cybersecurity litigation support skills; Regulatory compliance and auditing skills; Summary; Further reading; Chapter 5: Attacker Mindset; The category of hackers; The traits of hackers; They are patient; They are determined; They are insensitive; They are risk-takers; They are careful; They are deviant |
| 요약 : | Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career. |
| 일반주제명 : | Computer security. -- |
| 일반주제명 : | COMPUTERS / Information Technology -- |
| 일반주제명 : | COMPUTERS / Operating Systems / General -- |
| 기타형태 저록 : | Print version: Ozkaya, Erdal Cybersecurity: the Beginner's Guide. Birmingham : Packt Publishing, Limited,c2019, 9781789616194 |
| 언어 | 영어 |
| URL : |
|---|
서평쓰기