Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Cybersecurity Blue Team Strategies: (Record no. 34412)

MARC details
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781801072472
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Author Mark SEH-C
100 ## - MAIN ENTRY--AUTHOR
Author Name Sehgal, Kunal
245 ## - TITLE STATEMENT
Title Cybersecurity Blue Team Strategies:
Sub-Title Uncover the secrets of blue teams to combat cyber threats in your organization
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of Publication Bermingham UK,.
Name of publisher, distributor, etc. Packt Publishing
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Pages 185p,
500 ## - GENERAL NOTE
General note We've reached a point where all organisational data is connected through some network. With advancements and connectivity come ever-evolving cyber threats, compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organisation from scratch.<br/><br/>Through the course of this book, you’ll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization’s cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid, this book will provide an in-depth understanding of how cyber attackers can penetrate your systems and gain access to sensitive information. Beginning with a brief overview of the importance of a blue team, you’ll learn important techniques and best practices a cybersecurity operator or a blue team practitioner should be aware of. By understanding tools, processes, and operations, you’ll be equipped with evolving solutions and strategies to overcome cybersecurity challenges and successfully manage cyber threats to avoid adversaries.<br/><br/>By the end of this book, you'll have enough exposure to blue team operations and be able to successfully set up a blue team in your organization.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note include Index.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Holdings
Withdrawn status Not for loan Collection code Permanent Location Current Location Shelving Location Date acquired Source of acquisition Price Full Call Number Accession No./Barcode Date last seen Koha item type
    Computer Science Air University Kharian Campus Library Air University Kharian Campus Library Computer Science 02/17/2025 Ali Book Service 1182.00 005.8 SEH-C AUKHP0363 02/25/2025 Book
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631