Learning Resource and Development

Cybersecurity blue team strategies : (Record no. 30445)

MARC details
000 -LEADER
fixed length control field 04304nam a2200325 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250909164349.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250909s2023 -uk 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781801072472
040 ## - CATALOGING SOURCE
Original cataloging agency CSPC
Language of cataloging eng
Transcribing agency CSPC
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number .S44 2023
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number Se41c
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sehgal, Kunal,
Relator term author.
245 10 - TITLE STATEMENT
Title Cybersecurity blue team strategies :
Remainder of title uncover the secrets of blue teams to combat cyber threats in your organization /
Statement of responsibility, etc. Kunal Sehgal and Nikolaos Thymianis.
250 ## - EDITION STATEMENT
Edition statement 1st edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, UK :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 191 pages ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part 1: Establishing the blue -- Establishing a defense program -- Managing a defense security team -- Risk assessment -- Blue team operations -- Governance, compliance, regulations, and best practices -- Part 2: Controlling the fray -- Preventive controls -- Detective controls -- Cyber threat intelligence -- Incident response and recovery -- Prioritizing and implementing a blue team strategy -- Part 3: Ask the experts -- Expert insights.
520 ## - SUMMARY, ETC.
Summary, etc. "<br/>Build a blue team for efficient cyber threat management in your organization Key Features Explore blue team operations and understand how to detect, prevent, and respond to threatsDive deep into the intricacies of risk assessment and threat managementLearn about governance, compliance, regulations, and other best practices for blue team implementation Book Description We've reached a point where all organizational data is connected through some network. With advancements and connectivity comes ever-evolving cyber threats - compromising sensitive data and access to vulnerable systems. Cybersecurity Blue Team Strategies is a comprehensive guide that will help you extend your cybersecurity knowledge and teach you to implement blue teams in your organization from scratch. Through the course of this book, you’ll learn defensive cybersecurity measures while thinking from an attacker's perspective. With this book, you'll be able to test and assess the effectiveness of your organization’s cybersecurity posture. No matter the medium your organization has chosen- cloud, on-premises, or hybrid, this book will provide an in-depth understanding of how cyber attackers can penetrate your systems and gain access to sensitive information. Beginning with a brief overview of the importance of a blue team, you’ll learn important techniques and best practices a cybersecurity operator or a blue team practitioner should be aware of. By understanding tools, processes, and operations, you’ll be equipped with evolving solutions and strategies to overcome cybersecurity challenges and successfully manage cyber threats to avoid adversaries. By the end of this book, you'll have enough exposure to blue team operations and be able to successfully set up a blue team in your organization. What you will learn Understand blue team operations and its role in safeguarding businessesExplore everyday blue team functions and tools used by themBecome acquainted with risk assessment and management from a blue team perspectiveDiscover the making of effective defense strategies and their operationsFind out what makes a good governance programBecome familiar with preventive and detective controls for minimizing risk Who this book is for This book is for cybersecurity professionals involved in defending an organization’s systems and assets against attacks. Penetration testers, cybersecurity analysts, security leaders, security strategists, and blue team members will find this book helpful. Chief Information Security Officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. To get the most out of this book, basic knowledge of IT security is recommended."
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Thymianis, Nikolaos,
Relator term author.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Classification part 005.8
Item part Se41c
Call number prefix GRD
Call number suffix 2023
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/09/2025   GRD 005.8 Se41c 2023 030228 09/09/2025 1-2 09/09/2025 Books
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/09/2025   GRD 005.8 Se41c 2023 030229 09/09/2025 2-2 09/09/2025 Books