Deliver to Tunisia
IFor best experience Get the App
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
H**R
The value
Book has given more in-depth value to understand attack and Defense within strategies compared to University lectures.Definetely can be considered as investment!
J**C
This book is an easy read on a complex set of topics.
Once I picked the book up, I could barely put it down. It really is a highly readable cyber reference for beginners and intermediate level technology professionals. I find it to be an excellent introduction to several aspects of cybersecurity. The authors provide many helpful diagrams and explain what is going on in simple structured terms. I particularly enjoyed the red/blue contrasts for every use case. Its usually quite easy to find out about defensive postures, but to see so many attack strategies laid out in such a systematic way is quite refreshing.
N**K
Please consider consolidating labor union laws and bi lines.
Thanks!
A**J
Overall, a very good overview.
Overall, a very good overview in spite of some typos. I will read it again and I recommend it to anyone looking for a cyber security red team, blue team overview. Well done.
C**D
Recommended for every practicing cyber professional
Finally a cyber security book worth reading! This book is packed with excellent advice and a deep appreciation for the depth of the problems facing the practicing cyber security professional. Not only is the Red Team/Blue Team focus well done, but there is very good discussion of the Incident Response process per se.
R**C
Amzing book!
A must buy for anyone interesting in understanding how cyber attacks are completed. This book touches on many important topics that will just wet your appetite for future topics. It does not go into too much detail making it an relatively easy read. Highly recommended!
S**Y
Isn't really that informative. Mostly reads like news article clippings
If you don't already stay up to date on current cyber trends, then this book might save you some googling. This book does not contain any advice, does not teach you how to do anything, and does not compare or contrast available strategies. It seems to mostly regurgitate news clippings about what "some people do". In my opinion this is not important enough to spend money or time on reading.
T**Y
Very informative
Good for enhancing your knowledge if you’re in the security industry.
C**E
Very rich content, the security community thanks
great content, lots of scenarios and everyday situations that we can use. Thanks Yuri and ErdalCommunnity thanks!Sorry per my writting english, I'm learning english
S**E
Excellent book
Excellent book to read about security
U**A
Indispensável para ITPros e ISPros
Livro de cabeceira para profissionais de segurança da informação. Traz conceitos e estratégias que vão ajudar não só no dia a dia, mas, pra quem estuda pra provas de certificação, além de agregar profundo conhecimento.
E**P
Good read
Overall, the book is an interesting read with information relevant to both sides of the cybersecurity problem – attack and defence. Attack Strategies are described in the first few chapters; different phases are explained detailing how some attacks can be performed, tools to use, etc. The second half of the book includes suggestions on how to defend computer systems from cyber-attacks, etc. I found that the strategies are explained at a high-level, so it is easy to understand he cybersecurity problem. I don’t think that after reading this book one – as claimed, will “gain hands-on experience of using new Red Team techniques with powerful tools such as Python and PowerShell…”. Some example codes are included but they are of no benefit unless you are a cyber-security expert with exposure to such tools.The book includes references - download sources & code examples, to several publicly available tools which can be used for hacking or to enhance an organization security … depending if you wear a black or white hat. NB - some software tools that are no longer available. The book was published in 2018 and an update would be much appreciated.After reading this book, I found quite alarming the number of freely available software tools that can be used for hacking purpose, so I’m not longer surprised that there are so many cyberattacks. But what I found most perturbing is that there are large companies and organizations with immense resources to set up a Security frame, Security Policies, Red Teams, Blue Teams, etc, etc. to protect our personal data BUT they are still hack-able. For example, Marriott, Equifax, Quora, LinkedIn, Google+, Yahoo, Citrix, FBINAA, etc. just to mention a few.And now with the growing of state-sponsored hacking I wonder if Security is just an illusion
A**R
No one size fits all
A big thank you to the authors of this book. After having graduated from Comouter Science, there's till much to learn and keep on top of what's happening in the IT world.This book is very useful tool to explore detail by detail, so it deserves not only one read but as much as we need.Very greatful.
Trustpilot
2 months ago
3 days ago