Catalog - Resource Center for Learning and Research

Back to Site - CRAI Library
Normal view MARC view ISBD view

Cybersecurity : the beginner´s guide / Erdal Ozkaya

By: Ozkaya, Erdal [autor].
Contributor(s): Boricha, Vijin [editor comisionado] | Bhavsar, Heramb [editor de adquisiciones] | Bhattacharya, Shubham [desarrollador de contenido] | Thore, Deepti [desarrollador de contenido] | Almeida, Rudolph [editor técnico] | Editing, Safis [editor y corrector de pruebas] | Ansari, Nusaiba [coordinador del proyecto] | Daruwale Soni, Tejal [indexador] | Chirayil, Jisha [ilustrador] | Mohite, Nilesh [coordinador de producción].
Material type: TextTextPublisher: Birmingham : Pact Publising, 2019Description: ix, 377 páginas : fotos b/n, gráficas ; 23 x 18 cm.ISBN: 9781789616194.Subject(s): CiberseguridadDDC classification: 005.8 O977c Online resources: Click here to access online
Contents:
Preface | Chapter 1: Importance of Cybersecurity | Chapter 2: Security Evolution - From Legacy to Advanced, to ML and AI | Chapter 3: Learning Cybersecurity Technololgies | Chapter 4: Skills We Need for a Cybersecurity Career | Chapter 5: Attacker Mindset | Chapter 6: Understanding Reactive, Proactive, and Operational Security | Chapter 7: Nteworking, Mentoring, and Shadowing Mentoring | Chapter 8: Cybersecurity Labs | Chapter 9: Knowledge Check and Certifications | Chapter 10: Security Intelligence Resources | Chapter 11: Expert Opinios on Getting Startes with Cybersecurity | Chapter 12: How to Get Hired in Cybersecurity, Redardless of Your Background | Other Books You May Enjoy | Index
Item type Current location Collection Call number Copy number Status Date due Barcode
Libro (general) Biblioteca Central UNIBE
General 005.8 O977c (Browse shelf) Ej.1 Available 240418

Información del autor y críticos al inicio de la obra, comentario de la misma en la contraportada. Al final de cada capítulo hay un resumen y lecturas recomendadas

Preface |
Chapter 1: Importance of Cybersecurity |
Chapter 2: Security Evolution - From Legacy to Advanced, to ML and AI |
Chapter 3: Learning Cybersecurity Technololgies |
Chapter 4: Skills We Need for a Cybersecurity Career |
Chapter 5: Attacker Mindset |
Chapter 6: Understanding Reactive, Proactive, and Operational Security |
Chapter 7: Nteworking, Mentoring, and Shadowing Mentoring |
Chapter 8: Cybersecurity Labs |
Chapter 9: Knowledge Check and Certifications |
Chapter 10: Security Intelligence Resources |
Chapter 11: Expert Opinios on Getting Startes with Cybersecurity |
Chapter 12: How to Get Hired in Cybersecurity, Redardless of Your Background |
Other Books You May Enjoy |
Index