°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
»ï¼ºÄ«µå 6% (27,160¿ø)
(»ï¼ºÄ«µå 6% û±¸ÇÒÀÎ)
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (27,450¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (20,230¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄũīµå 20% (23,120¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity (Paperback) [Paperback]

ÇØ¿ÜÁÖ¹®¿ø¼­ ¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

°øÀ¯Çϱâ
Á¤°¡

36,500¿ø

  • 28,890¿ø (21%ÇÒÀÎ)

    1,450P (5%Àû¸³)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • I-Point Àû¸³Àº Ãâ°í¿Ï·á ÈÄ 14ÀÏ À̳» ¸¶ÀÌÆäÀÌÁö¿¡¼­ Àû¸³¹Þ±âÇÑ °æ¿ì¸¸ Àû¸³µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡

¡Ø Äڷγª19·Î ÀÎÇÑ Ç×°øÆí °¨¼Ò·Î ÇØ¿ÜÁÖ¹®¿ø¼­ÀÇ ¹è¼ÛÀÌ Æò¼Òº¸´Ù ÃÖ´ë ÀÏÁÖÀÏ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ÁÖ¹®¿¡ Âü°í ºÎʵ右´Ï ´õº¸±â

ƯÀÌ»çÇ×

¡Ø Äڷγª19·Î ÀÎÇÑ Ç×°øÆí °¨¼Ò·Î ÇØ¿ÜÁÖ¹®¿ø¼­ÀÇ ¹è¼ÛÀÌ Æò¼Òº¸´Ù ÃÖ´ë ÀÏÁÖÀÏ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ÁÖ¹®¿¡ Âü°í ºÎʵ右´Ï´Ù. °¨»çÇÕ´Ï´Ù.
¡Ø ¹Ì±¹ ³» Äڷγª19 È®»êÀ¸·Î ƯÁ¤ »óǰ¿¡ ÇÑÇØ Ãß°¡ 3ÁÖ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ¾çÇØ ºÎʵ右´Ï´Ù.

ÇØ¿ÜÁÖ¹®¿ø¼­/Àϼ­´Â °í°´ÀÇ ¿äû¿¡ ÀÇÇØ ÁÖ¹®ÇÏ´Â '°³ÀοÀ´õ' »óǰÀ¸·Î, ´Ü¼ø º¯½É/Âø¿À·Î ÀÎÇÑ Ãë¼Ò, ¹Ýǰ, ±³È¯ÀÌ ºÒ°¡ÇÕ´Ï´Ù.
´Ü, ǰÀý/ÀýÆÇÀÎ °æ¿ì¿Í °áÁ¦¿Ï·á ´çÀÏ 24½Ã±îÁö´Â ¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹Ýǰ/±³È¯/ȯºÒ ¿¡¼­ Ãë¼Ò½ÅûÀÌ °¡´ÉÇÕ´Ï´Ù.
ºÎµæÀÌÇÑ »çÁ¤À¸·Î ÀÎÅÍÆÄÅ© Á÷¸ÅÀÔ ÇØ¿ÜÁÖ¹®¾ç¼­/Àϼ­¸¦ °í°´º¯½É »çÀ¯·Î ¹Ýǰ ½ÅûÀ» ÇÒ °æ¿ì '¼öÀÔÁ¦¹Ýºñ¿ë'À» ȯºÒ±Ý¾×¿¡¼­ Â÷°¨Çϰí ȯºÒÇÕ´Ï´Ù.
¶ÇÇÑ, ÇØ¿Ü °Å·¡Ã³ »çÁ¤¿¡ ÀÇÇÏ¿© ÁÖ¹®»óǰÀÌ Ç°ÀýÀ̳ª ÀÔ°í Áö¿¬µÉ ¼öµµ ÀÖ´Ù´Â Á¡µµ ¾Ë·Á µå¸³´Ï´Ù.
¡Ø ¼öÀÔÁ¦¹Ýºñ¿ëÀ̶õ ÆÇ¸Å°¡ÀÇ 20% (¹Ýǰ/Ãë¼Ò ¼ö¼ö·á´Â, ¼öÀÔÁ¦¹Ýºñ¿ë(¼ö¼Ûºñ¿ë, °ü¼¼»çºñ, º¸¼¼Ã¢°í·á, ³»·ú¿î¼Ûºñ, Åë°üºñ µî)°ú Àç°í¸®½ºÅ©(¹ÌÆÇ¸Å ¸®½ºÅ©, ȯÂ÷¼Õ)¿¡ µû¸¥ ºñ¿ëÀ» Æ÷ÇÔÇϸç, ÆÇ¸Å°¡¿¡ »ó°ü¾øÀÌ Àϰý 20%°¡ Àû¿ëµË´Ï´Ù.)

Ã¥¼Ò°³

Blue Team defensive advice from the biggest names in cybersecurity

The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world¡¯s leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You¡¯ll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn¡¯t in the real world of cybersecurity.

Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises.

Discover what it takes to get started building blue team skills
Learn how you can defend against physical and technical penetration testing
Understand the techniques that advanced red teamers use against high-value targets
Identify the most important tools to master as a blue teamer
Explore ways to harden systems against red team attacks
Stand out from the competition as you work to advance your cybersecurity career
Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

ÀúÀÚ¼Ò°³

»ý³â¿ùÀÏ -
Ãâ»ýÁö -
Ãâ°£µµ¼­ 0Á¾
ÆÇ¸Å¼ö 0±Ç

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

»ý³â¿ùÀÏ -
Ãâ»ýÁö -
Ãâ°£µµ¼­ 0Á¾
ÆÇ¸Å¼ö 0±Ç

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    ±¸¸Å ÈÄ ¸®ºä ÀÛ¼º ½Ã, ºÏÇǴϾð Áö¼ö ÃÖ´ë 600Á¡

    ¸®ºä¾²±â

    ±â´ëÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/200ÀÚ
    µî·ÏÇϱâ

    ±â´ëÆò

    0.0

    ±³È¯/ȯºÒ

    ±³È¯/ȯºÒ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹Ýǰ/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½ÅûÇÔ, 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¶Ç´Â °í°´¼¾ÅÍ(1577-2555) ÀÌ¿ë °¡´É

    ±³È¯/ȯºÒ °¡´É ±â°£

    °í°´º¯½ÉÀº Ãâ°í¿Ï·á ´ÙÀ½³¯ºÎÅÍ 14ÀÏ ±îÁö¸¸ ±³È¯/ȯºÒÀÌ °¡´ÉÇÔ

    ±³È¯/ȯºÒ ºñ¿ë

    °í°´º¯½É ¶Ç´Â ±¸¸ÅÂø¿ÀÀÇ °æ¿ì¿¡¸¸ 2,500¿ø Åùèºñ¸¦ °í°´´ÔÀÌ ºÎ´ãÇÔ

    ±³È¯/ȯºÒ ºÒ°¡»çÀ¯

    ¹ÝǰÁ¢¼ö ¾øÀÌ ¹Ý¼ÛÇϰųª, ¿ìÆíÀ¸·Î º¸³¾ °æ¿ì »óǰ È®ÀÎÀÌ ¾î·Á¿ö ȯºÒÀÌ ºÒ°¡ÇÒ ¼ö ÀÖÀ½
    ¹è¼ÛµÈ »óǰÀÇ ºÐ½Ç, »óǰÆ÷ÀåÀÌ ÈÑ¼ÕµÈ °æ¿ì, ºñ´Ò·¦ÇÎµÈ »óǰÀÇ ºñ´Ò °³ºÀ½Ã ±³È¯/¹ÝǰÀÌ ºÒ°¡´ÉÇÔ

    ¼ÒºñÀÚ ÇÇÇØº¸»ó

    ¼ÒºñÀÚ ÇÇÇØº¸»óÀÇ ºÐÀïó¸® µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á±âÁØ(°øÁ¤°Å·¡À§¿øÈ¸ °í½Ã)¿¡ µû¶ó ºñÇØ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½
    ±³È¯/¹Ýǰ/º¸ÁõÁ¶°Ç ¹× ǰÁúº¸Áõ ±âÁØÀº ¼ÒºñÀڱ⺻¹ý¿¡ µû¸¥ ¼ÒºñÀÚ ºÐÀï ÇØ°á ±âÁØ¿¡ µû¶ó ÇÇÇØ¸¦ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½

    ±âŸ

    µµ¸Å»ó ¹× Á¦ÀÛ»ç »çÁ¤¿¡ µû¶ó ǰÀý/ÀýÆÇ µîÀÇ »çÀ¯·Î ÁÖ¹®ÀÌ Ãë¼ÒµÉ ¼ö ÀÖÀ½(ÀÌ °æ¿ì ÀÎÅÍÆÄÅ©µµ¼­¿¡¼­ °í°´´Ô²² º°µµ·Î ¿¬¶ôÇÏ¿© °íÁöÇÔ)

    ¹è¼Û¾È³»

    • ÀÎÅÍÆÄÅ© µµ¼­ »óǰÀº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óǰÀ» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óǰÀ» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óǰÀ» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÏ¿©, ÀÎÅÍÆÄÅ© ¿Ü Ÿ¾÷ü ¹è¼Û»óǰÀÎ °æ¿ì ¹ß¼ÛµÇÁö ¾ÊÀ» ¼ö ÀÖ½À´Ï´Ù.

    • ¹è¼Ûºñ

    µµ¼­(Áß°íµµ¼­ Æ÷ÇÔ) ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    À½¹Ý/DVD/ÀâÁö/¸¸È­ ±¸¸Å

    2,000¿ø (2¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    µµ¼­¿Í À½¹Ý/DVD/ÀâÁö/¸¸È­/
    Áß°íÁ÷¹è¼Û»óǰÀ» ÇÔ²² ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    ¾÷üÁ÷Á¢¹è¼Û»óǰ ±¸¸Å

    ¾÷üº° »óÀÌÇÑ ¹è¼Ûºñ Àû¿ë