Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 457
- Law 453
- History 438
- Economic conditions 352
- Droit 324
- Economic history 301
- Història 298
- Law reviews 280
- Politics and government 231
- Management 223
- Law and legislation 201
- Education 189
- Social conditions 189
- Agronomy 177
- Agronomía 174
- Biblia 162
- Crítica e interpretación 157
- Agronomia 148
- Histoire 142
- Development 140
- Filosofía 135
- Study and teaching 135
- Research 133
- Música 130
- Animal science 118
- Revues de droit 116
- Artificial intelligence 113
- Economics 111
- Bíblia 109
- Geología 109
-
21441
-
21442Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
21443por Almeida, Theodoro de, 1722-1804Accés lliure
Publicado 1792
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Accés Lliure
Libro -
21444
-
21445
-
21446
-
21447Publicado 2022Libro electrónico
-
21448
-
21449
-
21450Publicado 2012Tabla de Contenidos: “…Part 3 Current and Continuing Issues In Public Relations -- Chapter 27 Sustainability for Business: A New Global Challenge -- Chapter 28 Environmental Communication: A Matter of Relationships, Trust and Planning -- Chapter 29 Relationship Transformation: Shifting Media Boundaries -- Chapter 30 Reputation Management: Building and Maintaining Reputation through Communications -- Part 4 Industries and Organizations -- Chapter 31 The Automotive Industry: A Race to the Future -- Chapter 32 The Aviation Industry and Civil Aviation: Flying High for Business -- Chapter 33 The Insurance Industry: Reputation Management in Good Hands -- Chapter 34 The Hospitality Industry: Communicating with Our Guests -- Chapter 35 Sports Marketing: Champion Communicators -- Chapter 36 Effective Technology Communications: Innovation that Matters -- Chapter 37 The Entertainment Business: Lights, Cameras, Promotion -- Chapter 38 Health Care: Harmonizing the Healthcare Message -- Chapter 39 The Global Restaurant Industry: Communications Strategies -- Chapter 40 The Retail Industry: Not Your Father's Drugstore -- Chapter 41 The Pharmaceutical Industry: From Promotion to Constituency Relations -- Chapter 42 Consulting, Technology Services and Outsourcing: An Integrated Approach to Marketing and Communications -- Chapter 43 The Financial and Banking Industry: Investing in Our Stakeholders -- Chapter 44 The Food and Beverage Industry: Catering to People's Palates -- Chapter 45 The Oil and Natural Gas Industry: Communicating in a Challenging Environment -- Chapter 46 Internal and External Communications in a Law Firm -- Part 5 Practical Skills And Knowledge -- Chapter 47 Changing Your Own Behavior to Enhance Behavioral Results -- Chapter 48 Creativity: Powering Integrated Marketing Communications Ideas -- Chapter 49 Writing for the Ear: The Challenge of Effective Speechwriting…”
Libro electrónico -
21451por Mabillon, Jean, 1632-1707
Publicado 1779Biblioteca Universitat Ramon Llull (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada)Accés lliure
Accés lliure
Libro -
21452
-
21453
-
21454Libro electrónico
-
21455Publicado 2023Tabla de Contenidos: “…Exercise 37: Anchoring Heuristic -- Exercise 38: Confirmation Bias -- Note -- Chapter 12 Getting the Client to Take Action -- Exercise 39: Motivational Interviewing Exercise -- Values Versus Behaviors -- Exercise 40: Well-Done Exercise -- Exercise 41: Professional Relationship Forensic Audit -- Nine Evidence-Based Techniques for Overcoming Client Resistance to Financial Advice -- Exercise 42: Simple Reflection -- Exercise 43: Complex Reflection -- Exercise 44: Amplified Reflection -- Exercise 45: Double-Sided Reflection -- Exercise 46: Shifting the Focus from What's Not Working to What Is Working -- Exercise 47: Reframing -- Exercise 48: Agreement with a Twist -- Exercise 49: Emphasizing Self-Determination -- Exercise 50: Arguing Against Change -- Notes -- Going Forward -- In Closing -- Index -- EULA…”
Libro electrónico -
21456
-
21457por Sobrequés i Callicó, Jaume, 1943-
Publicado 2016Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
21458
-
21459
-
21460