Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
381Publicado 2021“…Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skillsKey Features* Learn how to solve critical networking problems using real-world examples* Configure common networking services step by step in an enterprise environment* Discover how to build infrastructure with an eye toward defense against common attacksBook DescriptionAs Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. …”
Libro electrónico -
382Publicado 2012“…Recognize vulnerabilities caused by IP network integration, as well as VoIP’s unique security requirements Discover how hackers target IP telephony networks and proactively protect against each facet of their attacks Implement a flexible, proven methodology for end-to-end Cisco IP Telephony security Use a layered (defense-in-depth) approach that builds on underlying network security design Secure CUCM, Cisco Unity/Unity Connection, CUPS, CUCM Express, and Cisco Unity Express platforms against internal and external threats Establish physical security, Layer 2 and Layer 3 security, and Cisco ASA-based perimeter security Complete coverage of Cisco IP Telephony encryption and authentication fundamentals Configure Cisco IOS Voice Gateways to help prevent toll fraud and deter attacks Secure Cisco Voice Gatekeepers and Cisco Unified Border Element (CUBE) against rogue endpoints and other attack vectors Se..…”
Libro electrónico -
383Publicado 2016“…The life of proteins starts and ends as amino acids. In addition to the primary function as protein building blocks, amino acids serve multiple other purposes to make a plant's life worth living. …”
Libro electrónico -
384Publicado 2017“…What You Will Learn Select and configure the most effective tools from Kali Linux to test network security Employ stealth to avoid detection in the network being tested Recognize when stealth attacks are being used against your network Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network—the end users In Detail This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers. …”
Libro electrónico -
385Publicado 2021Tabla de Contenidos: “…ESD Standards 1017 B.1 ESD Association 1017 B.2 International Organization of Standards 1018 B.3 Department of Defense 1018 B.4 Military Standards 1019 B.5 Airborne Standards and Lightning 1019 C Index 1021 D Wiley Series in Electrostatic Discharge (ESD) and Electrical Overstress (EOS) 1055 D.1 Additional Wiley Texts 1055 E ESD Design Rules 1057 E.1 ESD Design Rule Check (DRC) 1057 E.2 Electrostatic Discharge (ESD) Layout Versus Schematic (LVS) Verification 1058 E.3 ESD Electrical Rule Check (ERC) 1059 F Guard Ring Design Rules 1061 F.1 Latchup Design Rule Checking (DRC) and Guard Rings 1061 F.2 Latchup Electrical Rule Check (ERC) 1063 F.3 Guard Ring Resistance 1064 G EOS Design Rules and Checklist 1067 G.1 Electrical Overstress (EOS) Design Rule Checking 1067 G.2 Electrical Overstress (EOS) Layout Versus Schematic (LVS) Verification 1067 G.3 Electrical Overstress (EOS) Electrical Rule Check (ERC) 1068 H Latchup Design Rules 1069 H.1 Latchup Design Rule Checking (DRC) 1069 H.2 Latchup Electrical Rule Check (ERC) 1072 I ESD Cookbook 1077 I.1 Electrostatic Discharge (ESD) Cookbook 1077 J EOS Cookbook 1079 J.1 Electrical Overstress (EOS) Cookbook 1079 K Latchup Cookbook 1081 K.1 Latchup Design Rule Checking (DRC) 1081 K.2 Latchup Electrical Rule Check (ERC) 1083 L ESD Design and Release Check List 1087 L.1 ESD Design Release 1087 L.2 Electrostatic Discharge (ESD) Checklists 1087 M EOS Design and Release Checklist 1089 M.1 Electrical Overstress (EOS) and ESD Design Release 1089 M.2 Electrical Overstress (EOS) Design Release Process 1089 M.3 Electrical Overstress (EOS) Checklists 1090 M.4 An EOS Checklist 1091 N Latchup Design and Release Checklist 1093 N.1 Latchup Design Rule Checking (DRC) 1093 N.2 Latchup Electrical Rule Checking (ERC) 1095 N.3 Latchup Checklists 1095 N.4 A Latchup Design and Release Checklist 1096 Index 1097.…”
Libro electrónico -
386Publicado 2020“…Finally, you'll learn how to implement network and instance security, encrypt data at rest and in transit and set up data backup, replication, and recovery. By the end of this course, you'll be ready to control access to your AWS resources granularly. …”
-
387Publicado 2024“…About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Quotes Tells an end-to-end story, from introductory cyber-security foundations to advanced security tooling in Azure. - Yuri Diogenes, Microsoft Cloud Security Provides excellent coverage of key security capabilities in and around Azure, with valuable guidance for beginners and experts alike. - Prashant Dwivedi, National Informatics Centre, India The most comprehensive and up-to-date content that I have seen on Azure Security. …”
Libro electrónico -
388Publicado 2024“…About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Quotes Tells an end-to-end story, from introductory cyber-security foundations to advanced security tooling in Azure. - Yuri Diogenes, Microsoft Cloud Security Provides excellent coverage of key security capabilities in and around Azure, with valuable guidance for beginners and experts alike. - Prashant Dwivedi, National Informatics Centre, India The most comprehensive and up-to-date content that I have seen on Azure Security. …”
Grabación no musical -
389Publicado 2024“…About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Quotes Tells an end-to-end story, from introductory cyber-security foundations to advanced security tooling in Azure. - Yuri Diogenes, Microsoft Cloud Security Provides excellent coverage of key security capabilities in and around Azure, with valuable guidance for beginners and experts alike. - Prashant Dwivedi, National Informatics Centre, India The most comprehensive and up-to-date content that I have seen on Azure Security. …”
Vídeo online -
390Publicado 2018“…Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced tasks, with the latest update introducing many new packages. …”
Libro electrónico -
391Publicado 2022“…Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation. By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud. …”
Libro electrónico -
392Publicado 2019“…Furthermore, you'll learn how to apply simple Python GIS geospatial processes to a variety of problems, and work with remote sensing data. By the end of the book, you'll be able to build a generic corporate system, which can be implemented in any organization to manage customer support requests and field support personnel. …”
Libro electrónico -
393Publicado 2016“…Work through examples illustrating security methods in Node.js. Learn defenses to protect user data flowing in and out of the application. …”
Libro electrónico -
394Publicado 2020“…You'll also discover the latest security techniques that can be directly applied to scan, test, ethically hack, and secure networks and systems with Metasploit. By the end of this book, you'll have learned how to use the Metasploit 5.0 Framework to exploit real-world vulnerabilities. …”
Libro electrónico -
395Publicado 2020“…As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasks, with the latest update introducing new libraries and packages featured in the Python 3.7.4 recommended version. …”
Libro electrónico -
396Publicado 2024“…You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements. By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies. …”
Libro electrónico -
397Publicado 2023“…Finally, you'll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys. By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud. …”
Libro electrónico -
398Publicado 2020“…"Discover the next level of network defense and penetration testing with the Metasploit 5.0 framework Key Features Make your network robust and resilient with this updated edition covering the latest pentesting techniques Explore a variety of entry points to compromise a system while remaining undetected Enhance your ethical hacking skills by performing penetration tests in highly secure environments Book Description Updated for the latest version of Metasploit, this book will prepare you to face everyday cyberattacks by simulating real-world scenarios. …”
Libro electrónico -
399Publicado 2024“…The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate. By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform. …”
Libro electrónico -
400por Kleymenov, Alexey“…By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents. …”
Publicado 2019
Libro electrónico