Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
761Publicado 2017Tabla de Contenidos: “…-- Sprint Planning -- Sprint cycle -- Daily Scrum meeting -- Monitoring Sprint progress -- Sprint Review -- Sprint Retrospective -- Continuous Integration -- Agile runs on CI -- Types of projects that benefit from CI -- Elements of CI -- Version control system -- Branching strategy -- GitFlow branching model -- CI tool -- Self-triggered builds -- Code coverage -- Code coverage tools -- Static code analysis -- Automated testing -- Binary repository tools -- Automated packaging -- Benefits of using CI -- Freedom from long integrations -- Metrics -- Catching issues faster -- Rapid development -- Spend more time adding features -- Summary -- Chapter 2: Installing Jenkins -- Running Jenkins inside a servlet container -- Prerequisites -- Installing Java -- Installing Apache Tomcat -- Enabling the firewall and port 8080 -- Configuring the Apache Tomcat server -- Installing Jenkins on the Apache Tomcat server -- Installing Jenkins alone on an Apache Tomcat server -- Setting up the Jenkins home path -- Installing a standalone Jenkins server on Windows -- Prerequisites -- Installing Java -- Installing the latest stable version of Jenkins…”
Libro electrónico -
762Publicado 2018Tabla de Contenidos: “…Using a Pilot Light architecture for DR -- Using a warm standby architecture for DR -- Using a Multi-Site architecture for DR -- Testing disaster recovery strategy -- Setting up high availability -- AWS high availability architecture -- HA support for Elastic Load Balancer -- HA support for the Relational Database Service -- Summary -- Chapter 6: Designing for and Implementing Security -- Defining security objectives -- Understanding the security responsibilities -- Best practices in implementing AWS security -- Security considerations while using CloudFront -- CloudFront and ACM integration -- Understanding access control options -- Web Application Firewall -- Securing the application -- Implementing Identity Lifecycle Management -- Tracking AWS API activity using CloudTrail -- Logging for security analysis -- Using third-party security solutions -- Reviewing and auditing security configuration -- Setting up security -- Using AWS IAM to secure an infrastructure -- Understanding IAM roles -- Using the AWS Key Management Service -- Creating KMS keys -- Using the KMS key -- Application security -- Implementing transport security -- Generating self-signed certificates -- Configuring ELB for SSL -- Securing data at rest -- Securing data on S3 -- Using the S3 console for server-side encryption -- Securing data on RDS -- Summary -- Chapter 7: Deploying to Production and Going Live -- Managing infrastructure, deployments, and support at scale -- Creating and managing AWS environments using CloudFormation -- Creating CloudFormation templates -- Building a DevOps pipeline with CloudFormation -- Updating stacks -- Extending CloudFormation -- Using CloudWatch for monitoring -- Using AWS solutions for backup and archiving -- Planning for production go-live activities -- Setting up for production -- AWS production deployment architecture -- VPC subnets…”
Libro electrónico -
763Publicado 2018“…Explore the latest features of Unity 2018 to create immersive VR projects for Oculus Rift, HTC Vive, Daydream and Gear VR About This Book A project-based guide to teach you how to develop immersive and fun VR applications using Unity 3D Build experiences with interactable objects, physics, UI, animations, C# scripting, and other Unity features Explore the world of VR by building experiences such as diorama, first-person characters, 360-degree projections, social VR, audio fireball game, and VR storytelling Who This Book Is For If you're a non-programmer unfamiliar with 3D computer graphics, or experienced in both but new to virtual reality, and are interested in building your own VR games or applications, then this book is for you. …”
Libro electrónico -
764Publicado 2004Tabla de Contenidos: “…CSM advanced features implementation -- 4.1 Building a Linux repository for pSeries -- 4.1.1 Setting up the network installation server -- 4.1.2 Red Hat repository -- 4.1.3 SUSE LINUX SLES8 repository -- 4.1.4 SUSE LINUX SLES9 repository -- 4.1.5 Creating the autoinstallation files -- 4.1.6 Install the CSM client on Linux -- 4.2 Install Linux using the AIX NIM server -- 4.2.1 Switch the netboot method from BOOTP to DHCP -- 4.2.2 Prepare AIX 5L V5.x NIM machine definitions -- 4.2.3 Activating NIM clients to create entries in /etc/bootptab -- 4.2.4 Converting BOOTP information to DHCP syntax -- 4.2.5 Deallocate NIM clients to remove entries from /etc/bootptab -- 4.2.6 Deactivate BOOTP service from inetd -- 4.2.7 Configure and activate DHCP -- 4.2.8 Booting Linux on pSeries -- 4.3 CSM performance, scalability, and challenges -- 4.3.1 Firewall -- 4.3.2 WAN network -- Chapter 5. CSM migration scenario -- 5.1 General planning for migrations -- 5.1.1 Where we want to go -- 5.1.2 Where we come from -- 5.1.3 Gather prerequisites information -- 5.1.4 Checking for latest updates available -- 5.1.5 Planning for recovery -- 5.2 Migrate CSM on the management server -- 5.2.1 Get the necessary software -- 5.2.2 Check for prerequisites on client nodes and HMCs -- 5.2.3 Back up the management server -- 5.2.4 Commit previous installed updates -- 5.2.5 Update and migrate the software -- 5.2.6 Update the open source software packages -- 5.2.7 Reboot the management server -- 5.2.8 Accept the terms and conditions of the CSM license agreement -- 5.2.9 Copy updated CSM files into /csminstall -- 5.2.10 Verify the installation -- 5.2.11 Perform a backup of the migrated system -- 5.3 Migrate CSM on AIX client nodes -- 5.3.1 Check for application software prerequisites -- 5.3.2 Back up the client nodes -- 5.3.3 Commit previously installed updates…”
Libro electrónico -
765Publicado 2023Tabla de Contenidos: “…Electronics Recycling -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Networking and Scripting -- Given a Scenario, Configure Servers to Use Network Infrastructure Services -- IP Configuration -- Virtual Local Area Network (VLAN) -- Default Gateways -- Name Resolution -- Addressing Protocols -- Firewall -- Static vs. Dynamic -- MAC Addresses -- Summarize Scripting Basics for Server Administration -- Script Types -- Environment Variables -- Comment Syntax -- Basic Script Constructs -- Basic Data Types -- Common Server Administration Scripting Tasks -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Disaster Recovery -- Explain the Importance of Backups and Restores -- Backup Methods -- Backup Frequency -- Media Rotation -- Backup Media Types -- File-Level vs. …”
Libro electrónico -
766Publicado 2017Tabla de Contenidos: “…How SCVMM Simplifies Networking with Hyper-V -- SCVMM Networking Architecture -- Deploying Networking with SCVMM 2016 -- Network Virtualization -- Network Virtualization Overview -- Network Controller -- Software Load Balancer -- Gateways -- Datacenter Firewall -- UDR, Port Mirroring, and Virtual Appliances -- Implementing Network Virtualization -- Summary -- VMQ, RSS, and SR-IOV -- SR-IOV -- VMQ -- RSS and vRSS -- NIC Teaming -- Host Virtual Adapters and Types of Networks Needed in a Hyper-V Host -- Types of Guest Network Adapters -- Monitoring Virtual Traffic -- The Bottom Line -- Chapter 4 Storage Configurations -- Storage Fundamentals and VHDX -- Types of Controllers -- Common VHDX Maintenance Actions -- Dynamic VHDX Resize -- Storage Spaces and Windows as a Storage Solution -- Storage Space Basics -- Using Storage Spaces -- Windows Server 2012 R2 Storage Space Changes -- Windows Server 2016 Storage Space Changes -- Storage Replica -- Storage Spaces Direct and Storage Replica Together -- Server Message Block Usage -- SMB Technologies -- SMB for Hyper-V Storage -- iSCSI with Hyper-V -- Using the Windows iSCSI Target -- Using the Windows iSCSI Initiator -- Considerations for Using iSCSI -- Understanding Virtual Fibre Channel -- Leveraging Shared VHDX and VHD Sets -- Data Deduplication and Hyper-V -- Storage Quality of Service -- SAN Storage and SCVMM -- The Bottom Line -- Chapter 5 Managing Hyper-V -- Installing Hyper-V -- Using Configuration Levels -- Windows Server 2016 and Nano Server -- Enabling the Hyper-V Role -- Actions after Installation of Hyper-V -- Deploying Hyper-V Servers with SCVMM -- Hyper-V Management Tools -- Using Hyper-V Manager -- Core Actions Using PowerShell -- VM Groups -- PowerShell Direct -- Securing the Hyper-V Server -- Creating and Managing a Virtual Machine -- Shielded VMs and Host Guardian Service…”
Libro electrónico -
767Publicado 2018Tabla de Contenidos: “…Deploying a service to the flexible environment -- Pricing in the flexible environment -- App Engine resources and integrations -- Task queues -- Push and pull queues -- Push queues -- Named queues -- Pull queues -- Creating tasks -- Structuring tasks queues -- Scheduled tasks -- Deploying a cron definition -- Trying the App Engine cron service -- Scaling App Engine services -- Autoscaling -- Basic and manual scaling -- Externalizing configuration and managing secrets -- Application configuration files -- Compute Engine metadata server -- Runtime Configurator -- Cloud Key Management Service (KMS) -- General considerations -- Networking and security -- The App Engine firewall -- Cloud Endpoints -- Google Cloud IAP -- Virtual private networks -- Summary -- Chapter 5: Google Kubernetes Engine -- Google Kubernetes Engine -- When to choose GKE -- GKE or App Engine Flex -- Creating and maintaining a GKE cluster -- Node pools -- Multi-zonal and regional clusters -- Container Registry -- Deploying workloads to GKE -- Rolling updates -- Rolling back updates -- Scaling deployments -- Manually scaling deployments -- Automatically scaling deployments -- Exposing GKE Services -- Exposing services within a cluster -- Exposing services to external traffic -- Managing secrets with GKE -- Creating/Storing secrets -- Using secrets -- Billing -- Summary -- Chapter 6: Google Cloud Functions -- Functions as a Service -- Google Cloud Functions -- Advantages of Cloud Functions -- Price -- Scalability -- Developer velocity -- Considerations when using Cloud Functions -- Invoking Cloud Functions -- HTTP functions -- Processing HTTP requests -- Background functions -- Cloud Pub/Sub functions -- Cloud Storage functions -- Background function retries and termination -- Developing Cloud Functions -- Using the Cloud Console -- Local development -- Debugging functions…”
Libro electrónico -
768por Clarke, Glen E.Tabla de Contenidos: “…Self Test Answers -- Chapter 13: Maintaining and Supporting a Network -- Network Upgrades -- Installing Patches and Updates -- Exercise 13-1 Patching a System with Windows Update -- Antivirus and Antispyware Software -- Backing Up Network Data -- Exercise 13-2 Backing Up and Restoring Data on a Windows Server -- Providing Fault Tolerance -- Exercise 13-3 Understanding and Configuring Fault Tolerance -- Network Documentation -- Monitoring and Logging -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 14: Network Security -- Understanding Attack Types -- Understanding System Security -- Exercise 14-1 Setting Permissions on Registry Keys -- Exercise 14-2 Modifying User Rights on a Windows System -- Exercise 14-3 Implementing Auditing in Windows -- Implementing Network Security -- Exercise 14-4 Enabling a Windows XP/Windows Server 2003 Firewall -- Securing Communication -- Exercise 14-5 Configuring IPsec to Secure Network Traffic -- Disaster Recovery and Fault Tolerance -- Guidelines to Protect the Network -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 15: Troubleshooting the Network -- Managing Network Problems -- Exercise 15-1 Using Device Manager -- Network Troubleshooting Methodology -- System or Operator Problems -- Checking Physical and Logical Indicators -- Exercise 15-2 Checking Event Logs -- Exercise 15-3 Using System Monitor -- Network Troubleshooting Resources -- Other Symptoms and Causes of Network Problems -- Network Troubleshooting Tools -- Certification Sumary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Appendix A: About the Download -- Steps to Download MasterExam -- System Requirements -- MasterExam -- CertCam Video Training -- Lab Files -- PDF Lab Book -- Glossary & Exam Objectives -- Help -- Removing Installation -- Technical Support…”
Publicado 2012
Libro electrónico -
769Publicado 2023Tabla de Contenidos: “…Identifying Risks -- Protecting against Risks -- Perimeter defense -- Firewall/router -- Security software -- Your physical computer(s) and any other endpoints -- Backups -- Detecting -- Responding -- Recovering -- Improving -- Evaluating Your Current Security Measures -- Software -- Hardware -- Insurance -- Education -- Privacy 101 -- Think before you share -- Think before you post -- General privacy tips -- Banking Online Safely -- Safely Using Smart Devices -- Cryptocurrency Security 101 -- Chapter 2 Enhancing Physical Security -- Understanding Why Physical Security Matters -- Taking Inventory -- Stationary devices -- Mobile devices -- Locating Your Vulnerable Data -- Creating and Executing a Physical Security Plan -- Implementing Physical Security -- Security for Mobile Devices -- Realizing That Insiders Pose the Greatest Risks -- Chapter 3 Cybersecurity Considerations When Working from Home -- Network Security Concerns -- Device Security Concerns -- Location Cybersecurity -- Shoulder surfing -- Eavesdropping -- Theft -- Human errors -- Video Conferencing Cybersecurity -- Keep private stuff out of camera view -- Keep video conferences secure from unauthorized visitors -- Social Engineering Issues -- Regulatory Issues -- Chapter 4 Securing Your Accounts -- Realizing You're a Target -- Securing Your External Accounts -- Securing Data Associated with User Accounts -- Conduct business with reputable parties -- Use official apps and websites -- Don't install software from untrusted parties -- Don't root your phone -- Don't provide unnecessary sensitive information -- Use payment services that eliminate the need to share credit card numbers -- Use one-time, virtual credit card numbers when appropriate -- Monitor your accounts -- Report suspicious activity ASAP -- Employ a proper password strategy -- Utilize multifactor authentication…”
Libro electrónico -
770Publicado 2023Tabla de Contenidos: “…Table service -- Queue service -- Introducing Azure Disk Storage -- Chapter 4 Planning Your Virtual Network Topology -- Understanding Virtual Network Components -- Address space -- Subnets -- Creating a Virtual Network -- Deploying with the Azure portal -- Deploying with PowerShell -- Configuring Virtual Networks -- Deciding on a name resolution strategy -- Configuring network security groups -- Adding service tags and application security groups -- Associating the NSG with the appropriate subnets -- Understanding service endpoints -- Connecting Virtual Networks -- Configuring VNet peering -- Understanding service chaining -- User-defined routes -- Deploying Azure Firewall -- Digging into Virtual Private Networks and Gateways -- Planning and configuring a VPN gateway -- Speeding through Azure ExpressRoute -- Chapter 5 Deploying and Configuring Azure Virtual Machines -- Planning Your VM Deployment -- Understanding VMs -- Starting your VM deployment from the Azure Marketplace -- Starting your VM deployment from your on-premises environment -- Recognizing Azure VM Components -- Compute -- Storage -- Network -- Architectural Considerations -- High availability -- Scalability -- Isolation mode -- Cost-Savings Opportunities -- Azure Reservations -- Azure Spot Instances -- Deploying Azure VMs from the Azure Marketplace -- Deploying a Linux VM -- Deploying from the Azure portal -- Connecting to the VM -- Deploying the VM -- Connecting to the VM -- Configuring Your VMs -- Starting, Stopping, and Resizing VMs -- Starting and stopping a VM -- Resizing a VM -- Using Azure Virtual Desktop -- Extending Your VM's Capabilities -- Maintaining your VM environments -- Enabling diagnostic logging -- Viewing diagnostics data in Azure Monitor -- Chapter 6 Shipping Docker Containers in Azure -- Understanding Docker -- Using Docker containers…”
Libro electrónico -
771Publicado 2023Tabla de Contenidos: “…Approach 1 - deploy Azure Firewall in the virtual hub…”
Libro electrónico -
772por Wessels, Duane“…It also protects the host on your internal network by acting as a firewall and proxying your internal web traffic. You can use Squid to collect statistics about the…”
Publicado 2004
Libro electrónico -
773Publicado 2013Tabla de Contenidos: “…Synchronize EMCLI with the OMS -- Download the Installer to the Target Host -- Edit the agent.properties File -- Install the Agent -- Installing Agents Using the Agent Cloning Wizard -- Prerequisites -- Installation Using the Agent Cloning Wizard -- Installing Agents Using the Manual Cloning Procedure -- Prerequisites -- Installation Using the Manual Cloning Procedure -- Installing Shared Oracle Home Agents Using the Wizard -- Prerequisites -- Installing the Shared Oracle Home Agent Using the Wizard -- Installing Shared Oracle Home Agents Using AgentNFS.pl -- Prerequisites -- Installing the Shared Oracle Home Agent Using AgentNFS.pl -- Agent Configuration Issues -- Firewall Issues -- Agent Issues -- Summary -- Chapter 6: Cloud Control Console Configuration -- Selecting the Home Page -- Global Menu Items -- The Enterprise Menu -- The Targets Menu -- The Favorites Menu -- The History Menu -- The Setup Menu -- The Help Menu -- The "User" Menu -- Notification Requirements -- Define Notification Methods -- Mail Server -- Other Notification Methods -- Define an E-mail Address for User -- Set Notification Schedules -- Defining Notification Schedules -- Summary -- Chapter 7: Cloud Control Security and User Management -- Administrators -- Administrator -- Repository Owner -- Creating Administrators -- Roles -- Credentials -- Named Credentials -- Preferred Credentials -- Monitoring Credentials -- Privilege Delegation -- Registration Passwords -- Audit Data -- Securing Cloud Control Data Transfer -- EM Framework Security -- Summary -- Chapter 8: Cloud Control Maintenance and Tuning -- Maintaining Cloud Control -- Operational Maintenance -- Physical Maintenance -- Cloud Control Tuning -- Sizing Guidelines -- OMS and OMR System Errors -- Target Metric Collection Errors -- Targets with Down Status -- Critical and Warning Events -- OMR Database Alert Log Errors…”
Libro electrónico -
774por Langenhan, DanielTabla de Contenidos: “…. -- Using templates with firewall and NAT settings -- Getting ready -- How to do it... -- How it works... -- There's more... -- Connecting a physical device to an isolated network -- Getting ready -- How to do it... -- How it works... -- Sharpening the Edge -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using vApp Network fencing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating multitiered vApp Networks -- Getting ready -- How to do it... -- How it works... -- There's more... -- Downloading and importing a virtual router into vCloud -- Setting up the networking -- Setting up the web interface -- Configuring the WAN interfaces with the correct network settings -- Configuring the OPT1 interfaces with the correct network settings -- Configuring static routing -- See also -- Ensuring no change in IP after redeployment -- Getting ready -- How to do it... -- Ensuring no change occurs in IP after redeployment by setting up the vApp -- Ensuring no change occurs in IP after redeployment by retrofitting an existing vApp -- How it works... -- There's more... -- Automatic IP management for External Network Pools -- Getting ready -- How to do it... -- How it works... -- There's more... -- Static DNS Pool -- Preallocated DNS pool with a manual IP -- Automated setup -- Linux and Guest Customization -- See also…”
Publicado 2013
Libro electrónico -
775Publicado 2011“…Windows 7 installation, upgrades, and deployment User and application migration Windows 7 deployment Physical and virtual hard disk configuration and management Windows Update Device and application configuration Internet Explorer configuration Networking, including TCP/IP configuration Firewall settings Mobile and remote computing Secure access control for local and shared resources System performance management and monitoring Backups, system recovery, and file recovery Test your knowledge, build your confidence, and succeed! …”
Libro electrónico -
776CybersecurityCybersecurity For DummiesPublicado 2022Tabla de Contenidos: “…Your work environment -- Identifying Risks -- Protecting against Risks -- Perimeter defense -- Firewall/router -- Security software -- Your physical computer(s) and any other endpoints -- Backups -- Detecting -- Responding -- Recovering -- Improving -- Evaluating Your Current Security Measures -- Software -- Hardware -- Insurance -- Education -- Privacy 101 -- Think before you share -- Think before you post -- General privacy tips -- Banking Online Safely -- Safely Using Smart Devices -- Cryptocurrency Security 101 -- Chapter 5 Enhancing Physical Security -- Understanding Why Physical Security Matters -- Taking Inventory -- Stationary devices -- Mobile devices -- Locating Your Vulnerable Data -- Creating and Executing a Physical Security Plan -- Implementing Physical Security -- Security for Mobile Devices -- Realizing That Insiders Pose the Greatest Risks -- Chapter 6 Cybersecurity Considerations When Working from Home -- Network Security Concerns -- Device Security Concerns -- Location Cybersecurity -- Shoulder surfing -- Eavesdropping -- Theft -- Human errors -- Video Conferencing Cybersecurity -- Keep private stuff out of camera view -- Keep video conferences secure from unauthorized visitors -- Social Engineering Issues -- Regulatory Issues -- Part 3 Protecting Yourself from Yourself -- Chapter 7 Securing Your Accounts -- Realizing You're a Target -- Securing Your External Accounts -- Securing Data Associated with User Accounts -- Conduct business with reputable parties -- Use official apps and websites -- Don't install software from untrusted parties -- Don't root your phone -- Don't provide unnecessary sensitive information -- Use payment services that eliminate the need to share credit card numbers -- Use one-time, virtual credit card numbers when appropriate -- Monitor your accounts -- Report suspicious activity ASAP…”
Libro electrónico -
777Publicado 2022Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
Libro electrónico -
778Publicado 2023Tabla de Contenidos: “…Empire -- Inveigh -- PowerUpSQL -- AADInternals -- Red team cookbook -- Reconnaissance -- Execution -- Persistence -- Defense evasion -- Credential access -- Discovery -- Lateral movement -- Command and Control (C2) -- Exfiltration -- Impact -- Summary -- Further reading -- Chapter 9: Blue Team Tasks and Cookbook -- Technical requirements -- Protect, detect, and respond -- Protection -- Detection -- Response -- Common PowerShell blue team tools -- PSGumshoe -- PowerShellArsenal -- AtomicTestHarnesses -- PowerForensics -- NtObjectManager -- DSInternals -- PSScriptAnalyzer and InjectionHunter -- Revoke-Obfuscation -- Posh-VirusTotal -- EventList -- JEAnalyzer -- Blue team cookbook -- Checking for installed updates -- Checking for missing updates -- Reviewing the PowerShell history of all users -- Inspecting the event log of a remote host -- Monitoring to bypass powershell.exe -- Getting specific firewall rules -- Allowing PowerShell communication only for private IP address ranges -- Isolating a compromised system -- Checking out installed software remotely -- Starting a transcript -- Checking for expired certificates -- Checking the digital signature of a file or a script -- Checking file permissions of files and folders -- Displaying all running services -- Stopping a service -- Displaying all processes -- Stopping a process -- Disabling a local account -- Enabling a local account -- Disabling a domain account -- Enabling a domain account -- Retrieving all recently created domain users -- Checking whether a specific port is open -- Showing TCP connections and their initiating processes -- Showing UDP connections and their initiating processes -- Searching for downgrade attacks using the Windows event log -- Preventing downgrade attacks -- Summary -- Further reading -- Part 3: Securing PowerShell - Effective Mitigations In Detail…”
Libro electrónico -
779Publicado 2024Tabla de Contenidos: “…Installing an IDE for Python development -- Configuring Python with RStudio -- Configuring Python with Visual Studio Code -- Working with the Python Interactive window in Visual Studio Code -- Configuring Power BI Desktop to work with Python -- Configuring the Power BI service to work with Python -- Sharing reports that use Python scripts in the Power BI service -- Limitations of Python visuals -- Summary -- Test your knowledge -- Chapter 4: Solving Common Issues When Using Python and R in Power BI -- Technical requirements -- Avoiding the ADO.NET error when running a Python script in Power BI -- The real cause of the problem -- A practical solution to the problem -- Avoiding the Formula.Firewall error -- Incompatible privacy levels -- Indirect access to a data source -- The easy way -- Combining queries and/or transformations -- Encapsulating queries into functions -- Using multiple datasets in Python and R script steps -- Applying a full join with Merge -- Using arguments of the Python.Execute function -- Dealing with dates/times in Python and R script steps -- Summary -- Test your knowledge -- Chapter 5: Importing Unhandled Data Objects -- Technical requirements -- Importing RDS files in R -- A brief introduction to Tidyverse -- Creating a serialized R object -- Configuring the environment and installing Tidyverse -- Creating the RDS files -- Using an RDS file in Power BI -- Importing an RDS file into the Power Query Editor -- Importing an RDS file in an R script visual -- Importing PKL files in Python -- A very short introduction to the PyData world -- Creating a serialized Python object -- Configuring the environment and installing the PyData packages -- Creating the PKL files -- Using a PKL file in Power BI -- Importing a PKL file into the Power Query Editor -- Importing a PKL file in a Python script visual -- Summary -- References…”
Libro electrónico -
780Publicado 2024Tabla de Contenidos: “…Deploying Metasploitable 2 as a vulnerable machine -- Part 1 - deploying Metasploitable 2 -- Part 2 - configuring network settings -- Building and deploying Metasploitable 3 -- Part 1 - building the Windows server version -- Part 2 - building the Linux server version -- Summary -- Further reading -- Chapter 3: Setting Up for Advanced Penetration Testing Techniques -- Technical requirements -- Building an Active Directory red team lab -- Part 1 - Setting up Windows Server -- Part 2 - Configuring virtual machine additional features -- Part 3 - Setting Active Directory Domain Services -- Part 4 - Creating domain users and administrator accounts -- Part 5 - Disabling antimalware protection and the domain firewall -- Part 6 - Setting up for service authentication attacks -- Part 7 - Installing Windows 10 Enterprise -- Part 8 - Adding the clients to the domain -- Part 9 - Setting up for account takeover and file sharing attacks -- Setting up a wireless penetration testing lab -- Brief overview of wireless network security -- Setting up a RADIUS server -- Part 1 - Install a Ubuntu server -- Part 2 - Setting up FreeRadius -- Part 3 - Setting the wireless router with RADIUS -- Summary -- Further reading -- Chapter 4: Passive Reconnaissance -- Technical requirements -- The importance of reconnaissance -- Exploring passive reconnaissance -- Open source intelligence -- How much data should be collected? …”
Libro electrónico