Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 40
- Examinations 24
- Security measures 23
- Certification 22
- Electronic data processing personnel 18
- Computer security 12
- Engineering & Applied Sciences 12
- Electrical & Computer Engineering 10
- Telecommunications 10
- Cisco Systems, Inc 8
- Operating systems (Computers) 8
- Linux 7
- Penetration testing (Computer security) 6
- Computer programs 5
- Computing Technology Industry Association 5
- Telecommunications engineers 5
- Business enterprises 4
- Computer technicians 4
- Hackers 4
- Kali Linux 4
- Management 4
- Apache (Computer file : Apache Group) 3
- Cloud computing 3
- Computer Science 3
- Internet telephony 3
- Open source software 3
- Python (Computer program language) 3
- TCP/IP (Computer network protocol) 3
- UNIX (Computer file) 3
- Web servers 3
-
101Publicado 2011Tabla de Contenidos: “…Selecting a Password -- Components of a Good Password -- Password Aging -- Operating System and Network Operating System Hardening -- Hardening Microsoft Operating Systems -- Hardening UNIX- or Linux-Based Operating Systems -- Network Hardening -- Software Updates -- Device Configuration -- Ports and Services -- Traffic Filtering -- Securing Management Interfaces -- VLAN Management -- IPv4 vsIPv6 -- Application Hardening -- Application Configuration Baseline -- Application Patches -- Patch Management -- Web Servers -- Mail Servers -- FTP Servers -- DNS Servers -- File and Print Services -- Active Directory -- Host Software Baselining -- Group Policies -- Security Templates -- Chapter Review -- Questions -- Answers -- Chapter 13 Types of Attacks and Malicious Software -- Avenues of Attack -- The Steps in an Attack -- Minimizing Possible Avenues of Attack -- Attacking Computer Systems and Networks -- Denial-of-Service Attacks -- Backdoors and Trapdoors -- Null Sessions -- Sniffing -- Spoofing -- Man-in-the-Middle Attacks -- Replay Attacks -- TCP/IP Hijacking -- Attacks on Encryption -- Address System Attacks -- Password Guessing -- Software Exploitation -- Client-Side Attacks -- Malicious Code -- Secure Software Development Lifecycle -- War-Dialing and War-Driving -- Social Engineering -- Auditing -- Chapter Review -- Questions -- Answers -- Chapter 14 E-Mail and Instant Messaging -- Security of E-Mail -- Malicious Code -- Hoax E-Mails -- Unsolicited Commercial E-Mail (Spam) -- Mail Encryption -- Instant Messaging -- Chapter Review -- Questions -- Answers -- Chapter 15 Web Components -- Current Web Components and Concerns -- Protocols -- Encryption (SSL and TLS) -- The Web (HTTP and HTTPS) -- Directory Services (DAP and LDAP) -- File Transfer (FTP and SFTP) -- Vulnerabilities -- Code-Based Vulnerabilities -- Buffer Overflows -- Java and JavaScript…”
Libro electrónico -
102Publicado 2024Tabla de Contenidos: “…Identifying organizational infrastructure -- Data leakage on job websites -- Finding vulnerable systems using Shodan -- Discovering exposed systems with Censys -- Mapping external systems using Maltego -- Identifying infrastructure with Netcraft -- Using Recon-ng for data harvesting -- Data collection with theHarvester -- Harvesting employees' data using Hunter -- Automating social media reconnaissance with Sherlock -- Summary -- Further reading -- Chapter 6: Active Reconnaissance -- Technical requirements -- Understanding active information -- Profiling websites using EyeWitness -- Exploring active scanning techniques -- Changing your MAC address -- Performing live host discovery -- Identifying open ports, services, and operating systems -- Using scanning evasion techniques -- Avoiding detection with decoys -- Using MAC and IP spoofing techniques -- Stealth scanning techniques -- Enumerating network services -- Enumerating SMB services -- Enumerating SMTP services -- Enumerating SNMP services -- Discovering data leaks in the cloud -- Summary -- Further reading -- Chapter 7: Performing Vulnerability Assessments -- Technical requirements -- Getting started with Nessus -- Part 1 - installing Nessus -- Part 2 - identifying vulnerabilities -- Part 3 - vulnerability analysis -- Part 4 - exporting vulnerability reports -- Vulnerability identification using Nmap -- Working with Greenbone Vulnerability Manager -- Part 1 - installing GVM -- Part 2 - vulnerability identification -- Part 3 - vulnerability analysis and reporting -- Using web application scanners -- WhatWeb -- Nmap -- Nikto -- Metasploit -- WPScan -- Summary -- Further reading -- Chapter 8: Understanding Network Penetration Testing -- Technical requirements -- Introduction to network penetration testing -- Working with bind and reverse shells -- Working with remote shells using Netcat…”
Libro electrónico -
103Publicado 2018Tabla de Contenidos: “…-- The DAO -- Decentralizing an organization -- Putting a corporation on a blockchain -- Cutting out the middle man…”
Libro electrónico -
104por Amberg, EricTabla de Contenidos: “…. -- 3.2.6 Dateien anzeigen -- 3.2.7 Dateien finden und durchsuchen -- 3.2.8 Die Man-Pages: Hilfe zur Selbsthilfe -- 3.2.9 Dienste starten und überprüfen -- 3.3 Die Netzwerk-Konfiguration anzeigen und anpassen -- 3.3.1 IP-Adresse anzeigen -- 3.3.2 Routing-Tabelle anzeigen -- 3.3.3 DNS-Server anzeigen -- 3.3.4 Konfiguration der Schnittstellen -- 3.4 Software-Installation und -Update -- 3.4.1 Die Paketlisten aktualisieren -- 3.4.2 Installation von Software-Paketen -- 3.4.3 Software suchen -- 3.4.4 Entfernen von Software-Paketen -- 3.5 Zusammenfassung und Prüfungstipps -- 3.5.1 Zusammenfassung und Weiterführendes -- 3.5.2 CEH-Prüfungstipps -- 3.5.3 Fragen zur CEH-Prüfungsvorbereitung -- Kapitel 4: Anonym bleiben und sicher kommunizieren -- 4.1 Von Brotkrumen und Leuchtspuren -- 4.2 Proxy-Server - schon mal ein Anfang…”
Publicado 2024
Libro electrónico -
105Publicado 2018Tabla de Contenidos: “…. -- How it works... -- Blocking IP addresses from failed SSH attempts -- Getting ready -- How to do it... -- How it works... -- Playing and managing audio from Bash -- Getting ready -- How to do it... -- How it works... -- Creating a simple NAT and DMZ firewall -- Getting ready -- How to do it... -- How it works... -- Parsing a GitHub project and generate a report -- Getting ready -- How to do it... -- How it works... -- Creating a poor man's incremental remote backup -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
106por Hassler, MarcoTabla de Contenidos: “…Intro -- Impressum -- Über den Autor -- Vorwort -- Einleitung -- An wen sich das Buch richtet -- Aufbau des Buches -- Teil I: Basis schaffen und Nutzung messen -- Teil II: Metriken analysieren und interpretieren -- Teil III: Erfolg nachhaltig steigern -- Weitere Informationen -- Teil 1: Basis schaffen und Nutzung messen -- Kapitel 1: Digital Analytics auf einen Blick -- 1.1 Die Geschichte der Datenanalyse -- 1.2 Was ist Web Analytics, was ist Digital Analytics -- 1.3 Angrenzende Definitionen und Themen -- 1.3.1 Page Tagging oder Pixel-Tracking -- 1.3.2 Logfile-Analyse -- 1.3.3 Online-Umfragen oder Surveys -- 1.3.4 Persönliche Interviews und Benutzer-Beobachtungen -- 1.4 Grenzen - oder was Analytics nicht ist -- 1.5 Warum und wie Sie es tun sollten -- 1.5.1 Zehn Gründe für Analytics -- 1.5.2 Wie man zum Ziel gelangt -- 1.6 Auswahl eines Analytics-Systems -- 1.6.1 Vorselektion von Produkten -- 1.6.2 Pragmatische Vorgehensweise zur Produktauswahl -- 1.6.3 Klassische Produkt-Evaluation -- Kapitel 2: Funktionsweise der Datensammlung -- 2.1 Funktionsweise von Analytics-Systemen -- 2.2 Serverseitige Datensammlung mittels Logfile -- 2.2.1 Funktionsweise der Logfile-Erstellung -- 2.2.2 Bedeutung der gesammelten Daten -- 2.3 Clientseitige Datensammlung mittels Page Tagging -- 2.3.1 Erweiterter Umfang der erfassbaren Daten -- 2.3.2 Funktionsweise der clientseitigen Datensammlung -- 2.3.3 Tag-Management-Systeme -- 2.4 Alternative oder hybride Datensammlungs-Mechanismen -- 2.5 Vergleich der Datensammlungs-Methoden -- 2.5.1 Vor- und Nachteile von Logfiles für die Analytics-Nutzung -- 2.5.2 Vor- und Nachteile von Page Tags für die Analytics-Nutzung -- 2.5.3 Zusammenfassung und Empfehlung -- Kapitel 3: Datenspeicherung -- 3.1 Speicherungsvarianten -- 3.1.1 Interner Betrieb von Analytics-Lösungen…”
Publicado 2023
Libro electrónico -
107Publicado 2017Libro electrónico
-
108Publicado 2017Libro electrónico
-
109
-
110
-
111
-
112Publicado 2011“…Enterprise Network Testing contains easy-to-adapt reference test plans for branches, WANs/MANs, data centers, and campuses. The authors also offer specific guidance on testing many key network technologies, including MPLS/VPN, QoS, VoIP, video, IPsec VPNs, advanced routing (OSPF, EIGRP, BGP), and Data Center Fabrics. § Understand why, when, and how you should test your network § Use testing to discover critical network design flaws § Incorporate structured systems testing into enterprise architecture strategy § Utilize testing to improve decision-making throughout the network lifecycle § Develop an effective testing organization and lab facility § Choose and use test services providers § Scope, plan, and manage network test assignments § nLeverage the best commercial, free, and IOS test tools § Successfully execute test plans, including crucial low-level details § Minimize the equipment required to test large-scale networks § Identify gaps in network readiness § Validate and refine device configurations § Certify new hardware, operating systems, and software features § Test data center performance and scalability § Leverage test labs for hands-on technology training This book is part of the Networking Technology Series from Cis..…”
Libro electrónico