Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3501Publicado 2017“…What You Will Learn Understand the importance of security assessments over merely setting up and managing systems/processes Familiarize yourself with tools such as OPENVAS to locate system and network vulnerabilities Discover multiple solutions to escalate privileges on a compromised machine Identify security anomalies in order to make your infrastructure secure and further strengthen it Acquire the skills to prevent infrastructure and application vulnerabilities Exploit vulnerabilities that require a complex setup with the help of Metasploit In Detail With the increasing threats of breaches and attacks on critical infrastructure, system administrators and architects can use Kali Linux 2.0 to ensure their infrastructure is secure by finding out known vulnerabilities and safeguarding their infrastructure against unknown vulnerabilities. …”
Libro electrónico -
3502Publicado 2016“…You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. …”
Libro electrónico -
3503Publicado 2017“…You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. …”
Libro electrónico -
3504por Kleymenov, Alexey“…Finally, this book will help you strengthen your defenses and prevent malware breaches for IoT devices and mobile platforms. By the end of this book, you will have learned to effectively analyze, investigate, and build innovative solutions to handle any malware incidents. …”
Publicado 2019
Libro electrónico -
3505Publicado 2017“…Microsoft OS problems, databases, voice, and video over IP Identify and locate faults in detecting security failures and security breaches in the network In Detail This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. …”
Libro electrónico -
3506Publicado 2023“…Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!…”
Libro electrónico -
3507por Sullivan, Chad“…Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention System Secure your endpoint systems with host IPS Build and manipulate policies for the systems you wish to protect Learn how to use groups and hosts in the Cisco Security Agent architecture and how the components are related Install local agent components on various operating systems Explore the event database on the management system to view and filter information Examine Cisco Security Agent reporting mechanisms for monitoring system activity Apply Application Deployment Investigation to report on installed applications, hotfixes, and service packs Collect detailed information on processes and see how they use and are used by system resources Create and tune policies to control your environment without impacting usability Learn how to maintain the Cisco Security Agent architecture, including administrative access roles and backups Cisco Security Agent presents a detailed explanation of Cisco Security Agent, illustrating the use of host Intrusion Prevention Systems (IPS) in modern self-defending network protection schemes. …”
Publicado 2005
Libro electrónico -
3508por Seacord, Robert C.“…Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives. …”
Publicado 2006
Libro electrónico -
3509por Bhaiji, Fahim Hussain Yusuf“…The end result is that the cost of a network security breach has never been higher. Accordingly, the demand for networking professionals with expert-level network security configuration and troubleshooting skills is also great. …”
Publicado 2004
Libro electrónico -
3510Publicado 2020“…Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book Description Azure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). …”
Libro electrónico -
3511Publicado 2017“…The technical sessions you'll gain access to include Arshan Dabirsiaghi's (Contrast Security) insider scoop on the Struts 2 exploit and the Equifax data breach; Netflixer Joseph Breuer’s story on leveraging Cassandra, event sourcing, data snapshots, and data serialization for the Netflix Download feature; VM Brasseur, winner of the 2016 O’Reilly Open Source Award, sharing the secrets of leading productive and happy teams; and Riverbed's Dina Goldshtein’s illumination of Event Tracing for Windows, the most important diagnostic tool Windows developers have for monitoring anything, anytime, anywhere. …”
-
3512Publicado 2024“…What you will learn Understand the concept of password cracking Discover how OSINT potentially identifies passwords from breaches Address how to crack common hash types effectively Identify, extract, and crack Windows and macOS password hashes Get up to speed with WPA/WPA2 architecture Explore popular password managers such as KeePass, LastPass, and 1Password Format hashes for Bitcoin, Litecoin, and Ethereum wallets, and crack them Who this book is for This book is for cybersecurity professionals, penetration testers, and ethical hackers looking to deepen their understanding of password security and enhance their capabilities in password cracking. …”
Libro electrónico -
3513Publicado 2022“…Puis il s’intéresse aux vestiges polymorphes des champs de bataille proprement dits, depuis les grains de sable d’Omaha Beach jusqu’aux épaves sous-marines, en passant par les théâtres d’affrontements ou le relèvement de corps de soldats. …”
Libro -
3514Publicado 2020“…En su labor de crítico de arte contemporáneo son especialmente relevantes sus trabajos sobre Brotat (1964 y 1975), Miró (1972), Subirachs (1975 y 1984), Benjamín Palencia (1979), Guinovart (1981), Montserrat Gudiol (1989), José Hernández (1991), Tàpies (1992), Gregorio Prieto (1998), Miguel Milá (2001), la cerámica (1974 y 1978), la arquitectura industrial (1984), la artesanía (1985), el juguete (1989) o el arte catalán de la segunda mitad del XX (1996). …”
Libro -
3515por Carr, Claudia J. author“…Violations of internationally recognized human rights, especially by the Ethiopian government but also the Kenyan government, are extensive and on the increase—with collaboration by the development banks, in breach of their own internal operational procedures. …”
Publicado 2017
Libro electrónico -
3516Publicado 2022“…You'll also dive into performing assessments and continuous testing with breach and attack simulations. Once you've covered the fundamentals, you'll also learn tips and tricks to improve the overall maturity of your purple teaming capabilities along with measuring success with KPIs and reporting. …”
Libro electrónico -
3517Publicado 2018“…What You Will Learn Configure Wireshark 2 for effective network analysis and troubleshooting Set up various display and capture filters Understand networking layers, including IPv4 and IPv6 analysis Explore performance issues in TCP/IP Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs Get information about network phenomena, events, and errors Locate faults in detecting security failures and breaches in networks In Detail This book contains practical recipes on troubleshooting a data communications network. …”
Libro electrónico -
3518Publicado 2022“…Think of the news you've read lately regarding data breaches and ransomware attacks. Knowing how to secure applications and data in the cloud is a business necessity these days, as well as a lucrative job skill. …”
-
3519Publicado 2020“…By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is for This book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. …”
Libro electrónico -
3520Publicado 2016“…Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? …”
Libro electrónico