Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
1Publicado 2008“…End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security incidents Omar Santos Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. …”
Libro electrónico -
2
-
3Publicado 2021“…Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End…”
Libro electrónico -
4por Association for Computing Machinery“…Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End…”
Publicado 2022
Libro electrónico -
5Publicado 2024“…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field. …”
Vídeo online -
6Publicado 2019“…Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. …”
Libro electrónico -
7Publicado 2021“…As you make progress through the chapters, you'll get to grips with several advanced techniques such as malware analysis, security automation, computer forensics, and vulnerability assessment, which will help you to leverage pentesting for security. By the end of this book, you'll have become familiar with creating your own defensive security tools using IoT devices and developed advanced defensive security skills. …”
Libro electrónico -
8por Connable, BenTabla de Contenidos: “…CHAPTER THREE - Assessments of Insurgency Endings: Time and External FactorsAssessments of Time and External Factors; Duration of Conflict; Sanctuary Available; Outside Intervention in Support of Government; Outside Intervention in Support of Insurgencies; CHAPTER FOUR - Assessments of Insurgency Endings: Internal Factors; Structure; Thailand and the BRN and the P ULO; Urbanization; Uruguay and the Tupamaros; Insurgent Use of Terrorism; Insurgent Strength; System of Government; CHAPTER FIVE - Assessments of Insurgency Endings: Other Factors; Force Ratios; Civil-Defense Forces…”
Publicado 2010
Libro electrónico -
9Publicado 2024“…After getting to grips with the basics, you'll learn how to develop a cyber defense system for Small Office Home Office (SOHO ) services. …”
Libro electrónico -
10
-
11
-
12Publicado 2018Tabla de Contenidos: “…Access token manipulation -- Exploiting accessibility features -- Application shimming -- Bypassing user account control -- DLL injection -- DLL search order hijacking -- Dylib hijacking -- Exploration of vulnerabilities -- Launch daemon -- Hands-on example of privilege escalation on a Windows 8 target -- Conclusion and lessons learned -- References -- Summary -- Chapter 9: Security Policy -- Reviewing your security policy -- Educating the end user -- Social media security guidelines for users -- Security awareness training -- Policy enforcement -- Application whitelisting -- Hardening -- Monitoring for compliance -- References -- Summary -- Chapter 10: Network Segmentation -- Defense in depth approach -- Infrastructure and services -- Documents in transit -- Endpoints -- Physical network segmentation -- Discovering your network -- Securing remote access to the network -- Site-to-site VPN -- Virtual network segmentation -- Hybrid cloud network security -- References -- Summary -- Chapter 11: Active Sensors -- Detection capabilities -- Indicators of compromise -- Intrusion detection systems -- Intrusion prevention system -- Rule-based detection -- Anomaly-based detection -- Behavior analytics on-premises -- Device placement -- Behavior analytics in a hybrid cloud -- Azure Security Center -- References -- Summary -- Chapter 12: Threat Intelligence -- Introduction to threat intelligence -- Open source tools for threat intelligence -- Microsoft threat intelligence -- Azure Security Center -- Leveraging threat intelligence to investigate suspicious activity -- References -- Summary -- Chapter 13: Investigating an Incident -- Scoping the issue -- Key artifacts -- Investigating a compromised system on-premises -- Investigating a compromised system in a hybrid cloud -- Search and you shall find it -- Lessons learned -- References -- Summary…”
Libro electrónico -
13Publicado 2024“…By the end of this book, you'll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility. …”
Libro electrónico -
14por Diogenes, Yuri“…Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. …”
Publicado 2022
Libro electrónico -
15Publicado 2023Libro electrónico
-
16Publicado 2024“…You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. …”
Video -
17
-
18Publicado 2007Tabla de Contenidos: “…Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Introduction; History of AVIEN and AVIEWS; Background: So Who Is Robert Vibert?…”
Libro electrónico -
19Publicado 2017“…The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances. …”
Libro electrónico -
20Publicado 2024Libro electrónico