Mostrando 1 - 20 Resultados de 392 Para Buscar 'defensive end', tiempo de consulta: 0.09s Limitar resultados
  1. 1
    Publicado 2008
    “…End-to-End Network Security Defense-in-Depth Best practices for assessing and improving network defenses and responding to security incidents Omar Santos Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. …”
    Libro electrónico
  2. 2
    Publicado 1992
    Libro
  3. 3
    Publicado 2021
    “…Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End…”
    Libro electrónico
  4. 4
    “…Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End…”
    Libro electrónico
  5. 5
    Publicado 2024
    “…The curriculum is thoughtfully structured and covers a wide range of topics, making it accessible and engaging for learners at various levels. By the end of this course, you'll possess a comprehensive understanding of network security and defense, preparing you to tackle real-world challenges in the field. …”
    Vídeo online
  6. 6
    Publicado 2019
    “…Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach has its shortcomings. …”
    Libro electrónico
  7. 7
    Publicado 2021
    “…As you make progress through the chapters, you'll get to grips with several advanced techniques such as malware analysis, security automation, computer forensics, and vulnerability assessment, which will help you to leverage pentesting for security. By the end of this book, you'll have become familiar with creating your own defensive security tools using IoT devices and developed advanced defensive security skills. …”
    Libro electrónico
  8. 8
    por Connable, Ben
    Publicado 2010
    Tabla de Contenidos: “…CHAPTER THREE - Assessments of Insurgency Endings: Time and External FactorsAssessments of Time and External Factors; Duration of Conflict; Sanctuary Available; Outside Intervention in Support of Government; Outside Intervention in Support of Insurgencies; CHAPTER FOUR - Assessments of Insurgency Endings: Internal Factors; Structure; Thailand and the BRN and the P ULO; Urbanization; Uruguay and the Tupamaros; Insurgent Use of Terrorism; Insurgent Strength; System of Government; CHAPTER FIVE - Assessments of Insurgency Endings: Other Factors; Force Ratios; Civil-Defense Forces…”
    Libro electrónico
  9. 9
    Publicado 2024
    “…After getting to grips with the basics, you'll learn how to develop a cyber defense system for Small Office Home Office (SOHO ) services. …”
    Libro electrónico
  10. 10
    Publicado 2009
    Libro electrónico
  11. 11
    por Shimonski, Robert
    Publicado 2012
    Libro electrónico
  12. 12
    Publicado 2018
    Tabla de Contenidos: “…Access token manipulation -- Exploiting accessibility features -- Application shimming -- Bypassing user account control -- DLL injection -- DLL search order hijacking -- Dylib hijacking -- Exploration of vulnerabilities -- Launch daemon -- Hands-on example of privilege escalation on a Windows 8 target -- Conclusion and lessons learned -- References -- Summary -- Chapter 9: Security Policy -- Reviewing your security policy -- Educating the end user -- Social media security guidelines for users -- Security awareness training -- Policy enforcement -- Application whitelisting -- Hardening -- Monitoring for compliance -- References -- Summary -- Chapter 10: Network Segmentation -- Defense in depth approach -- Infrastructure and services -- Documents in transit -- Endpoints -- Physical network segmentation -- Discovering your network -- Securing remote access to the network -- Site-to-site VPN -- Virtual network segmentation -- Hybrid cloud network security -- References -- Summary -- Chapter 11: Active Sensors -- Detection capabilities -- Indicators of compromise -- Intrusion detection systems -- Intrusion prevention system -- Rule-based detection -- Anomaly-based detection -- Behavior analytics on-premises -- Device placement -- Behavior analytics in a hybrid cloud -- Azure Security Center -- References -- Summary -- Chapter 12: Threat Intelligence -- Introduction to threat intelligence -- Open source tools for threat intelligence -- Microsoft threat intelligence -- Azure Security Center -- Leveraging threat intelligence to investigate suspicious activity -- References -- Summary -- Chapter 13: Investigating an Incident -- Scoping the issue -- Key artifacts -- Investigating a compromised system on-premises -- Investigating a compromised system in a hybrid cloud -- Search and you shall find it -- Lessons learned -- References -- Summary…”
    Libro electrónico
  13. 13
    Publicado 2024
    “…By the end of this book, you'll have gained a profound understanding of the significance of multi-layered defense strategies, explored frameworks for building robust security programs, and developed the ability to navigate the evolving threat landscape with resilience and agility. …”
    Libro electrónico
  14. 14
    por Diogenes, Yuri
    Publicado 2022
    “…Cybersecurity - Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture. …”
    Libro electrónico
  15. 15
    Publicado 2023
    Libro electrónico
  16. 16
    Publicado 2024
    “…You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security. …”
    Video
  17. 17
    por Peltz, Eric, 1968-
    Publicado 2012
    Libro electrónico
  18. 18
    Publicado 2007
    Tabla de Contenidos: “…Front Cover; AVIEN Malware Defense Guide for the Enterprise; Copyright Page; Lead Author and Technical Editor; Foreword Author; Contributors; Contents; Foreword; Preface; Introduction; Chapter 1: Customer Power and AV Wannabes; Introduction; History of AVIEN and AVIEWS; Background: So Who Is Robert Vibert?…”
    Libro electrónico
  19. 19
    Publicado 2017
    “…The authoritative visual guide to Cisco Firepower Threat Defense (FTD) This is the definitive guide to best practices and advanced troubleshooting techniques for the Cisco flagship Firepower Threat Defense (FTD) system running on Cisco ASA platforms, Cisco Firepower security appliances, Firepower eXtensible Operating System (FXOS), and VMware virtual appliances. …”
    Libro electrónico
  20. 20
    Publicado 2024
    Libro electrónico