Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (36)
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (5 hr., 12 min., 42 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Series Statement: The art of hacking series
    Keywords: Hackers ; Handbooks, manuals, etc ; Computer security ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic videos ; local
    Abstract: "Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career."--Resource description page.
    Note: Title from title screen (Safari, viewed February 22, 2018). - Release date from resource description page (Safari, viewed February 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (26 hr., 40 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Electronic videos ; local
    Abstract: "The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781587141010 , 1587141019
    Language: English
    Pages: 1 online resource (xxv, 1119 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Cisco Press networking technology series
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance , Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features. Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASA Includes detailed configuration examples, with screenshots and command line references Covers the ASA 8.2 release Presents complete troubleshooting methodologies and architectural references
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138319090 , 013831909X
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 3 Hours of Video Instruction Practice and enhance your Ethical Hacking and Defensive Security Skills! Take your first step to building your very own cybersecurity lab and preparing for the future of cybersecurity. Building the Ultimate Cybersecurity Lab and Cyber Range is a vital resource for anyone serious about learning hands-on cyber skills. It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. The course serves as a comprehensive guide for those beginning their journey in penetration testing, exploit development, or malware reverse engineering; it covers how to build yourown virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem. Sign up for cybersecurity live training classes by Omar Santos https://learning.oreilly.com/search/?q=omar%20santos%20cybersecurity&type=live-event-series&publishers=Pearson Topics covered: How to create a lab for offensive and defensive cybersecurity concepts Learning and obtaining access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems Learning how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range Learning how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean. About the Instructor: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Skill Level: Beginner to Intermediate Learn How To: Build virtual, physical, or cloud-based cybersecurity lab. Use tools like Vagrant, Terraform, and Ansible to automate complex and repetitive tasks. Practice safe and refine a variety of offensive and defensive cybersecurity techniques. Get skillset to deploy and manage secure environments on various platforms and cloud services. Course requirement: Course participants should have a basic understanding of computing and networking. Supplemental information and additional material for this course can be accessed at https://h4cker.org/labs Who Should Take This Course: You are interested in cybersecurity You are preparing for the cybersecurity certifications You want to learn about the different ways that you can practice your skills in a safe environment You want to learn different tips on how to create multiple About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Language: English
    Pages: 1 online resource (336 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Artificial intelligence Computer programs ; Security measures ; Computer networks Security measures ; Natural language generation (Computer science) ; Intelligence artificielle ; Logiciels ; Sécurité ; Mesures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Génération automatique de texte
    Abstract: This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly. The book is divided into several sections, each focusing on a specific aspect of AI. It begins by introducing the fundamentals of AI technolgies, providing an overview of their history, development, and various types. This is followed by a deep dive into popular AI algorithms and large language models (LLMs), including GPT-4, that are at the forefront of AI innovation. Next, the book explores the critical security aspects of AI systems, examining the importance of security and the key challenges faced in this domain. It also delves into the common threats, vulnerabilities, and attack vectors, as well as risk assessment and management strategies. This manuscript covers data security, model security, system and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure deployment and maintenance. Another key focus of the book is privacy and ethical considerations in AI systems. Topics covered include bias and fairness, transparency and accountability, and privacy and data protection. The book also addresses legal and regulatory compliance, providing an overview of relevant regulations and guidelines, and discussing how to ensure compliance in AI systems through case studies and best practices.This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hoboken, New Jersey : Cisco Press
    Language: English
    Pages: 1 online resource (832 pages) , illustrations
    Edition: 2nd edition.
    Series Statement: Official cert guide
    DDC: 004.6076
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Cloud computing Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Infonuagique ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant
    Abstract: Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE Security Core SCOR 350-701 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This fully updated second edition includes the latest topics and additional information covering changes to the latest CCNP and CCIE Security Core SCOR 350-701 exam. Visit ciscopress.com/newcerts for information on annual digital updates for this book that align to Cisco exam blueprint version changes. This official study guide helps you master all the topics on the CCNP and CCIE Security Core SCOR 350-701 exam, including Network security Cloud security Content security Endpoint protection and detection Secure network access Visibility and enforcement Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7. Internet access required. Pearson Test Prep offline system requirements: Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Also available from Cisco Press for CCNP Advanced Routing study is the CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide Premium Edition eBook and Practice Test, Second Edition This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test. This integrated learning package Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 28 min., 27 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can implement latest threat detection services from Cisco. Omar Santos, best-selling author of CCNA Security Cert Guide and Complete Video Course and a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), provides step-by-step coverage of the new Cisco Firepower services and explores the Cisco Next-Generation IPS appliances, Cisco ASA with Firepower services, AMP for networks, endpoints and content security, and Firepower Management Center."--Resource description page.
    Note: Title from title screen (viewed July 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (9 hr., 29 min., 8 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Electronic data processing personnel Study guides Certification ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic videos ; local ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Study guides
    Abstract: "CCNA Cyber Ops SECFND 210-250 LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-250 SECFND exam. This product walks through each topic of the exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as an associate-level Security Operations Center (SOC) Security Analyst. CCNA Cyber Ops SECFND 210-250 contains more than nine hours of instruction with 12 lessons. The videos consist of live video training, video screencasts, and demos. Video instruction throughout offers detailed explanations, tips, and design recommendations."--Resource description page.
    Note: Title and publication information from resource description page (Safari, viewed April 14, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 37 min., 51 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hackers ; Electronic videos ; local
    Abstract: "This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you'll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices."--Resource description page.
    Note: Title from title screen (viewed September 13, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780134609003 , 013460900X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Electronic data processing personnel Study guides Certification ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic books ; local ; Electronic books ; COMPUTERS ; Certification Guides ; General ; Computer networks ; Security measures ; Examinations ; Electronic data processing personnel ; Certification ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Study guides
    Abstract: CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco enterprise security experts Omar Santos, Joseph Muniz, and Stefano De Crescenzo share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep practice test software, with two full sample exams containing 120 well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. The official study guide helps you master topics on the CCNA Cyber Ops SECFND 210-250 exam, including: Network concepts Security concepts Cryptography Host-based analysis Security monitoring Attack methods
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed May 4, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...