Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Gregg, Michael  (3)
  • [Erscheinungsort nicht ermittelbar] : Syngress  (2)
  • Indianapolis, Ind. : Que Certification  (1)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que Certification | Boston, MA :Safari,
    ISBN: 078973446X
    Language: English
    Pages: xxix, 351 p. , ill. ; , 23 cm. +
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    DDC: 005.8
    Keywords: Electronic data processing personnel Certification ; Computer networks Study guides Examination ; Computer security ; Examinations ; Study guides ; Electronic books ; local ; Electronic data processing personnel ; Certification ; Computer networks ; Réseaux d'ordinateurs ; Examen ; Guides de l'étudiant ; Electronic books ; Study guides
    Abstract: A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066 Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2 . A perfect compliment to larger study guides, the CISSP Exam Cram 2 is a great way to find out exactly what will be expected of you during the real exam. The book includes: Exam topic-focused chapters. Practice questions at the end of each chapter. Exam Alerts that highlight key terms and areas. Two full-length practice exams. An electronic test engine provided by MeasureUp on CD-ROM with additional practice exams. The "Cram Sheet" tearcard for last minute exam review. Prepare for the CISSP certification exam with the proven Exam Cram 2 learning tools provided in the CISSP Exam Cram 2 .
    Note: "Covers the fall 2005 exam"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780080553566
    Language: English
    Pages: 1 online resource (528 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of standards against which to measure. * Install and Configure Snort and Wireshark Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations. * Explore Snort Add-Ons Use tools like Oinkmaster to automatically keep Snort signature files current. * Troubleshoot Network Problems See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP. * Learn Defensive Monitoring Considerations See how to define your wireless network boundaries, and monitor to know if they're being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't
    Note: Online resource; Title from title page (viewed April 18, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781597492249
    Language: English
    Pages: 1 online resource (480 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions. * Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
    Note: Online resource; Title from title page (viewed April 18, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...