Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    ISBN: 9781587141010 , 1587141019
    Language: English
    Pages: 1 online resource (xxv, 1119 p.) , ill.
    Edition: 2nd ed.
    Series Statement: Cisco Press networking technology series
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance , Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting security with Cisco ASA. Written by two leading Cisco security experts, this book presents each Cisco ASA solution in depth, offering comprehensive sample configurations, proven troubleshooting methodologies, and debugging examples. Readers will learn about the Cisco ASA Firewall solution and capabilities; secure configuration and troubleshooting of site-to-site and remote access VPNs; Intrusion Prevention System features built into Cisco ASA's Advanced Inspection and Prevention Security Services Module (AIP-SSM); and Anti-X features in the ASA Content Security and Control Security Services Module (CSC-SSM). This new edition has been updated with detailed information on the latest ASA models and features. Everything network professionals need to know to identify, mitigate, and respond to network attacks with Cisco ASA Includes detailed configuration examples, with screenshots and command line references Covers the ASA 8.2 release Presents complete troubleshooting methodologies and architectural references
    Note: Description based on print version record. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (26 hr., 40 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Electronic videos ; local
    Abstract: "The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [London, England] : Pearson IT Certification
    ISBN: 9780137949397 , 0137949391
    Language: English
    Pages: 1 online resource (1 video file (26 hr., 36 min.)) , sound, color.
    Edition: 2nd edition.
    Series Statement: LiveLessons
    DDC: 005.8
    Keywords: Computer security ; Computer networks Security measures ; Information technology Security measures ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: The Complete Cybersecurity Bootcamp, 2nd Edition is your comprehensive guide to becoming a cybersecurity professional. The extensive course is compiled from Omar Santo's best-selling video courses, starting with the basics and leading you through the most important topics in the cybersecurity landscape. The videos in this intensive bootcamp are structured to help you start with the fundamental concepts of cybersecurity and then build your core cybersecurity knowledge and move on to real-life pen testing and ethical hacking projects. It also covers cloud security, cybersecurity management, monitoring and analysis, network security telemetry, digital forensics and incident response (DFIR), ethical hacking and pen testing, wireless hacking and pen testing, mobile device security, and IoT security. This course can also be a resource for anyone who is preparing for security certification like CompTIA Security+, Cisco CyberOps Associate, CISSP, CompTIA PenTest+, Certified Ethical Hacker (CEH), GIAC certifications, or others.
    Note: Online resource; title from title details screen (O’Reilly, viewed June 2, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    ISBN: 9780138230364 , 0138230366
    Language: English
    Pages: 1 online resource (1 video file (3 hr., 5 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: Live lessons
    Series Statement: Complete video course
    DDC: 005.8
    Keywords: Microsoft Corporation Study guides Examinations ; Computer security Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Instructional films ; Nonfiction films ; Internet videos
    Abstract: 3+ hours of video training covering all the objectives of the new (ISC)℗ø exam Certified in Cybersecurity (ISC)℗ø Complete Video Course gives you the foundational cybersecurity knowledge and skills needed to get the ISC℗ø Certified in Cybersecurity certification. The course covers all the subjects you need to pass the ISC℗ø CC exam and start your cybersecurity journey. With a focus on core concepts and practical skills--demonstrated through real-world demos throughout--this is the training you need to successfully study for the exam and start your cybersecurity career. The course starts with an overview of the (ISC)℗ø Certified in Cybersecurity exam, exploring best practices to prepare for the exam and insights into security basics. There's never been a better time to get certified in cybersecurity. Topics covered include: Exam preparation explores the (ISC)℗ø Certified in Cybersecurity exam, and discusses tips to prepare for the exam and go over the (ISC)℗ø Code of Ethics Security principles explores the security concepts of information assurance. You will also learn about risk management processes, different security controls, cybersecurity governance and related processes. Business Continuity, Disaster Recovery, and Incident Response Concepts starts with an overview of business continuity and disaster recovery, and before going deep into principles of incident response. Access Control Concepts is all about different physical access controls, explore the principle of least privilege, and gain an understanding of the concept of segregation of duties. Network Security starts with an overview of computer networking, network threats, and related cyber-attacks and goes deeper into network security infrastructure and network segmentation. Security Operations is Lesson 6 starting with an overview of data security and system hardening, security policies are created, and the importance of security awareness training. About the Instructor Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives. He is the lead of the DEF CON Red Team Village; the chair of the Common Security Advisory Framework (CSAF) technical committee; the co-chair of the Forum of Incident Response and Security Teams (FIRST) Open Source Security working group; and has been the chair of several initiatives in the Industry Consortium for Advancement of Security on the Internet (ICASI). His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than twenty books and video courses, as well as numerous whitepapers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. Additional information about Omar's current projects can be found at omarsantos.io, and you can follow Omar on Twitter santosomar. Skill Level: Beginner Learn How To: Pass the ISC2 Certification in Cybersecurity exam Understand the security concepts of Information Assurance Understand the Risk Management Process Understand Security Controls and Data Security Understand Governance Processes Understand Computer Networking Course requirement: None Who Should Take This Course: Anyone contemplating starting a career in cyber security Anyone who would like to better understand cyber security concepts Anyone interested in gaining their first cybersecurity certification About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed April 11, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Hoboken, New Jersey : Cisco Press
    Language: English
    Pages: 1 online resource (832 pages) , illustrations
    Edition: 2nd edition.
    Series Statement: Official cert guide
    DDC: 004.6076
    Keywords: Computer networks Study guides Security measures ; Examinations ; Computer security Study guides Examinations ; Cloud computing Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Infonuagique ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant
    Abstract: Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE Security Core SCOR 350-701 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Omar Santos shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which let you decide how much time you need to spend on each section Exam Topic lists that make referencing easy Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep Practice Test software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Content Update Program: This fully updated second edition includes the latest topics and additional information covering changes to the latest CCNP and CCIE Security Core SCOR 350-701 exam. Visit ciscopress.com/newcerts for information on annual digital updates for this book that align to Cisco exam blueprint version changes. This official study guide helps you master all the topics on the CCNP and CCIE Security Core SCOR 350-701 exam, including Network security Cloud security Content security Endpoint protection and detection Secure network access Visibility and enforcement Companion Website: The companion website contains more than 200 unique practice exam questions, practice exercises, and a study planner Pearson Test Prep online system requirements: Browsers: Chrome version 73 and above, Safari version 12 and above, Microsoft Edge 44 and above. Devices: Desktop and laptop computers, tablets running Android v8.0 and above or iPadOS v13 and above, smartphones running Android v8.0 and above or iOS v13 and above with a minimum screen size of 4.7. Internet access required. Pearson Test Prep offline system requirements: Windows 11, Windows 10, Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Also available from Cisco Press for CCNP Advanced Routing study is the CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide Premium Edition eBook and Practice Test, Second Edition This digital-only certification preparation product combines an eBook with enhanced Pearson Test Prep Practice Test. This integrated learning package Enables you to focus on individual topic areas or take complete, timed exams Includes direct links from each question to detailed tutorials to help you understand the concepts behind the questions Provides unique sets of exam-realistic practice questions Tracks your performance and provides feedback on a module-by-module basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780135619902 , 0135619904
    Language: English
    Pages: 1 online resource
    DDC: 005.8
    Keywords: Computer networks Security measures ; Computer crimes Prevention ; Réseaux d'ordinateurs ; Sécurité ; Mesures
    Abstract: This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. Writing for security and network professionals, managers, and other stakeholders, the authors cover: How SOCs have evolved, and todays key considerations in deploying them Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, investigation, forensics, and compliance People and process issues, including training, career development, job rotation, and hiring Centralizing and managing security data more effectively Threat intelligence and threat hunting Incident response, recovery, and vulnerability management Using data orchestration and playbooks to automate and control the response to any situation Advanced tools, including SIEM 2.0 The future of SOCs, including AI-Assisted SOCs, machine learning, and training models Note: This books author, Joseph Muniz, was also lead author of Security Operations Center: Building, Operating, and Maintaining your SOC (Cisco Press). The Modern Security Operations Center is an entirely new and fully vendor-neutral book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Language: English
    Pages: 1 online resource (336 pages) , illustrations
    Edition: [First edition].
    DDC: 005.8
    Keywords: Artificial intelligence Computer programs ; Security measures ; Computer networks Security measures ; Natural language generation (Computer science) ; Intelligence artificielle ; Logiciels ; Sécurité ; Mesures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Génération automatique de texte
    Abstract: This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly. The book is divided into several sections, each focusing on a specific aspect of AI. It begins by introducing the fundamentals of AI technolgies, providing an overview of their history, development, and various types. This is followed by a deep dive into popular AI algorithms and large language models (LLMs), including GPT-4, that are at the forefront of AI innovation. Next, the book explores the critical security aspects of AI systems, examining the importance of security and the key challenges faced in this domain. It also delves into the common threats, vulnerabilities, and attack vectors, as well as risk assessment and management strategies. This manuscript covers data security, model security, system and infrastructure security, secure development practices, monitoring and auditing, supply chain security, and secure deployment and maintenance. Another key focus of the book is privacy and ethical considerations in AI systems. Topics covered include bias and fairness, transparency and accountability, and privacy and data protection. The book also addresses legal and regulatory compliance, providing an overview of relevant regulations and guidelines, and discussing how to ensure compliance in AI systems through case studies and best practices.This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    ISBN: 9780138319090 , 013831909X
    Language: English
    Pages: 1 online resource (1 video file (2 hr., 52 min.)) , sound, color.
    Edition: [First edition].
    DDC: 005.8
    Keywords: Computer security ; Sécurité informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet
    Abstract: 3 Hours of Video Instruction Practice and enhance your Ethical Hacking and Defensive Security Skills! Take your first step to building your very own cybersecurity lab and preparing for the future of cybersecurity. Building the Ultimate Cybersecurity Lab and Cyber Range is a vital resource for anyone serious about learning hands-on cyber skills. It is also an essential resource to study for a variety of cybersecurity certifications, including Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, or CCNP Security. The course serves as a comprehensive guide for those beginning their journey in penetration testing, exploit development, or malware reverse engineering; it covers how to build yourown virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem. Sign up for cybersecurity live training classes by Omar Santos https://learning.oreilly.com/search/?q=omar%20santos%20cybersecurity&type=live-event-series&publishers=Pearson Topics covered: How to create a lab for offensive and defensive cybersecurity concepts Learning and obtaining access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems Learning how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range Learning how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean. About the Instructor: Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs. Skill Level: Beginner to Intermediate Learn How To: Build virtual, physical, or cloud-based cybersecurity lab. Use tools like Vagrant, Terraform, and Ansible to automate complex and repetitive tasks. Practice safe and refine a variety of offensive and defensive cybersecurity techniques. Get skillset to deploy and manage secure environments on various platforms and cloud services. Course requirement: Course participants should have a basic understanding of computing and networking. Supplemental information and additional material for this course can be accessed at https://h4cker.org/labs Who Should Take This Course: You are interested in cybersecurity You are preparing for the cybersecurity certifications You want to learn about the different ways that you can practice your skills in a safe environment You want to learn different tips on how to create multiple About Pearson Video Training: Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
    Note: Online resource; title from title details screen (O'Reilly, viewed January 3, 2023)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 40 min., 1 sec.)) , digital, sound, color.
    Series Statement: Livelessons
    Keywords: Computer security ; Big data ; Electronic videos ; local
    Abstract: "Cisco NetFlow for Cyber Security Big Data Analytics walks you through the steps for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security. Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Cisco NetFlow LiveLessons is a key resource for understanding the power behind the Cisco NetFlow solution."--Resource description page.
    Note: Title from title screen (viewed May 6, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press
    ISBN: 9780134077857 , 0134077857
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Electronic data processing personnel ; Certification ; Study guides ; Computer networks ; Security measures ; Examinations ; Study guides ; Electronic books ; Electronic books ; local
    Abstract: CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam. Cisco Security experts Omar Santos and John Stuppi share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCNA Security 210-260 Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. A list of official exam topics makes referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. The companion CD-ROM contains the powerful Pearson IT Certification Practice Test engine that enables you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a chapter-by-chapter basis, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The CD also contains 90 minutes of video training on CCP, NAT, object groups, ACLs, port security on a Layer 2 switch, CP3L, and zone-based firewalls. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCNA Security 210-260 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit http://www.cisco.com/web/learning/index.html. The official study guide helps you master all the topics on the CCNA Security Implementing Cisco Network Security (IINS) 210-260 exam, including Security concepts and threats Implementing AAA using IOS and ISE Bring Your Own Device (BYOD) VPN technology and cryptography IP security Implementing IP...
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed September 16, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...