Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
Years
Subjects(RVK)
  • 1
    ISBN: 9780124171237
    Language: English
    Pages: 1 online resource (243 pages)
    Parallel Title: Erscheint auch als
    DDC: 305.8
    Keywords: Information technology -- Security measures ; Information technology -- Management ; Cloud computing ; Computer security ; Computer crimes -- Prevention ; Cloud computing ; Computer crimes ; Prevention ; Computer security ; Information technology ; Management ; Information technology ; Security measures ; Electronic books
    Abstract: Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements.
    Abstract: Front Cover -- Collaboration with Cloud Computing -- Copyright Page -- Contents -- Preface -- Intended audience -- Organization of this book -- Acknowledgements -- 1 The Evolving Nature of Information Security -- Introduction -- History of the Internet -- Significant security events -- Evolution of services -- Today's risks (in a Nutshell) -- Collaboration -- Conclusion -- Summary -- 2 Cloud Computing -- Introduction -- The protocols that made it possible -- HTTP and HTML -- XML -- RESTful services -- The cloud -- Infrastructure as a service -- Platform as a service -- Software as a service -- Storage -- Unified communication as a service -- Public, private, or hybrid -- Conclusion -- Summary -- 3 Software as a Service -- Introduction -- Contact lists -- Documents on the go -- Real-time editing -- Geo-diverse teams -- Agendas -- Document sharing -- Advantages -- Security considerations -- Conclusion -- Summary -- 4 Storage in the Cloud -- Introduction -- Uses of cloud storage -- Collaboration -- Large file transfer -- Backups -- Synchronization -- Security -- Privacy concerns -- Safe Harbor -- Data retention -- Data destruction -- Infrastructure -- Protecting yourself -- Encryption -- Data loss prevention -- Conclusion -- Summary -- Further reading -- 5 Virtual Servers and Platform as a Service -- Introduction -- History of virtualization -- How virtualization works -- Hypervisors -- Snapshots -- Platform as a service -- Advantages of PaaS -- Building a business -- Security considerations -- Conclusion -- Summary -- 6 Social Media -- Introduction -- History and impact of social networking -- Social networking sites -- Friendster -- MySpace -- Facebook -- Twitter -- Google+ -- Crowdsourcing -- Gamification -- Human resources -- Security considerations -- Conclusion -- Summary -- Further reading -- 7 Mobile Computing -- Introduction -- Smartphones.
    Note: Description based on publisher supplied metadata and other sources
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Waltham, Massachusetts : Syngress
    ISBN: 9780124171237 , 9780124170407
    Language: English
    Pages: Online-Ressource (1 online resource (243 pages)) , illustrations
    Edition: Online-Ausg.
    DDC: 305.8
    Keywords: Information technology Security measures ; Information technology Management ; Cloud computing ; Computer security ; Computer crimes Prevention ; Electronic books
    Note: Includes bibliographical references at the end of each chapters and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : Infinite Skills
    ISBN: 9781771374194
    Language: English
    Pages: 1 online resource (1 streaming video file (6 hr., 14 min., 33 sec.)) , digital, sound, color.
    Keywords: Linux ; Operating systems (Computers) ; Security measures ; Electronic videos ; local
    Abstract: "In this Learning Linux Security training course, expert author Ric Messier will teach you how to secure a Linux system. This course is designed for the absolute beginner, meaning no Linux Security experience is required. You will start by learning about booting, then jump into covering service management. From there, Ric will teach you about logging and log management, intrusion detection and preventions, and users and permissions. This video tutorial also covers utilities and the Linux Kernel, including Kernel modules, builds, and managing Kernel parameters. Finally, you will learn about firewalls, such as iptables, targets, rate limiting, and zones and services. Once you have completed this computer based training course, you will be fully capable of securing your own Linux system."--Resource description page.
    Note: Title from thumbnail image on resource description page (Safari, viewed July 7, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780124171237 , 0124171230
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Security measures ; Information technology ; Management ; Cloud computing ; Computer security ; Computer crimes ; Prevention ; Electronic books ; local ; Electronic books
    Abstract: Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, IN : Wiley
    ISBN: 9781119329183 , 1119329183
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way-by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light. Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communications Locate host-based artifacts and analyze network logs Understand intrusion detection systems-and let them do the legwork Have the right architecture and systems in place ahead of an incident Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed September 27, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : McGraw-Hill | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (608 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. Covers all exam topics, including: •Networking fundamentals •Network design •Cloud computing •Authentication and access control •Unix/Linux •Windows •Encryption •Risk management •Virtual machines •Vulnerability control •Malware •Incident response •Wireless technologies •Log Management •IoT and embedded devices Online content features: •Two practice exams •Test engine that provides full-length practice exams and customizable quizzes •Author videos
    Note: Online resource; Title from title page (viewed August 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (400 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine what’s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete
    Note: Online resource; Title from title page (viewed July 25, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (39 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: There’s a powerful new tool in the fight against malware. The US National Security Agency (NSA) recently released its reverse engineering framework, Ghidra, as free and open source software. This practical report explains how engineers can use Ghidra to analyze malware and determine its impact on vulnerable systems. Developers can also use this tool to get a detailed look at compiled programs. Information security experts Ric Messier and Matthew Berninger show you how Ghidra helps you to analyze compiled code on Linux, Windows, and macOS. You’ll be able to visually inspect a program, follow the path of execution, and analyze the code from function call to function call. The more you work with Ghidra, the more you’ll understand how effective this platform is. Get a feature overview of Ghidra, including a quick look into its origins Explore program use cases, including malware analysis, compiler comparison, and efficiency improvements Learn the advantages of running this Java-based framework in a container Perform code analysis by disassembling and graphing a program using Ghidra’s CodeBrowser tool Run Ghirdra on innocuous programs before analyzing code that may be infected
    Note: Online resource; Title from title page (viewed October 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Helion | Boston, MA : Safari
    Language: English , Polish
    Pages: 1 online resource (328 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Kali Linux jest specjalistyczną dystrybucją systemu Linux, którą przeznaczono do celów związanych z bezpieczeństwem IT. Udostępnia kilkaset narzędzi do między innymi testowania zabezpieczeń, tworzenia eksploitów, dekodowania aplikacji lub po prostu śledzenia nadużyć i incydentów bezpieczeństwa. Sporo z tych narzędzi pozwala na stosowanie zaawansowanych praktyk, takich jak testy penetracyjne czy techniki inżynierii wstecznej. Szerokie możliwości Kali mogą jednak przytłaczać nawet biegłych specjalistów. Tymczasem zapewnienie bezpieczeństwa IT wymaga wiedzy i umiejętności wyboru programu najwłaściwszego do wykonania potrzebnego testu. Ta książka jest praktycznym przewodnikiem po systemie Kali Linux, zawierającym szczegółowe informacje o jego możliwościach. Najwięcej uwagi poświęcono udostępnianym w nim narzędziom, które nie są zbyt popularne w innych dystrybucjach Linuksa. Poza podstawami budowy i działania systemu Kali Linux opisano tu metody testowania sieci, aplikacji WWW, sieci bezprzewodowych, siły haseł itp. Pokazano też różne techniki rozszerzania systemu o nowe narzędzia i tworzenia ich własnych zestawów, w pełni odpowiadających specyficznym potrzebom. Równolegle w książce omówiono zagadnienia bezpieczeństwa systemów IT, w tym ich podatności, które wskazują na potrzebę przeprowadzania odpowiednich testów. W tej książce: podstawy Kali Linux i testowania bezpieczeństwa techniki rekonesansu sieciowego i wyszukiwania słabych punktów eksploity i platforma Metasploit sieci bezprzewodowe: skanowanie, wstawianie ramek danych, łamanie haseł techniki zaawansowane raportowanie i wnioski z przeprowadzonych testów Kali Linux - dowiedz się, jak bezpieczny jest Twój system!
    Note: Online resource; Title from title page (viewed June 25, 2019) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Sybex | Boston, MA : Safari
    ISBN: 9781119824510
    Language: English
    Pages: 1 online resource (208 pages)
    Edition: 2nd edition
    Keywords: Electronic books
    Abstract: Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.
    Note: Online resource; Title from title page (viewed October 12, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...