Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (26 hr., 40 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Electronic videos ; local
    Abstract: "The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (7 hr., 3 min., 7 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "This live video introduces Cisco ASA solutions to overcoming obstacles by providing complete configuration and troubleshooting guidance. Cisco ASA 5500-X Series Next-Generation Firewalls LiveLessons (Workshop) is the definitive insider's guide to planning, installing, configuring, and maintaining the new Cisco ASA firewall features."--Resource description page.
    Note: Title from resource description page (viewed May 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Title: 安全渗透测试.
    Language: Chinese
    Pages: 1 online resource (1 video file (10 hr., 45 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: LiveLessons
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Hackers ; Computer Security ; Tests d'intrusion ; Sécurité informatique ; Pirates informatiques ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Detailed summary in vernacular field.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 30, 2022) , Dubbed in Chinese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Title: 黑客网络应用 : : 网络侵入应用.
    Language: Chinese
    Pages: 1 online resource (1 video file (4 hr., 46 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: LiveLessons
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Computer networks Security measures ; Hacking ; Computer Security ; Tests d'intrusion ; Sécurité informatique ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Piratage informatique ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Detailed summary in vernacular field.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 14, 2022) , Dubbed in Chinese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Title: 企业渗透测试和持续监控.
    Language: Chinese
    Pages: 1 online resource (1 video file (3 hr., 17 min.)) , sound, color.
    Edition: [First edition].
    Series Statement: LiveLessons
    DDC: 005.8
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Computer networks Security measures ; Computer Security ; Tests d'intrusion ; Sécurité informatique ; Piratage informatique ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Instructional films ; Nonfiction films ; Internet videos ; Films de formation ; Films autres que de fiction ; Vidéos sur Internet ; Webcast
    Abstract: Detailed summary in vernacular field.
    Note: Online resource; title from title details screen (O'Reilly, viewed March 14, 2022) , Dubbed in Chinese.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 26 hr., 15 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local ; Electronic videos
    Abstract: More than 25 Hours of Expert Video Instruction This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and fundamentals of networking and security basics; cybersecurity management, monitoring and analysis; network security telemetry; digital forensics and incident response (DFIR); fundamentals of ethical hacking and penetration testing; advanced wireless hacking and pen testing; mobile device security, and IoT Security. This Complete Video Course provides a complete learning path for building your skills as a cyber security professional. You will start with the fundamental concepts, so you can increase your core knowledge before quickly moving on to actually working through pen testing and ethical hacking projects—so you can start to build your skills. Omar Santos, best-selling Cisco Press and Pearson security author and trainer, has compiled the lessons in this title from other training courses. You will find that the lessons build on each in an easy-to-follow organization, so you can move through the topics at your own pace. This course provides supplemental material to reinforce some of the critical concepts and techniques that the reader has learned and provides scripts that help you build your own hacking environment, examples of real-life penetration testing reports, and more. This material can be found at theartofhacking.org. Topics include: Module 1: Networking and Security Basics Module 2: Cybersecurity Management, Monitoring, and Analysis Module 3: Network Security Telemetry Module 4: Digital Forensics and Incident Response (DFIR) Module 5: Fundamentals of Ethical Hacking and Penetration Testing Module 6: Advanced Wireless Hacking and Penetration Testing Module 7: Mobile Device Security Module 8: Internet of Things (IoT) Security About the Instructor Omar Santos is an active member of the cyber security community, where he leads several industry-wide initiatives and standards bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to increasing the security of their critical infrastructures. Omar is the author of more than a dozen books and video courses, as well as numerous white papers, articles, and security configuration guidelines and best practices. Omar is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers ...
    Note: Online resource; Title from title screen (viewed April 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (5 hr., 12 min., 42 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Series Statement: The art of hacking series
    Keywords: Hackers ; Handbooks, manuals, etc ; Computer security ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic videos ; local
    Abstract: "Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career."--Resource description page.
    Note: Title from title screen (Safari, viewed February 22, 2018). - Release date from resource description page (Safari, viewed February 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780138293611 , 0138293619
    Language: English
    Pages: 1 online resource (224 pages) , illustrations
    Edition: [First edition].
    Parallel Title: Erscheint auch als
    DDC: 006.3
    Keywords: Artificial intelligence ; Internet of things ; Intelligence artificielle ; Internet des objets ; artificial intelligence
    Abstract: AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135305409
    Language: English
    Pages: 1 online resource (706 pages)
    Edition: 1st edition
    Keywords: Penetration testing (Computer security) Study guides Examinations ; Computer security Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Electronic books ; local ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 10 exam and advance your career in IT security. The authors' concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions…going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets
    Note: Online resource; Title from title page (viewed August 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780136770091
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner. Master CompTIA Security+ SY0-601 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions CompTIA Security+ SY0-601 Cert Guide is a best-of-breed exam study guide. This book shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment software offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
    Note: Online resource; Title from title page (viewed August 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...