Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Messier, Ric  (41)
  • Safari, an O'Reilly Media Company  (1)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
Fachgebiete(RVK)
  • 1
    Online-Ressource
    Online-Ressource
    Rockland, MA : William Andrew
    ISBN: 9780124171237
    Sprache: Englisch
    Seiten: 1 online resource (243 pages)
    Paralleltitel: Erscheint auch als
    DDC: 305.8
    Schlagwort(e): Information technology -- Security measures ; Information technology -- Management ; Cloud computing ; Computer security ; Computer crimes -- Prevention ; Cloud computing ; Computer crimes ; Prevention ; Computer security ; Information technology ; Management ; Information technology ; Security measures ; Electronic books
    Kurzfassung: Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies Explores the risks associated with the use of social media to the enterprise network Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements.
    Kurzfassung: Front Cover -- Collaboration with Cloud Computing -- Copyright Page -- Contents -- Preface -- Intended audience -- Organization of this book -- Acknowledgements -- 1 The Evolving Nature of Information Security -- Introduction -- History of the Internet -- Significant security events -- Evolution of services -- Today's risks (in a Nutshell) -- Collaboration -- Conclusion -- Summary -- 2 Cloud Computing -- Introduction -- The protocols that made it possible -- HTTP and HTML -- XML -- RESTful services -- The cloud -- Infrastructure as a service -- Platform as a service -- Software as a service -- Storage -- Unified communication as a service -- Public, private, or hybrid -- Conclusion -- Summary -- 3 Software as a Service -- Introduction -- Contact lists -- Documents on the go -- Real-time editing -- Geo-diverse teams -- Agendas -- Document sharing -- Advantages -- Security considerations -- Conclusion -- Summary -- 4 Storage in the Cloud -- Introduction -- Uses of cloud storage -- Collaboration -- Large file transfer -- Backups -- Synchronization -- Security -- Privacy concerns -- Safe Harbor -- Data retention -- Data destruction -- Infrastructure -- Protecting yourself -- Encryption -- Data loss prevention -- Conclusion -- Summary -- Further reading -- 5 Virtual Servers and Platform as a Service -- Introduction -- History of virtualization -- How virtualization works -- Hypervisors -- Snapshots -- Platform as a service -- Advantages of PaaS -- Building a business -- Security considerations -- Conclusion -- Summary -- 6 Social Media -- Introduction -- History and impact of social networking -- Social networking sites -- Friendster -- MySpace -- Facebook -- Twitter -- Google+ -- Crowdsourcing -- Gamification -- Human resources -- Security considerations -- Conclusion -- Summary -- Further reading -- 7 Mobile Computing -- Introduction -- Smartphones.
    Anmerkung: Description based on publisher supplied metadata and other sources
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Waltham, Massachusetts : Syngress
    ISBN: 9780124171237 , 9780124170407
    Sprache: Englisch
    Seiten: Online-Ressource (1 online resource (243 pages)) , illustrations
    Ausgabe: Online-Ausg.
    DDC: 305.8
    Schlagwort(e): Information technology Security measures ; Information technology Management ; Cloud computing ; Computer security ; Computer crimes Prevention ; Electronic books
    Anmerkung: Includes bibliographical references at the end of each chapters and index. - Description based on print version record
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Sybex | Boston, MA : Safari
    ISBN: 9781119800286
    Sprache: Englisch
    Seiten: 1 online resource (704 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to function like an attacker, allowing you to identify vulnerabilities so they can be remediated Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2020 CEH v11 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v11 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
    Anmerkung: Online resource; Title from title page (viewed August 3, 2021) , Mode of access: World Wide Web.
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492029144 , 1492029149
    Sprache: Englisch
    Seiten: 1 online resource (1 video file (1 hr., 26 min.)) , sound, color.
    Ausgabe: [First edition].
    DDC: 025.04
    Schlagwort(e): Memory management (Computer science) ; Computer security ; Hacking ; Computer networks Security measures ; Computer crimes Investigation ; Instructional films ; Nonfiction films ; Internet videos
    Kurzfassung: Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. In this course, entry- to intermediate-level IT professionals as well as law enforcement personnel can learn to use tools like Volatility and Rekall to acquire memory images from Windows, Linux, and macOS systems and examine them for signs of malware and other abnormalities. You'll see the techniques needed to conduct digital forensic work, such as identifying running processes, and more.
    Anmerkung: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492030881 , 1492030880
    Sprache: Englisch
    Seiten: 1 online resource (1 video file (1 hr., 38 min.)) , sound, color.
    Ausgabe: [First edition].
    DDC: 005.3
    Schlagwort(e): Kali Linux ; Application software Security measures ; Internet Security measures ; World Wide Web Security measures ; Instructional films ; Nonfiction films ; Internet videos
    Kurzfassung: Most businesses today use web applications to interact with their customers. These web applications can provide hackers with the entry points they use to attack internal business systems, allowing the possibility of data theft or corruption. This video, designed for entry to intermediate-level security engineers, describes the vulnerabilities often found in web apps, shows you the techniques hackers typically use to exploit those vulnerabilities, and explains the processes and toolsets you can use to test for and remediate against those vulnerabilities. Participants should have access to Kali Linux before starting the course. Understand how to identify web-based vulnerabilities and remediate against them Explore hacker techniques like cross site scripting, SQL injection, and command injection Learn how to identify web app misconfigurations and how to correct them Survey web app vulnerability analysis tools like HackBar, XSS Rays, and PageXray Discover techniques and toolsets (SSLScanner, Google Hacking, etc.) that test for vulnerabilities Ric Messier (GCIH, GSEC, CEH, CISSP) is the Director for Cyber Academic Programs at Circadence. He has decades of information security experience and is the author of dozens of O'Reilly titles on infosec and digital forensics, including Introduction to Penetration Testing and Learning Linux Security. He holds a BS in Information Technology from the University of Massachusetts, an MS in Digital Forensic Science from Champlain College, and a PhD in Information Assurance and Security from Capella University.
    Anmerkung: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : O'Reilly Media, Inc.
    ISBN: 9781492029182 , 1492029181
    Sprache: Englisch
    Seiten: 1 online resource (1 video file (1 hr., 33 min.)) , sound, color.
    Ausgabe: [First edition].
    DDC: 363.25/968
    Schlagwort(e): Computer crimes Investigation ; Computer networks Security measures ; Computer security ; Instructional films ; Nonfiction films ; Internet videos
    Kurzfassung: In our globally connected and online world today, massive amounts of data flow across countless networks. Much of that data is ephemeral, meaning that after it has passed across the network, it's gone. For law enforcement and IT professionals who are engaged in digital forensic investigations, understanding how to read the data transmitted on a network is crucial to carrying out their task. This is especially important in the case of incident response and corporate investigations and can help in identifying unauthorized intrusions on a network. If want to become part of the ever-growing ranks of digital investigators and you have entry- to intermediate-level computer skills, this course will show you how to use the industry-favorite tool Wireshark to capture and analyze network traffic. You'll learn how to extract files from the "packets" that make up digital transmissions over a network. And, you'll see how to locate and identify the important header information and metadata contained in those packets.
    Anmerkung: Online resource; title from title details screen (O'Reilly, viewed October 18, 2022)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Indianapolis, IN : Wiley
    ISBN: 9781119329183 , 1119329183
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations
    Schlagwort(e): Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; Electronic books ; local
    Kurzfassung: Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way-by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light. Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communications Locate host-based artifacts and analyze network logs Understand intrusion detection systems-and let them do the legwork Have the right architecture and systems in place ahead of an incident Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
    Anmerkung: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed September 27, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : O'Reilly Media
    Sprache: Englisch
    Seiten: 1 online resource (1 streaming video file (17 hr., 30 min., 26 sec.)) , digital, sound, color
    Schlagwort(e): Computer networks Security measures ; Computer networks ; Computer Communication Networks ; Electronic videos ; local ; Computer networks ; Security measures ; Computer networks ; Réseaux d'ordinateurs ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Electronic videos
    Kurzfassung: "Networking is a complex but essential area of study for system administrators. This Learning Path covers the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. A basic understanding of system administration is recommended for this Learning Path."--Resource description page.
    Anmerkung: Title and publication information from resource description page (Safari, viewed March 14, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] : O'Reilly Media
    ISBN: 9781491957875 , 1491957875
    Sprache: Englisch
    Seiten: 1 online resource (1 streaming video file (34 hr., 48 min.)) , digital, sound, color
    Schlagwort(e): Internet videos ; Streaming video ; Computer security ; Hacking ; Computer crimes ; Investigation ; Cloud computing ; Electronic videos ; local ; Vidéos sur Internet ; Vidéo en continu ; streaming video ; Internet videos ; Streaming video ; Electronic videos
    Kurzfassung: "If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you'll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you'll know how to secure your data and keep it that way."--Resource description page.
    Anmerkung: Title and publication information from resource description page (Safari, viewed March 16, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (400 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine what’s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete
    Anmerkung: Online resource; Title from title page (viewed July 25, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...