Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson
    Language: English
    Pages: 1 online resource (1 streaming video file (5 hr., 12 min., 42 sec.)) , digital, sound, color
    Series Statement: LiveLessons
    Series Statement: The art of hacking series
    Keywords: Hackers ; Handbooks, manuals, etc ; Computer security ; Handbooks, manuals, etc ; Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic videos ; local
    Abstract: "Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career."--Resource description page.
    Note: Title from title screen (Safari, viewed February 22, 2018). - Release date from resource description page (Safari, viewed February 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780138293611 , 0138293619
    Language: English
    Pages: 1 online resource (224 pages) , illustrations
    Edition: [First edition].
    Parallel Title: Erscheint auch als
    DDC: 006.3
    Keywords: Artificial intelligence ; Internet of things ; Intelligence artificielle ; Internet des objets ; artificial intelligence
    Abstract: AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 37 min., 51 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hackers ; Electronic videos ; local
    Abstract: "This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand how an ethical hacker performs initial reconnaissance of a victim and how to assess systems and network security controls security posture. With over 10 hours of training that includes live discussions, demos, whiteboard instruction and screencasts, Security Penetration Testing Live Lessons provides expert insights of the methodologies used to assess and compromise a network. It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired and wireless network and the systems within that network. The title also covers numerous types of attacks, along with security evasion and post exploitation techniques. You will additionally learn the art of social engineering, with special coverage of tools like the social engineering tool kit (SET), Metasploit, Maltego, and many more. After that you'll take a look at guidelines for how to write a penetration testing report, with instructions for how to plan and organize those reports examples of reports including several best practices."--Resource description page.
    Note: Title from title screen (viewed September 13, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 28 min., 27 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "Learn how Cisco Advanced Malware Protection (AMP) capabilities have been integrated into the Cisco ASA with FirePOWER Services and Firepower Threat Defense. Cisco Firepower and Advanced Malware Protection LiveLessons walks you through the steps for designing, configuring, and troubleshooting Cisco ASA Firepower services so you can implement latest threat detection services from Cisco. Omar Santos, best-selling author of CCNA Security Cert Guide and Complete Video Course and a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), provides step-by-step coverage of the new Cisco Firepower services and explores the Cisco Next-Generation IPS appliances, Cisco ASA with Firepower services, AMP for networks, endpoints and content security, and Firepower Management Center."--Resource description page.
    Note: Title from title screen (viewed July 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Place of publication not identified] : Cisco Press
    Language: English
    Pages: 1 online resource (1 streaming video file (49 min., 23 sec.)) , digital, sound, color.
    Series Statement: LiveLessons
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic videos ; local
    Abstract: "The security landscape is in constant flux. Adversaries used to take months or years to compromise a network, but today only a few minutes--or even in some cases, seconds--is needed to compromise and exfiltrate data. Your only defense is to gain the knowledge you need to fully understand and prepare for the current threat landscape and how these threats are evolving. This one-hour primer on security threats in today's world will set you on the road to understanding and accessing the tools you need to understand what is happening within the threat landscape, and specifically how to begin defending your network. You will also gain insight into the underground activities that adversaries are involved in, and what return of investment they seek after exploitation."--Resource description page.
    Note: Title from title screen (viewed December 21, 2015). - "Networking talks."
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780134213071 , 0134213076
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and control you need to anticipate and meet tomorrow's threats, wherever they appear. Now, three Cisco network security experts introduce these products and solutions, and offer expert guidance for planning, deploying, and operating them. The authors present authoritative coverage of Cisco ASA with FirePOWER Services; Cisco Firepower Threat Defense (FTD); Cisco Next-Generation IPS appliances; the Cisco Web Security Appliance (WSA) with integrated Advanced Malware Protection (AMP); Cisco Email Security Appliance (ESA) with integrated Advanced Malware Protection (AMP); Cisco AMP ThreatGrid Malware Analysis and Threat Intelligence, and the Cisco Firepower Management Center (FMC). You'll find everything you need to succeed: easy-to-follow configurations, application case studies, practical triage and troubleshooting methodologies, and much more. Effectively respond to changing threat landscapes and attack continuums Design Cisco ASA with FirePOWER Services and Cisco Firepower Threat Defense (FTD) solutions Set up, configure, and troubleshoot the Cisco ASA FirePOWER Services module and Cisco Firepower Threat Defense Walk through installing AMP Private Clouds Deploy Cisco AMP for Networks, and configure malware and file policies Implement AMP for Content Security, and configure File Reputation and File Analysis Services Master Cisco AMP for Endpoints, including custom detection, application control, and policy management Make the most of the AMP ThreatGrid dynamic malware analysis engine Manage Next-Generation Security Devices with the Firepower Management Center (FMC) Plan, implement, and configure Cisco Next-Generation IPS-including performance and redundancy Create Cisco Next-Generation IPS custom reports and analyses Quickly identify the root causes of security problems
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed July 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (4 hr., 37 min., 18 sec.)) , digital, sound, color
    Series Statement: LiveLessons (Indianapolis, Ind.)
    Keywords: Electronic data processing personnel Certification ; Computer networks Security measures ; Examinations ; Computer networks ; Security measures ; Examinations ; Electronic videos ; local ; Electronic data processing personnel ; Certification ; Computer networks ; Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Examinations
    Abstract: "CCNA Cyber Ops SECOPS 210-255LiveLessons is a unique video product that provides a solid understanding of the key areas of knowledge required to pass the 210-255 SECOPS exam. This product walks through each topic of the Implementing Cisco Cybersecurity Operations exam blueprint, so you can gain the knowledge you need to pass the exam and start your career as a Security Operations Center (SOC) Security Analyst."--Resource description page.
    Note: Includes index. - Title from title screen (Safari, viewed June 26, 2017). - Description based on online resource; title from title screen (Safari, viewed June 26, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780136770091
    Language: English
    Pages: 1 online resource (800 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Learn, prepare, and practice for CompTIA Security+ SY0-601 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT certification learning and a CompTIA Authorized Platinum Partner. Master CompTIA Security+ SY0-601 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions CompTIA Security+ SY0-601 Cert Guide is a best-of-breed exam study guide. This book shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending chapter review activities help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website contains the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment software offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.
    Note: Online resource; Title from title page (viewed August 3, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780132954389 , 0132954389
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Keywords: Computer networks ; Security measures ; Firewalls (Computer security) ; Computer networks ; Access control ; Electronic books ; Electronic books ; local
    Abstract: Cisco ® ASA All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition Identify, mitigate, and respond to today's highly-sophisticated network attacks. Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services has been fully updated to cover the newest techniques and Cisco technologies for maximizing end-to-end security in your environment. Three leading Cisco security experts guide you through every step of creating a complete security plan with Cisco ASA, and then deploying, configuring, operating, and troubleshooting your solution. Fully updated for today's newest ASA releases, this edition adds new coverage of ASA 5500-X, ASA 5585-X, ASA Services Module, ASA next-generation firewall services, EtherChannel, Global ACLs, clustering, IPv6 improvements, IKEv2, AnyConnect Secure Mobility VPN clients, and more. The authors explain significant recent licensing changes; introduce enhancements to ASA IPS; and walk you through configuring IPsec, SSL VPN, and NAT/PAT. You'll learn how to apply Cisco ASA adaptive identification and mitigation services to systematically strengthen security in network environments of all sizes and types. The authors present up-to-date sample configurations, proven design scenarios, and actual debugs- all designed to help you make the most of Cisco ASA in your rapidly evolving network. Jazib Frahim, CCIE ® No. 5459 (Routing and Switching; Security), Principal Engineer in the Global Security Solutions team, guides top-tier Cisco customers in security-focused network design and implementation. He architects, develops, and launches new security services concepts. His books include Cisco SSL VPN Solutions and Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting. Omar Santos, CISSP No. 463598 , Cisco Product Security Incident Response Team (PSIRT) technical leader, leads and mentors engineers and incident managers in investigating and resolving vulnerabilities in Cisco products and protecting Cisco customers. Through 18 years in IT and cybersecurity, he has designed, implemented, and supported numerous secure networks for Fortune® 500 companies and the U.S. government. He is also the author of several other books and numerous whitepapers and articles. Andrew Ossipov, CCIE ® No. 18483 and CISSP No. 344324, is a Cisco Technical Marketing Engineer focused on firewalls, intrusion preven...
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed May 22, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Place of publication not identified] : Pearson IT Certification
    Language: English
    Pages: 1 online resource (1 streaming video file (26 hr., 40 sec.)) , digital, sound, color
    Keywords: Penetration testing (Computer security) ; Computer security ; Hacking ; Electronic videos ; local
    Abstract: "The Art of Hacking is a series of video courses that is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetration testing techniques. The videos in this series will provide step-by-step real-life scenarios, full demos and content deep dives. You will see firsthand how an ethical hacker performs initial reconnaissance of a victim and assess systems and network security controls security posture. These courses serve as comprehensive guide for any network and security professional who is starting a career in ethical hacking and penetration testing. It also can help individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), and any other ethical hacking certification. This series was built to help you learn more about general hacking methodologies and concepts as well as gain the skills required to becoming a professional ethical hacker."--Resource description page.
    Note: Title from resource description page (Safari, viewed May 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...