Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Gregg, Michael  (4)
  • Computer networks ; Security measures  (4)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Wiley
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Evaluation ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. Get acquainted with your hardware, gear, and test platform Learn how attackers penetrate existing security systems Detect malicious activity and build effective defenses Investigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide.
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [United States?] : Pearson Education
    ISBN: 9780133034486 , 0133034488
    Language: English
    Pages: 1 online resource (1 v.)
    Edition: 3rd ed.
    Series Statement: Exam cram
    Parallel Title: Erscheint auch als
    DDC: 004.6
    Keywords: Information technology Security measures ; Computer security Management ; Computer networks Security measures ; Data protection ; Electronic data processing personnel ; Certification ; Computer networks ; Examinations ; Study guides ; Electronic books ; Electronic books ; local ; Technologie de l'information ; Sécurité ; Mesures ; Sécurité informatique ; Gestion ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Protection de l'information (Informatique) ; Computer networks ; Security measures ; Computer security ; Management ; Data protection ; Information technology ; Security measures
    Abstract: The Publisher regrets that the CD/DVD content for this title cannot be made available Online. CISSP Practice Questions Exam Cram , Third Edition complements any CISSP study plan with 1,001 practice test questions in the book-all supported by complete explanations of every answer. This package's highly realistic questions cover every area of knowledge for the new CISSP exam. Covers the critical information you'll need to know to score higher on your CISSP exam! Features 1,001 questions, organized to reflect the current CISSP exam objectives so you can easily assess your knowledge of every topic. Each question includes a detailed answer explanation. Provides complete coverage of the Common Body of Knowledge (CBK). Use our innovative Quick Check Answer Key ™ to quickly find answers as you work your way through the questions.
    Note: Description based on online resource; title from title page (Safari, viewed June 21, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780080507743 , 0080507743
    Language: English
    Pages: 1 online resource (xxvi, 442, [12] p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Electronic books
    Abstract: This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack. * Remember being a child and wanting to take something apart, like a phone, to see how it worked? This book is for you then as it details how specific hacker tools and techniques accomplish the things they do. * This book will not only give you knowledge of security tools but will provide you the ability to design more robust security solutions * Anyone can tell you what a tool does but this book shows you how the tool works
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, Mass. :Safari Books Online
    ISBN: 0672328097
    Language: English
    Pages: 312 p
    Keywords: Computer security ; Evaluation ; Methodology ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...