Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Messier, Ric  (6)
  • Computer networks ; Security measures  (6)
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Wiley
    ISBN: 9781119329183 , 1119329183
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way-by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light. Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. Investigate packet captures to examine network communications Locate host-based artifacts and analyze network logs Understand intrusion detection systems-and let them do the legwork Have the right architecture and systems in place ahead of an incident Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed September 27, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Language: English
    Pages: 1 online resource (1 streaming video file (2 hr., 48 min., 30 sec.)) , digital, sound, color
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic videos ; local
    Abstract: "An outsider might be inside your network and ready to release attack traffic. A disgruntled employee might be inside your system and ready to delete files. You're a systems or network admin and it's your job to prevent these types of malicious events. Where do you begin? A good start is knowing with some certainty that the attackers are even present and a good intrusion detection system will do just that. In this video, security expert Ric Messier explains why intrusion detection systems are necessary, what they do, how they work, where to find them, and how to implement them."--Resource description page.
    Note: Title from title screen (viewed July 28, 2016). - Date of publication from resource description page
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly
    ISBN: 9781491955147
    Language: English
    Pages: 1 online resource (1 streaming video file (47 min., 11 sec.)) , digital, sound, color
    Keywords: Computer networks ; Security measures ; Computer security ; Management ; Data protection ; Management ; Electronic videos ; local
    Abstract: "Headlines are filled with stories of businesses and agencies that have been breached. The FBI director has said there are two types of companies--those that have been breached and those that don't know it yet. Attacks against your business are inevitable. Are you prepared for when they happen? Have you taken steps to be able to determine that the breach has occurred so you aren't one of those companies where your adversary has been inside your perimeter for many years without your awareness? Make sure you are prepared with practical steps to not only protect yourself against attack but also to detect a breach once it's happened. Finally, how do you clean up to make sure the adversaries are out of your systems and network but that you have fixed the hole they managed to get in through? The talk will cover the following areas: Preparing your defenses; Improving your visibility; Detecting the breach; Alerting and automation; Preparing your response; Clean up and feedback loops."--Resource description page.
    Note: Title from title screen (viewed February 15, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Place of publication not identified] : O'Reilly Media
    Language: English
    Pages: 1 online resource (1 streaming video file (17 hr., 30 min., 26 sec.)) , digital, sound, color
    Keywords: Computer networks Security measures ; Computer networks ; Computer Communication Networks ; Electronic videos ; local ; Computer networks ; Security measures ; Computer networks ; Réseaux d'ordinateurs ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Electronic videos
    Abstract: "Networking is a complex but essential area of study for system administrators. This Learning Path covers the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; end-to-end data; network security; and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. A basic understanding of system administration is recommended for this Learning Path."--Resource description page.
    Note: Title and publication information from resource description page (Safari, viewed March 14, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : InfiniteSkills
    ISBN: 9781771370615
    Language: English
    Pages: 1 streaming video file (10 hr., 55 min., 31 sec.) , digital, sd., col.
    Keywords: Computer crimes ; Investigation ; Computer security ; Computer networks ; Security measures ; Forensic sciences ; Electronic videos ; local
    Abstract: "This Computer forensics training course is taught by expert Ric Messier. The course teaches you how to get started in this industry. Computer forensics is a broad topic that touches on many different skills, all specific to answering legal or investigative questions in relation to a computer. Ric will give you an overview of the skills you will need in order to work in this highly technical field. Because computer forensics is a broad field, this course covers a lot of topics, from preparing for an investigation, to ethics, to evidence acquisition, being an expert witness and legal vs. corporate investigations. You will learn about forensic tools and how they are used, such as ProDiscover, FTK, and EnCase. This video tutorial covers wireless network investigations, malware and collecting network evidence. You will also learn about UNIX, Windows, Linux and Mac OS, in order to understand where to look for and recover evidence from. By the conclusion of this computer based tutorial for computer forensics, you will have a clear understanding of what it takes to be a computer forensics investigator, and the tools and techniques available to you to find the evidence you will be looking for."--Resource description page.
    Note: Title from resource description page (viewed May 1, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : InfiniteSkills
    ISBN: 9781771370349
    Language: English
    Pages: 1 streaming video file (10 hr., 23 min., 34 sec.) , digital, sd., col.
    Keywords: Computer security ; Computer networks ; Security measures ; Electronic videos ; local
    Abstract: "In this Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial. By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers."--Resource description page.
    Note: Title from resource description page (viewed Mar. 14, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...