Catalog Search Results
Author
Series
Language
English
Description
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you &...
Author
Publisher
Que
Language
English
Description
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
Author
Publisher
Apress
Pub. Date
[2020]
Physical Desc
1 online resource (xix, 164 pages) : illustrations
Language
English
Description
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace,...
Author
Publisher
Apress
Physical Desc
1 online resource
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and...
Author
Publisher
Pearson IT Certification
Language
English
Description
Master Your Knowledge of the CISSP Exam! Features more than 500 questions, organized to reflect the current CISSP exam objectives, so you can easily assess your knowledge of every topic. Each question includes a detailed answer explanation. Provides complete coverage of the Common Body of Knowledge (CBK). Use our innovative Quick Check Answer Key to quickly find answers as you work your way through the questions. WRITTEN BY A LEADING CISSP EXPERT...
Author
Publisher
Helion
Pub. Date
©2012
Physical Desc
1 online resource (1 volume) : illustrations
Language
Polish
Description
Zadbaj o bezpiecze?stwo swojego komputera
Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniajšce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany sposób. Okazuje si? wówczas,?e skaner wykrywa dziesištki, a nawet setki wirusów,Author
Publisher
Packt Publishing Limited
Pub. Date
2021.
Physical Desc
1 online resource
Language
English
Description
Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examples. Elastic Security is an open solution that equips professionals with the tools to prevent, detect, and respond to threats. Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working...
Author
Publisher
Addison-Wesley
Pub. Date
2007
Physical Desc
1 online resource
Language
English
Description
"In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you'll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you've never deployed a honeypot before." "You'll learn through examples, including Honeyd, the acclaimed virtual honeypot created by coauthor Niels Provos. The authors also present multiple...
Author
Publisher
Dpunkt.verlag
Pub. Date
2012
Physical Desc
1 online resource (129 pages).
Language
Deutsch
Description
HauptbeschreibungDurch die zunehmende Vernetzung von privatwirtschaftlichen Unternehmen und öffentlichen Einrichtungen mit ihren jeweiligen Zulieferern und Kunden sind heute deren Geschäftstätigkeiten ohne IT-Systeme nicht mehr darstellbar. Auch Privatpersonen wickeln in steigendem Umfang Angelegenheiten des täglichen Lebens unter Einsatz von IT-Systemen ab. Der damit verbundenen IT-geschützten Speicherung und Verarbeitung von Unternehmensdaten...
Author
Publisher
Que
Pub. Date
2001.
Edition
1st edition.
Physical Desc
1 online resource (296 pages)
Language
English
Description
Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in order to make and keep their Solaris 8 systems secure. This includes not only Solaris 8 security tools and features, but such subjects as cryptography and defenses against known attacks and vulnerabilities. Readers learn practical, command-level defenses, such as: How to configure a secure DNS server What to do with /etc/inet/inetd.conf How to make IPsec...
Author
Series
Publisher
IBM Corporation, International Technical Support Organization
Pub. Date
2018.
Edition
Fourth edition.
Physical Desc
1 online resource (1 volume) : illustrations
Language
English
Description
Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats...
15) Threat hunting in the cloud: defending AWS, Azure and other cloud platforms against cyberattacks
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
[2022]
Physical Desc
1 online resource (xxxix, 504 pages) : illustrations
Language
English
Description
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource...
Author
Publisher
InfiniteSkills
Pub. Date
2014
Physical Desc
1 online resource (1 streaming video file (9 hr., 8 min., 2 sec.))
Language
English
Description
"In this CompTIA Security+ training course, expert author Mark Long will teach you everything you need to know to prepare for a career in IT security, and successfully complete the CompTIA Security+ certification."--Resource description page.
Author
Publisher
O'Reilly
Pub. Date
[2015]
Physical Desc
1 online resource (1 streaming video file (1 hr., 5 min., 54 sec.)) : digital, sound, color
Language
English
Description
"Creating, using, and evaluating cybersecurity tools and systems are complex tasks. Cybersecurity professionals are attracted to these challenges and motivated to use their expertise to bring sanity and solutions to real world problems. Applying science to this process is often relegated solely to academics in ivory towers. This webcast will provide an introduction and practical information about how you can use science to understand and improve the...
Author
Publisher
O'Reilly Media
Pub. Date
2016.
Physical Desc
1 online resource (1 streaming video file (4 hr., 15 min., 13 sec.)) : digital, sound, color
Language
English
Description
"If your code is working great but it isn't secure, it won't be working great for long. This collection of talks shows ways to harden your projects, and explores the question of whether truly secure communications should run alongside the Web rather than in it."--Resource description page.
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2021.
Physical Desc
1 online resource
Language
English
Description
If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow....
Author
Publisher
JOHN WILEY
Pub. Date
2020
Physical Desc
1 online resource
Language
English
Description
You will be breached-the only question is whether you'll be ready A cyber breach could cost your organization millions of dollars-in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase