|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1108572598 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190713t20192019enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d TEFOD
|d EBLCP
|d TEFOD
|d UKMGB
|d OCLCF
|d OCLCQ
|d YDX
|d UKAHL
|d OCLCQ
|d N$T
|d OCLCQ
|d OCLCO
|d DOS
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|
015 |
|
|
|a GBB9B4169
|2 bnb
|
016 |
7 |
|
|a 019446114
|2 Uk
|
019 |
|
|
|a 1107834531
|a 1111299188
|
020 |
|
|
|a 1838554785
|
020 |
|
|
|a 9781838554781
|q (electronic bk.)
|
020 |
|
|
|z 9781838559861
|q (pbk.)
|
029 |
1 |
|
|a UKMGB
|b 019446114
|
029 |
1 |
|
|a AU@
|b 000067100559
|
029 |
1 |
|
|a AU@
|b 000065674668
|
035 |
|
|
|a (OCoLC)1108572598
|z (OCoLC)1107834531
|z (OCoLC)1111299188
|
037 |
|
|
|a 3B752D2C-EDD7-4258-8E4B-9E3A363173A5
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.a25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chu, Andrew,
|e author.
|
245 |
1 |
0 |
|a CCNA Cyber Ops SECOPS certification guide 210-255 :
|b learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
|c Andrew Chu.
|
246 |
1 |
|
|a Cisco Certified Network Associate Cyber Operations Security Operations certification guide 210-255
|
264 |
|
1 |
|a Birmingham :
|b Packt Publishing, Limited,
|c [2019]
|
264 |
|
4 |
|c ©2019
|
300 |
|
|
|a 1 online resource (336 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a "Release date: July 4, 2019."
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Section 1: Endpoint Threat Analysis and Forensics; Chapter 1: Classifying Threats; Categorizing and communicating threats; AMP Threat Grid; Cuckoo Sandbox; Requirements for CVSS; Exploitability metrics; Attack vector; Attack complexity; Privileges required; User interaction; Impact metrics; Confidentiality; Integrity; Availability; Scope; Summary; Questions; Further reading; Chapter 2: Operating System Families; Starting the operating system; Basic Input Output System; Master Boot Record
|
505 |
8 |
|
|a Unified Extensible Firmware InterfaceGUID Partition Table; Booting Windows and Linux; Filesystems; File Allocation Table 32; New Technology Filesystem; Extended Filesystem 4; Making, finding, accessing, and editing data; Creating files; Locating files; Reading files; Changes to files and properties; Deleting files; Summary; Questions; Further reading; Chapter 3: Computer Forensics and Evidence Handling; Types of evidence; Digital forensics versus cybersecurity forensics; Best evidence; Direct versus indirect evidence; Corroborative evidence; Maintaining evidential value; Altered disk image
|
505 |
8 |
|
|a Unaltered disk imageChain of custody; Attribution; Asset attribution; Threat actor attribution; Summary; Questions; Further reading; Section 2: Intrusion Analysis; Chapter 4: Identifying Rogue Data from a Dataset; Using regexes to find normal characters; Using regexes to find characters in a set; Using regexes to extract groups of characters; Using regex logical operators; Summary; Questions; Further reading; Chapter 5: Warning Signs from Network Data; Physical and data link layer (Ethernet) frame headers; Layer 1; Preamble; Start frame delimiter; Interframe separation; Layer 2; Addressing
|
505 |
8 |
|
|a VLAN taggingType/Length fields; Cyclic redundancy checking; Network layer (IPv4, IPv6, and ICMP) packet headers; Internet Protocol (IPv4 and IPv6); Version; IPv4: Internet Header Length, options, and padding; IPv4 -- Type of Service and IPv6 -- Traffic Class; IPv4 -- Total Length and IPv6 -- Payload Length; IPv4 -- Time-to-Live and IPv6 -- Hop Limit; IPv4 -- Protocol and IPv6 -- Next Header; IPv4 -- identification and flags; Source and destination addresses; ICMP; Transport layer (TCP and UDP) segment and datagram headers; TCP; Source and destination ports; Sequence and acknowledgment numbers
|
505 |
8 |
|
|a Header lengthFlags; Window; Checksum; Urgent pointer; UDP; Source and destination port; Length; Checksum; Application layer (HTTP) headers; Request header; Request method name; URI; HTTP version; User-Agent; Response header; Summary; Questions; Further reading; Chapter 6: Network Security Data Analysis; PCAP files and Wireshark; Viewing packet details; Extracting data using Wireshark; Alert identification; Network indicators; IP address (source/destination); Client and server port identity; URI/URL; Payload indicators; Process (file or registry); System (API calls); Hashes
|
500 |
|
|
|a Security technologies and their reports
|
520 |
|
|
|a Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|x Examinations
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
710 |
2 |
|
|a Packt Publishing,
|e publisher,
|e distributor.
|
758 |
|
|
|i has work:
|a CCNA Cyber Ops SECOPS - Certification Guide 210-255 (Text)
|1 https://id.oclc.org/worldcat/entity/E39PD3pbFG9jtC9xKH63k9Gk8P
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Chu, Andrew.
|t CCNA Cyber Ops SECOPS - Certification Guide 210-255 : Learn the Skills to Pass the 210-255 Certification Exam and Become a Competent SECOPS Associate.
|d Birmingham : Packt Publishing, Limited, ©2019
|z 9781838559861
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5811425
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0040165348
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5811425
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2183537
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300687797
|
994 |
|
|
|a 92
|b IZTAP
|