Cargando…

Cybersecurity : managing systems, conducting testing, and investigating intrusions /

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mowbray, Thomas J.
Otros Autores: Shimonski, Robert (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : John Wiley & Sons, ©2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn868827231
003 OCoLC
005 20231017213018.0
006 m o d
007 cr zn|||||||||
008 131216s2014 inua ob 001 0 eng d
040 |a B24X7  |b eng  |e pn  |c B24X7  |d E7B  |d OCLCO  |d N$T  |d COO  |d UMI  |d OCLCO  |d DEBBG  |d YDXCP  |d OCLCQ  |d EBLCP  |d IDEBK  |d TEFOD  |d DEBSZ  |d RECBK  |d OCLCO  |d TEFOD  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d CNNOR  |d MOR  |d PIFPO  |d ZCU  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCA  |d U3W  |d OCLCA  |d OCL  |d STF  |d YDX  |d LND  |d CEF  |d ICG  |d INT  |d VT2  |d OCLCQ  |d AU@  |d OCLCQ  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d U@J  |d OCLCO  |d OCL  |d INARC  |d OCLCQ  |d AJB  |d OCLCQ  |d OCLCO 
019 |a 861559306  |a 865182465  |a 875668655  |a 961553842  |a 962581595  |a 992562558  |a 1042355024  |a 1058168456 
020 |a 9781118697047  |q (electronic bk.) 
020 |a 1118697049  |q (electronic bk.) 
020 |a 9781118849651  |q (electronic bk.) 
020 |a 1118849655  |q (electronic bk.) 
020 |a 1118697111 
020 |a 9781118697115 
020 |z 9781118697115 
028 0 1 |a EB00112750  |b Recorded Books 
029 1 |a AU@  |b 000053038253 
029 1 |a AU@  |b 000066766597 
029 1 |a DEBBG  |b BV041633031 
029 1 |a DEBBG  |b BV041908096 
029 1 |a DEBBG  |b BV042032158 
029 1 |a DEBSZ  |b 397652283 
029 1 |a DEBSZ  |b 414176251 
029 1 |a NZ1  |b 15493773 
035 |a (OCoLC)868827231  |z (OCoLC)861559306  |z (OCoLC)865182465  |z (OCoLC)875668655  |z (OCoLC)961553842  |z (OCoLC)962581595  |z (OCoLC)992562558  |z (OCoLC)1042355024  |z (OCoLC)1058168456 
037 |a CL0500000413  |b Safari Books Online 
037 |a A37643A6-6666-4EDD-BB53-09ADECDB6301  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5105.59  |b .M69 2014eb 
072 7 |a POL  |x 017000  |2 bisacsh 
082 0 4 |a 352.3/79  |2 23 
049 |a UAMI 
100 1 |a Mowbray, Thomas J. 
245 1 0 |a Cybersecurity :  |b managing systems, conducting testing, and investigating intrusions /  |c Thomas J. Mowbray ; technical editor, Rob Shimonski. 
260 |a Indianapolis, Ind. :  |b John Wiley & Sons,  |c ©2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen. 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary. 
505 8 |a AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3. 
505 8 |a Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks. 
505 8 |a Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash. 
505 8 |a Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots. 
520 |a A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Prevention. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a POLITICAL SCIENCE  |x Public Affairs & Administration.  |2 bisacsh 
650 7 |a Cyberspace  |x Security measures  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
700 1 |a Shimonski, Robert.  |4 edt 
776 0 8 |i Print version:  |a Mowbray, Thomas J.  |t Cybersecurity.  |d Indianapolis, Ind. : John Wiley & Sons, ©2014  |z 9781118697047  |w (OCoLC)868827231 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118697115/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25741903 
938 |a Askews and Holts Library Services  |b ASKH  |n BDZ0022617473 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25743076 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26129981 
938 |a Books 24x7  |b B247  |n bks00058142 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1481185 
938 |a ebrary  |b EBRY  |n ebr10783650 
938 |a EBSCOhost  |b EBSC  |n 653332 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26537619 
938 |a Internet Archive  |b INAR  |n cybersecurityman0000mowb 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00112750 
938 |a YBP Library Services  |b YANK  |n 11254485 
938 |a YBP Library Services  |b YANK  |n 12677506 
994 |a 92  |b IZTAP