|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn868827231 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
131216s2014 inua ob 001 0 eng d |
040 |
|
|
|a B24X7
|b eng
|e pn
|c B24X7
|d E7B
|d OCLCO
|d N$T
|d COO
|d UMI
|d OCLCO
|d DEBBG
|d YDXCP
|d OCLCQ
|d EBLCP
|d IDEBK
|d TEFOD
|d DEBSZ
|d RECBK
|d OCLCO
|d TEFOD
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCF
|d OCLCO
|d CNNOR
|d MOR
|d PIFPO
|d ZCU
|d LIV
|d MERUC
|d OCLCQ
|d SAV
|d OCLCA
|d U3W
|d OCLCA
|d OCL
|d STF
|d YDX
|d LND
|d CEF
|d ICG
|d INT
|d VT2
|d OCLCQ
|d AU@
|d OCLCQ
|d G3B
|d TKN
|d OCLCQ
|d UAB
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d U@J
|d OCLCO
|d OCL
|d INARC
|d OCLCQ
|d AJB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 861559306
|a 865182465
|a 875668655
|a 961553842
|a 962581595
|a 992562558
|a 1042355024
|a 1058168456
|
020 |
|
|
|a 9781118697047
|q (electronic bk.)
|
020 |
|
|
|a 1118697049
|q (electronic bk.)
|
020 |
|
|
|a 9781118849651
|q (electronic bk.)
|
020 |
|
|
|a 1118849655
|q (electronic bk.)
|
020 |
|
|
|a 1118697111
|
020 |
|
|
|a 9781118697115
|
020 |
|
|
|z 9781118697115
|
028 |
0 |
1 |
|a EB00112750
|b Recorded Books
|
029 |
1 |
|
|a AU@
|b 000053038253
|
029 |
1 |
|
|a AU@
|b 000066766597
|
029 |
1 |
|
|a DEBBG
|b BV041633031
|
029 |
1 |
|
|a DEBBG
|b BV041908096
|
029 |
1 |
|
|a DEBBG
|b BV042032158
|
029 |
1 |
|
|a DEBSZ
|b 397652283
|
029 |
1 |
|
|a DEBSZ
|b 414176251
|
029 |
1 |
|
|a NZ1
|b 15493773
|
035 |
|
|
|a (OCoLC)868827231
|z (OCoLC)861559306
|z (OCoLC)865182465
|z (OCoLC)875668655
|z (OCoLC)961553842
|z (OCoLC)962581595
|z (OCoLC)992562558
|z (OCoLC)1042355024
|z (OCoLC)1058168456
|
037 |
|
|
|a CL0500000413
|b Safari Books Online
|
037 |
|
|
|a A37643A6-6666-4EDD-BB53-09ADECDB6301
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|b .M69 2014eb
|
072 |
|
7 |
|a POL
|x 017000
|2 bisacsh
|
082 |
0 |
4 |
|a 352.3/79
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mowbray, Thomas J.
|
245 |
1 |
0 |
|a Cybersecurity :
|b managing systems, conducting testing, and investigating intrusions /
|c Thomas J. Mowbray ; technical editor, Rob Shimonski.
|
260 |
|
|
|a Indianapolis, Ind. :
|b John Wiley & Sons,
|c ©2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from title screen.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary.
|
505 |
8 |
|
|a AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3.
|
505 |
8 |
|
|a Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks.
|
505 |
8 |
|
|a Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash.
|
505 |
8 |
|
|a Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots.
|
520 |
|
|
|a A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Public Affairs & Administration.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
700 |
1 |
|
|a Shimonski, Robert.
|4 edt
|
776 |
0 |
8 |
|i Print version:
|a Mowbray, Thomas J.
|t Cybersecurity.
|d Indianapolis, Ind. : John Wiley & Sons, ©2014
|z 9781118697047
|w (OCoLC)868827231
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118697115/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25741903
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0022617473
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25743076
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26129981
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00058142
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1481185
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10783650
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 653332
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26537619
|
938 |
|
|
|a Internet Archive
|b INAR
|n cybersecurityman0000mowb
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00112750
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11254485
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12677506
|
994 |
|
|
|a 92
|b IZTAP
|