Cargando…

Cybersecurity attacks (Red Team activity) /

"There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Nesterenko, Sergii (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1029302259
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180322s2018 xx 216 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCA  |d OCLCF  |d TOH  |d S9I  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000067117440 
029 1 |a AU@  |b 000073306124 
035 |a (OCoLC)1029302259 
037 |a CL0500000949  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Nesterenko, Sergii,  |e speaker. 
245 1 0 |a Cybersecurity attacks (Red Team activity) /  |c Sergii Nesterenko. 
264 1 |a [Place of publication not identified] :  |b Packt,  |c [2018] 
300 |a 1 online resource (1 streaming video file (3 hr., 35 min., 31 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Videorecording 
511 0 |a Presenter, Sergii Nesterenko. 
500 |a Title from title screen (viewed March 20, 2018). 
500 |a Date of publication from resource description page. 
520 |a "There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you'll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network--and what harm they can do. Then we'll look at another attack vector: websites and web-applications. You'll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we'll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You'll find out what social engineering, phishing, and spear-phishings, and why they're becoming especially dangerous today. By the end of this course, you'll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Criminalité informatique. 
650 7 |a Computer crimes.  |2 fast  |0 (OCoLC)fst00872063 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781788478878/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP