|
|
|
|
LEADER |
00000cam a22000003i 4500 |
001 |
OR_on1334673035 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
220707s2020 xx o 000 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d AU@
|d UKAHL
|d YDX
|d UAB
|d EBLCP
|d OCLCF
|d CNWPU
|d OCLCQ
|d TOH
|d OCLCQ
|d OCL
|d OCLCO
|
019 |
|
|
|a 1192526771
|a 1224162670
|
020 |
|
|
|a 9781260461633
|q (electronic bk.)
|
020 |
|
|
|a 1260461637
|q (electronic bk.)
|
020 |
|
|
|z 9781260461626
|
024 |
8 |
|
|a 1260461637
|
024 |
8 |
|
|a 9781260461633
|
029 |
1 |
|
|a AU@
|b 000067830210
|
035 |
|
|
|a (OCoLC)1334673035
|z (OCoLC)1192526771
|z (OCoLC)1224162670
|
050 |
|
4 |
|a QA76.3
|
082 |
0 |
4 |
|a 005.8/076
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mitropoulos, Nick.
|
245 |
1 |
0 |
|a GCIH GIAC Certified Incident Handler All-in-One Exam Guide.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b McGraw-Hill Professional :
|b McGraw Hill,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
490 |
1 |
|
|a All-in-one
|
588 |
0 |
|
|a Vendor-supplied metadata.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Building a Lab -- Creating a Kali Linux Virtual Machine -- Creating a Metasploitable Virtual Machine -- Testing External Connectivity from Kali Linux -- Testing External Connectivity from Metasploitable -- Testing Communication Between Kali Linux and Metasploitable -- Creating a Windows Virtual Machine -- Testing Communication Between Windows, Kali Linux, and Metasploitable VMs -- Linux and Windows Commands -- Chapter Review -- Questions -- Answers -- References and Further Reading
|
505 |
8 |
|
|a Chapter 2 Intrusion Analysis and Incident Handling -- Incident Handling Introduction -- Incident Handling Phases -- Preparation -- Building a Team -- Collecting Organizational Information -- Responding to an Incident -- Hardware -- Software -- Identification -- Incident Sources -- Data Collection for Incident Response -- Windows Investigations -- Linux Investigations -- Containment -- Tracking and Communicating an Incident -- Containment Strategies -- Eradication -- Recovery -- Lessons Learned -- Chapter Review -- Questions -- Answers -- References and Further Reading
|
505 |
8 |
|
|a Chapter 3 Information Gathering -- Public Website Searching -- Netcraft -- the Harvester -- Wget -- Social Media Searching -- Defending Against Public Website and Social Media Searching -- Using Search Engines for Information Gathering -- Search Engine Query Examples -- Viewing Deleted Content Through the Wayback Machine -- Using Tools for Search Engine Information Gathering Automation -- Recon-NG -- Metagoofil -- Exiftool -- FOCA (Fingerprinting Organizations with Collected Archives) -- SearchDiggity -- Defending Against Search Engine Information Gathering -- Whois Lookups
|
505 |
8 |
|
|a Performing Whois Lookups Using IANA and Regional Registries -- Performing Whois Lookups Using Online Tools -- Performing Whois Lookups Using the Command Line -- Defending Against Whois Lookups -- DNS Lookups -- Performing DNS Lookups Using Online Tools -- Nslookup -- Dig -- Host -- DNSRecon -- Defending Against DNS Lookups -- War Dialing -- Defending Against War Dialing -- War Driving -- Wireless Network Introduction -- Airmon-ng -- Kismet -- InSSIDer -- Other Tools Worth Checking -- Defending Against War Driving -- General-Purpose Information Gathering Tools -- Maltego -- Shodan -- Maps
|
505 |
8 |
|
|a Spokeo -- Grayhat Warfare -- Chapter Review -- Questions -- Answers -- References and Further Reading -- Chapter 4 Scanning, Enumeration, and Vulnerability Identification -- Introduction to ARP, ICMP, IP, TCP, and UDP -- ARP -- ICMP -- IP -- TCP -- UDP -- Network Mapping -- Arp-scan -- Ping -- Traceroute -- Zenmap -- Defending Against Network Mapping -- Port Scanning -- Nmap -- Hping3 -- Additional Scanning Tools -- Proxy Utilization -- IDS/IPS Evasion -- Defending Against Port Scanning and IDS Evasion -- Vulnerability Identification -- Nessus -- Defending Against Vulnerability Identification
|
520 |
|
|
|a This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a recognized cybersecurity expert and seasoned author, GCIH GIAC Certified Incident Handler All-in-One Exam Guide clearly explains all of the advanced security incident handling skills covered on the test. Detailed examples and chapter summaries throughout demonstrate real-world threats and aid in retention. You will get online access to 300 practice questions that match those on the live test in style, format, and tone. Designed to help you prepare for the exam, this resource also serves as an ideal on-the-job reference. Covers all exam topics, including: Intrusion analysis and incident handling Information gathering Scanning, enumeration, and vulnerability identification Vulnerability exploitation Infrastructure and endpoint attacks Network, DoS, and Web application attacks Maintaining access Evading detection and covering tracks Worms, bots, and botnets Online content includes: 300 practice exam questions Test engine that provides full-length practice exams and customizable quizzes.
|
542 |
|
|
|f Copyright © McGraw-Hill 2020
|g 2020
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Examinations
|v Study guides.
|
650 |
|
0 |
|a Electronic data processing personnel
|x Certification
|v Study guides.
|
650 |
|
6 |
|a Sécurité informatique
|x Examens
|v Guides de l'étudiant.
|
650 |
|
7 |
|a COMPUTERS
|x Certification Guides
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Network Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Examinations
|2 fast
|
650 |
|
7 |
|a Electronic data processing personnel
|x Certification
|2 fast
|
655 |
|
7 |
|a examination study guides.
|2 aat
|
655 |
|
7 |
|a Examinations
|2 fast
|
655 |
|
7 |
|a Study guides
|2 fast
|
655 |
|
7 |
|a Examinations.
|2 lcgft
|
655 |
|
7 |
|a Study guides.
|2 lcgft
|
655 |
|
7 |
|a Guides de l'étudiant.
|2 rvmgf
|
830 |
|
0 |
|a All-in-one certification series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781260461633/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37767511
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6404274
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686892
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 17129312
|
994 |
|
|
|a 92
|b IZTAP
|