Cargando…

Common types of attack /

Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogeth...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Audiom
Idioma:Inglés
Publicado: [Place of publication not identified] : Assemble You, 2022.
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cim a22000007i 4500
001 OR_on1337159751
003 OCoLC
005 20231017213018.0
006 m o h
007 sz zunnnnnuneu
007 cr nnannnuuuuu
008 220726s2022 xx nnnn o i n eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
024 8 |a 125053AYPOD 
029 1 |a AU@  |b 000072301930 
035 |a (OCoLC)1337159751 
037 |a 125053AYPOD  |b O'Reilly Media 
050 4 |a HV6773.15.C97 
082 0 4 |a 363.325/9004678  |2 23 
049 |a UAMI 
245 0 0 |a Common types of attack /  |c Assemble You Limited. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Assemble You,  |c 2022. 
300 |a 1 online resource (1 sound file (12 min.)) 
306 |a 001300 
336 |a spoken word  |b spw  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a audio file  |2 rdaft 
520 |a Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider threats, credential reuse, and mobile attacks. Learning Objectives Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed July 26, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cyberterrorism. 
650 0 |a Computer security. 
650 0 |a National security. 
650 6 |a Cyberterrorisme. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Cyberterrorism  |2 fast 
650 7 |a National security  |2 fast 
655 4 |a Downloadable audio books. 
655 7 |a Audiobooks  |2 fast 
655 7 |a Audiobooks.  |2 lcgft 
655 7 |a Livres audio.  |2 rvmgf 
710 2 |a Assemble You,  |e publisher. 
856 4 0 |u https://learning.oreilly.com/library/view/~/125053AYPOD/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP