|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1038480785 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180602s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d IDB
|d NLE
|d OCLCQ
|d UKMGB
|d OCLCO
|d LVT
|d OCLCF
|d UKAHL
|d OCLCQ
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB898006
|2 bnb
|
016 |
7 |
|
|a 018882498
|2 Uk
|
020 |
|
|
|a 9781788832496
|
020 |
|
|
|a 1788832493
|
020 |
|
|
|z 9781788839235
|
029 |
1 |
|
|a UKMGB
|b 018882498
|
029 |
1 |
|
|a AU@
|b 000067093495
|
035 |
|
|
|a (OCoLC)1038480785
|
037 |
|
|
|a 9781788832496
|b Packt Publishing
|
050 |
|
4 |
|a TK5105.5
|b .C69 2018eb
|
082 |
0 |
4 |
|a 004.6
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cox, Jacob.
|
245 |
1 |
0 |
|a Practical Network Scanning :
|b Capture network vulnerabilities using standard tools such as Nmap and Nessus.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (316 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Fundamental Security Concepts; Why security?; Building blocks of information security; Computer security; Network security; Firewalls; Intrusion detection systems / intrusion prevention systems; Multitier topology; Internet security; Password; System upgrade and updates; Phishing; Beware of phishing phone calls; Phishing protection; Security issues, threats, and attacks; IoT security risk; Computer security risk; Security Risk-Border Gateway Protocol; Security and threats.
|
505 |
8 |
|
|a Natural disastersHuman threats; Security vulnerabilities; Technology weaknesses; Configuration weaknesses ; Security policy weaknesses; Using unencrypted or weak encryption for a website; Summary; Questions; Further reading; Chapter 2: Secure Network Design; Access control ; Asset classification and physical security; Authentication, authorization, and accounting; Network management and security design; Network segmentation; Segmentation strategy steps; Network protection consideration and design; Hardening your TCP/IP stack; DoS and DDoS attacks ; Volume-based attacks.
|
505 |
8 |
|
|a Application layer attacksLow-rate attacks; IP spoofing; Anti-spoofing using access lists; Encryption; Anti-spoofing using RPF checks; Ping sweeps and Port scans; Mitigation; DNS vulnerabilities ; How does DNS work?; DNS protocol attacks; Mitigation; Two factor authentication; Summary ; Questions; Further reading; Chapter 3: Server-Level Security; Classification of data; Physical security ; Disk encryption; Full-disk encryption; Bitlocker; Virtual Trusted Platform Module -- vTPM ; Encrypt your Hyper-V Guest VMs ; Cloud VM disk encryption; What is encryption at rest?; Hardening server security.
|
505 |
8 |
|
|a Check for open ports or servicesSystem firewall configuration; System update; Disable USB; Hard disk encryption; BIOS protection; Check the installed packages; Password policies; Secure and encrypt remote access; Implement activity logging; Document the host information; Authentication NTLM versus Kerberos; Password policies; Server-level permissions; Server antivirus and malware protection; Local security policies; Summary; Questions; Further reading; Chapter 4: Cloud Security Design; Cloud offerings; IaaS; PaaS; SaaS; Public versus private; Public IaaS versus private IaaS.
|
505 |
8 |
|
|a Public PaaS versus private PaaSPublic SaaS versus private SaaS; Shared technology and shared danger; Security approach for cloud computing; Traditional enterprise network model; Hybrid data center and cloud network; Network security devices for IaaS; Firewall Virtual Appliance; Virtual TAP vTAP; Virtual Router; Virtual web application firewalls; DDoS attack protection; Data loss prevention; Exploited system vulnerabilities; Summary ; Questions; Further reading; Chapter 5: Application Security Design; GDPR; Getting consent; Access to data; Encryption; SQL Injection.
|
500 |
|
|
|a Prevention of SQL Injection attack on web applications.
|
520 |
|
|
|a Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the ...
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks
|x Monitoring
|x Computer programs.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Computer programs.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Surveillance
|x Logiciels.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|x Logiciels.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|x Computer programs
|2 fast
|
700 |
1 |
|
|a Singh., Ajay.
|
776 |
0 |
8 |
|i Print version:
|a Cox, Jacob.
|t Practical Network Scanning : Capture network vulnerabilities using standard tools such as Nmap and Nessus.
|d Birmingham : Packt Publishing, ©2018
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5400400
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n BDZ0036875496
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5400400
|
994 |
|
|
|a 92
|b IZTAP
|