Cargando…

The current security threat landscape.

"The security landscape is in constant flux. Adversaries used to take months or years to compromise a network, but today only a few minutes--or even in some cases, seconds--is needed to compromise and exfiltrate data. Your only defense is to gain the knowledge you need to fully understand and p...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Santos, Omar (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Cisco Press, [2016]
Colección:LiveLessons.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn933388071
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 151223s2016 xx 050 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d UAB  |d OCLCO 
035 |a (OCoLC)933388071 
037 |a CL0500000692  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Santos, Omar,  |e speaker. 
245 1 4 |a The current security threat landscape. 
264 1 |a [Place of publication not identified] :  |b Cisco Press,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (1 streaming video file (49 min., 23 sec.)) :  |b digital, sound, color. 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a LiveLessons 
500 |a Title from title screen (viewed December 21, 2015). 
511 0 |a Presenter, Omar Santos. 
500 |a "Networking talks." 
520 |a "The security landscape is in constant flux. Adversaries used to take months or years to compromise a network, but today only a few minutes--or even in some cases, seconds--is needed to compromise and exfiltrate data. Your only defense is to gain the knowledge you need to fully understand and prepare for the current threat landscape and how these threats are evolving. This one-hour primer on security threats in today's world will set you on the road to understanding and accessing the tools you need to understand what is happening within the threat landscape, and specifically how to begin defending your network. You will also gain insight into the underground activities that adversaries are involved in, and what return of investment they seek after exploitation."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
830 0 |a LiveLessons. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780134466279/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP