标签:Network Security

Practical Information Security Management 封面

Practical Information Security Management

作者:TONY CAMPBELL

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks. Practical Information Security Management pr

Advanced Persistent Training 封面

Advanced Persistent Training

作者:Jordan Schroeder

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity.

Secure Your Node.js Web Application 封面

Secure Your Node.js Web Application

作者:Karl Duuna

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement security best practices and effective countermeasures. Coding securely will make you a stronger web developer and analyst, and you'll protect your users. Ba

Effective Python Penetration Testing 封面

Effective Python Penetration Testing

作者:Rejah Rehim

Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with

Securing SQL Server 封面

Securing SQL Server

作者:Peter A. Carter

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. Database professionals in today's world deal increasingly often with repeated data attacks against high-profile or

IT Security Risk Control Management 封面

IT Security Risk Control Management

作者:Raymond Pompon

This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals.  Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking. IT Security Risk Control Mana

Network Attacks and Exploitation 封面

Network Attacks and Exploitation

作者:Matthew Monte

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comp

Nmap Essentials 封面

Nmap Essentials

作者:David Shaw

Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility. This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addit

Mastering OAuth 2.0 封面

Mastering OAuth 2.0

作者:Charles Bihis

OAuth 2.0 is a powerful authorization framework that enables your application to interact with the world's most popular service providers, allowing you to leverage their world-class technologies in your own application. At the start of this book, you will learn what OAuth 2.0 is, how it works, and the steps involved in creating an OAuth 2.0 application. You will first look at the process of registering your client application. Following this, you will explore the different supported workflows, t

Network Security Assessment, 3rd edition 封面

Network Security Assessment, 3rd edition

作者:Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and immune from unauthorized use and attack. Author Chris McNab demonstrates how determined adversaries map attack surface and exploit security weaknesses at both t

Zabbix Cookbook 封面

Zabbix Cookbook

作者:Patrik Uytterhoeven

This book will teach you the skills required to successfully set up and configure a Zabbix server. We will guide you through the interface setup and explain all the features available in Zabbix. You will begin with learning the Zabbix installation and configuration steps in detail, and then move on to exploring its interface and architecture. You will then work with groups, users, and permissions. The book will then take you through monitoring and testing with Zabbix. Followed by this, you will

The Network Security Test Lab 封面

The Network Security Test Lab

作者:Michael Gregg

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn

· · · · · · · · · · · · · · 第 1 页 · · · · · · · · · · · · · ·