Dieses Angebot wurde verkauft am So, 7. Sep um 08:40.
Cybersicherheit: Systeme verwalten, Tests durchführen und Intrusio untersuchen
Verkauft
Cybersicherheit: Systeme verwalten, Tests durchführen und Intrusio untersuchen
US $5,99US $5,99
Mo, 08. Sep, 08:40Mo, 08. Sep, 08:40

Cybersicherheit: Systeme verwalten, Tests durchführen und Intrusio untersuchen

One Planet Books
(30269)
Angemeldet als gewerblicher Verkäufer
US $5,99
Ca.CHF 4,77
Artikelzustand:
Gut
    Versand:
    Kostenlos USPS Media MailTM.
    Standort: Columbia, Missouri, USA
    Lieferung:
    Lieferung zwischen Mo, 6. Okt und Sa, 11. Okt nach 94104 bei heutigem Zahlungseingang
    Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
    Rücknahme:
    30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
    Zahlungen:
         Diners Club

    Sicher einkaufen

    eBay-Käuferschutz
    Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
    Der Verkäufer ist für dieses Angebot verantwortlich.
    eBay-Artikelnr.:205271727199

    Artikelmerkmale

    Artikelzustand
    Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
    Book Title
    Cybersecurity: Managing Systems, Conducting Testing, and Investig
    ISBN
    9781118697115
    Kategorie

    Über dieses Produkt

    Product Identifiers

    Publisher
    Wiley & Sons, Incorporated, John
    ISBN-10
    1118697111
    ISBN-13
    9781118697115
    eBay Product ID (ePID)
    167599171

    Product Key Features

    Number of Pages
    368 Pages
    Publication Name
    Cybersecurity : Managing Systems, Conducting Testing, and Investigating Intrusions
    Language
    English
    Publication Year
    2013
    Subject
    Security / General, Security / Networking
    Type
    Textbook
    Subject Area
    Computers
    Author
    Thomas J. Mowbray
    Format
    Trade Paperback

    Dimensions

    Item Height
    0.7 in
    Item Weight
    21.7 Oz
    Item Length
    9.2 in
    Item Width
    7.4 in

    Additional Product Features

    Intended Audience
    Trade
    Dewey Edition
    23
    Illustrated
    Yes
    Dewey Decimal
    005.8
    Synopsis
    A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture., A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations Delves into network administration for Windows, Linux, and VMware Examines penetration testing, cyber investigations, firewall configuration, and security tool customization Shares techniques for cybersecurity testing, planning, and reporting Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish., Your organization is probably under attack right now. What are you doing about it? Cyber crime is perhaps the fastest-growing crime category, increasing by as much as 300 percent each year. Your organization is undoubtedly under attack at this very moment. This book looks at security systemically. Beginning with the use of antipatterns and moving through improvements in security architecture, customizing tools, effective pen testing, and network monitoring, it demonstrates how to build security into your systems. Whether youre dealing with a small business or a major enterprise, youll learn how to create and maintain cybersecurity that works. Examine a range of common antipatterns and their refactored solutions Ensure protection of Linux as well as Windows environments Learn specific tools and protocols for securing healthcare IT Use the exercises at the end of each chapter to improve your understanding Educate your staff with a cybersecurity course built on this guide Learn how to create, use, and migrate virtual machines for testing Understand how cloud computing affects enterprise security Customize BackTrack Linux test discs with advanced tools Dive deeper into intense topics such as advanced Wireshark/tcpdump filtering, Windows/Linux/Python network programming, and invoking automated Metasploit attacks from operating system command lines and scripts Visit www.wiley.com/go/cybersecurity for a custom course syllabus, PowerPoint slides, and test bank, as well as downloadable custom scripts for Advanced Log Analysis
    LC Classification Number
    QA76.9.A25

    Artikelbeschreibung des Verkäufers

    Info zu diesem Verkäufer

    One Planet Books

    99,3% positive Bewertungen240 Tsd. Artikel verkauft

    Mitglied seit Jun 2012
    Antwortet meist innerhalb 24 Stunden
    Angemeldet als gewerblicher Verkäufer
    Shop besuchenKontakt

    Detaillierte Verkäuferbewertungen

    Durchschnitt in den letzten 12 Monaten
    Genaue Beschreibung
    4.9
    Angemessene Versandkosten
    5.0
    Lieferzeit
    5.0
    Kommunikation
    5.0

    Verkäuferbewertungen (44'767)

    Alle Bewertungen ansehen