The Resource Cybersecurity : managing systems, conducting testing, and investigating intrusions, Thomas J. Mowbray ; technical editor, Rob Shimonski

Cybersecurity : managing systems, conducting testing, and investigating intrusions, Thomas J. Mowbray ; technical editor, Rob Shimonski

Label
Cybersecurity : managing systems, conducting testing, and investigating intrusions
Title
Cybersecurity
Title remainder
managing systems, conducting testing, and investigating intrusions
Statement of responsibility
Thomas J. Mowbray ; technical editor, Rob Shimonski
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is
Cataloging source
B24X7
http://library.link/vocab/creatorName
Mowbray, Thomas J
Dewey number
352.3/79
Illustrations
illustrations
Index
index present
LC call number
TK5105.59
LC item number
.M69 2014eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Shimonski, Robert
http://library.link/vocab/subjectName
  • Cyberspace
  • Computer networks
  • Information technology
  • Computer security
  • Computer crimes
Label
Cybersecurity : managing systems, conducting testing, and investigating intrusions, Thomas J. Mowbray ; technical editor, Rob Shimonski
Link
http://goldcoast.lib.overdrive.com/ContentDetails.htm?ID=A37643A6-6666-4EDD-BB53-09ADECDB6301
Instantiates
Publication
Note
Title from title screen
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier.
Color
other
Content category
text
Content type code
txt
Content type MARC source
rdacontent.
Contents
  • Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
  • AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3
  • Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks
  • Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash
  • Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots
Control code
ocn868827231
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9781118849651
Media category
computer
Media MARC source
rdamedia.
Media type code
c
Publisher number
EB00112750
Specific material designation
remote
Stock number
  • CL0500000413
  • A37643A6-6666-4EDD-BB53-09ADECDB6301
System control number
(OCoLC)868827231
Label
Cybersecurity : managing systems, conducting testing, and investigating intrusions, Thomas J. Mowbray ; technical editor, Rob Shimonski
Link
http://goldcoast.lib.overdrive.com/ContentDetails.htm?ID=A37643A6-6666-4EDD-BB53-09ADECDB6301
Publication
Note
Title from title screen
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier.
Color
other
Content category
text
Content type code
txt
Content type MARC source
rdacontent.
Contents
  • Cover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary
  • AssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3
  • Architectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks
  • Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash
  • Network Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots
Control code
ocn868827231
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9781118849651
Media category
computer
Media MARC source
rdamedia.
Media type code
c
Publisher number
EB00112750
Specific material designation
remote
Stock number
  • CL0500000413
  • A37643A6-6666-4EDD-BB53-09ADECDB6301
System control number
(OCoLC)868827231

Library Locations

  • Broadbeach LibraryBorrow it
    61 Sunshine Boulevard, Mermaid Waters, QLD, 4218, AU
    -28.035507 153.424153
  • Burleigh Heads LibraryBorrow it
    Park Avenue, Burleigh Heads, QLD, 4220, AU
    -28.090304 153.452264
  • Burleigh Waters LibraryBorrow it
    Corner Christine Avenue and Galeen Drive, Burleigh Waters, QLD, 4220, AU
    -28.081169 153.432148
  • Coolangatta LibraryBorrow it
    Level 1, The Strand, Corner Marine Parade and Dutton Street, Coolangatta, QLD, 4225, AU
    -28.166856 153.537057
  • Elanora LibraryBorrow it
    The Pines Shopping Centre, Guineas Creek Road, Elanora, QLD, 4221, AU
    -28.135667 153.469567
  • Helensvale LibraryBorrow it
    Helensvale Plaza, Corner Lindfield Road and Sir John Overall Drive, Helensvale, QLD, 4212, AU
    -27.922595 153.3341
  • Local Studies LibraryBorrow it
    Corner Garden and Lawson Streets, Southport, QLD, 4215, AU
    -27.970549 153.412387
  • Mobile LibraryBorrow it
    Gold Coast, QLD, AU
  • Nerang LibraryBorrow it
    Corner White and Price Streets, Nerang, QLD, 4211, AU
    -27.991463 153.335174
  • Palm Beach Community Lounge and LibraryBorrow it
    Eleventh Avenue, Palm Beach, QLD, 4221, AU
    -28.117206 153.467597
  • Robina LibraryBorrow it
    196 Robina Town Centre Drive, Robina, QLD, 4226, AU
    -28.076691 153.38214
  • Runaway Bay LibraryBorrow it
    Lae Drive, Runaway Bay, QLD, 4216, AU
    -27.91145 153.399086
  • Southport LibraryBorrow it
    Corner Garden and Lawson Streets, Southport, QLD, 4215, AU
    -27.970549 153.412387
  • Upper Coomera LibraryBorrow it
    Corner Reserve and Abraham Roads, Upper Coomera, QLD, 4209, AU
    -27.869062 153.304254
Processing Feedback ...