LEADER 05448nam 22006851 450 001 9910453344503321 005 20200520144314.0 010 $a1-118-84965-5 010 $a1-118-69704-9 035 $a(CKB)2550000001134408 035 $a(EBL)1481185 035 $a(OCoLC)861559306 035 $a(SSID)ssj0001155395 035 $a(PQKBManifestationID)11665844 035 $a(PQKBTitleCode)TC0001155395 035 $a(PQKBWorkID)11187548 035 $a(PQKB)10015727 035 $a(MiAaPQ)EBC1481185 035 $a(CaSebORM)9781118697115 035 $a(Au-PeEL)EBL1481185 035 $a(CaPaEBR)ebr10783650 035 $a(CaONFJC)MIL534116 035 $a(OCoLC)868827231 035 $a(EXLCZ)992550000001134408 100 $a20131108d2014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCybersecurity $emanaging systems, conducting testing, and investigating intrusions /$fThomas J. Mowbray 205 $a1st edition 210 1$aHoboken, New Jersey :$cWiley,$d[2014] 210 4$dİ2014 215 $a1 online resource (362 p.) 300 $aDescription based upon print version of record. 311 $a1-118-69711-1 311 $a1-306-02865-5 320 $aIncludes bibliographical references and index. 327 $aCover; About the Author; Acknowledgments; Contents; Introduction; Part I: Cyber Network; Chapter 1: Executive Summary; Why Start with Antipatterns?; Security Architecture; Antipattern: Signature-Based Malware Detection versus Polymorphic Threats; Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection; Antipattern: Document-Driven Certification and Accreditation; Antipattern: Proliferating IA Standards with No Proven Benefits; Antipattern: Policy-Driven Security Certifications Do Not Address the Threat; Refactored Solution: Security Training Roadmap; Summary 327 $aAssignmentsChapter 2: The Problems: Cyber Antipatterns; Antipatterns Concept; Forces in Cyber Antipatterns; Cyber Antipattern Templates; Cybersecurity Antipattern Catalog; Summary; Assignments; Chapter 3: Enterprise Security Using the Zachman Framework; What Is Architecture? Why Do We Need It?; Enterprises Are Complex and Changing; The Zachman Framework for Enterprise Architecture; Primitive Models versus Composite Models; How Does the Zachman Framework Help with Cybersecurity?; Everyone Has Their Own Specifications; The Goldmine Is in Row 2; Frameworks for Row 3 327 $aArchitectural Problem Solving PatternsSummary; Assignments; Part II: Cyber Network Security Hands-On; Chapter 4: Network Administration for Security Professionals; Managing Administrator and Root Accounts; Installing Hardware; Re-Imaging Operating Systems; Burning and Copying CDs and DVDs; Installing System Protection / Anti-Malware; Setting Up Networks; Installing Applications and Archiving; Customizing System Management Controls and Settings; Managing Remote Login; Managing User Administration; Managing Services; Mounting Disks; Moving Data Between Systems on Networks 327 $aConverting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash 327 $aNetwork Programming: Windows Command-Line Interface (CLI)Python Programming: Accelerated Network Scanning; Summary; Assignments; Chapter 7: Reconnaissance, Vulnerability Assessment, and Cyber Testing; Types of Cybersecurity Evaluations; Understanding the Cybersecurity Testing Methodology; Summary; Assignments; Chapter 8: Penetration Testing; Forms of Cyber Attacks; Network Penetration; Commercial Pen Testing Tools; Using Netcat to Create Connections and Move Data and Binaries; Using Netcat to Create Relays and Pivots 327 $aUsing SQL Injection and Cross-Site Techniques to Perform Web Application and Database Attacks 330 $a A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is 606 $aComputer networks$xSecurity measures 606 $aInternet$xSecurity measures 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aInternet$xSecurity measures. 676 $a004.56 700 $aMowbray$b Thomas J$0543893 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453344503321 996 $aCybersecurity$92220375 997 $aUNINA LEADER 03684nam 22006015 450 001 9910255247003321 005 20251209163900.0 010 $a9781137594754 010 $a1137594756 024 7 $a10.1057/978-1-137-59475-4 035 $a(CKB)3710000000657619 035 $a(DE-He213)978-1-137-59475-4 035 $a(MiAaPQ)EBC4720589 035 $a(Perlego)3491812 035 $a(EXLCZ)993710000000657619 100 $a20160509d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdapting War Horse $eCognition, the Spectator, and a Sense of Play /$fby Toby Malone, Christopher J. Jackman 205 $a1st ed. 2016. 210 1$aLondon :$cPalgrave Macmillan UK :$cImprint: Palgrave Macmillan,$d2016. 215 $a1 online resource (XIII, 113 p. 3 illus. in color.) 225 1 $aPalgrave Pivot 311 08$a9781137594747 311 08$a1137594748 320 $aIncludes bibliographical references and index. 327 $aIntroduction. Playing the War Horse Game.-Chapter 1. ?We Get to Know Him? -- Chapter 2. ?Making Fit? -- Chapter 3. Spectatorship as Embodied Practice -- Chapter 4. Animated Horse-Play -- Chapter 5. Emotional Promises -- Chapter 6. Tour Horse -- Works Cited. 330 $aThis book analyses the success and adaptation of Michael Morpurgo?s novel War Horse to stage, radio, live events, and feature film, in different cultures, on tours, and in translation. In under a decade, War Horse has gone from obscure children?s novel to arguably one of the world?s most recognisable theatrical brands, thanks to innovative puppet designs from South Africa?s Handspring Puppet Company in an acclaimed stage production from the National Theatre of Great Britain. With emphasis on embodied spectatorship, collaborative meaning-making, and imaginative ?play,? this book generates fresh insights into the enduring popularity of the franchise?s eponymous protagonist, Joey, offering the most in-depth study of War Horse to date. Toby Malone is a graduate of the University of Toronto?s Graduate Centre for Study of Drama, Theatre, and Performance Studies, and is currently a faculty member at the University of Waterloo, Canada. Previous publications include Shakespeare Survey, Literature/Film Quarterly, Canadian Theatre Review, Borrowers and Lenders and The Routledge Companion to Dramaturgy. Christopher J. Jackman is a graduate of the University of Toronto?s Graduate Centre for Study of Drama, Theatre, and Performance Studies, and is an alumnus of Massey College, Canada. He is currently Chair of Arts and Design at Centennial College in Toronto, has developed Centennial?s performing arts certificate programme, and remains an active director and performer. . 410 0$aPalgrave pivot. 606 $aPerforming arts 606 $aTheater 606 $aChildren's literature 606 $aMotion pictures$zGreat Britain 606 $aTheatre and Performance Arts 606 $aChildren's Literature 606 $aBritish Film and TV 615 0$aPerforming arts. 615 0$aTheater. 615 0$aChildren's literature. 615 0$aMotion pictures 615 14$aTheatre and Performance Arts. 615 24$aChildren's Literature. 615 24$aBritish Film and TV. 676 $a790 700 $aMalone$b Toby$4aut$4http://id.loc.gov/vocabulary/relators/aut$01059292 702 $aJackman$b Christopher J$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910255247003321 996 $aAdapting War Horse$92505219 997 $aUNINA