Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting |
Autore | Bunting Steve V |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (746 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations Computer crimes - Investigation - Examinations Forensic sciences - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-59322-X
9786613905673 1-118-21940-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut Forensic Importance of Link Files |
Record Nr. | UNINA-9910464984903321 |
Bunting Steve V
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting |
Autore | Bunting Steve V |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (746 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations Computer crimes - Investigation - Examinations Forensic sciences - Examinations |
ISBN |
1-283-59322-X
9786613905673 1-118-21940-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut Forensic Importance of Link Files |
Record Nr. | UNINA-9910792087503321 |
Bunting Steve V
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Encase computer forensics : the official ENCE : Encase certified examiner study guide / / Steve Bunting |
Autore | Bunting Steve V |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (746 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations Computer crimes - Investigation - Examinations Forensic sciences - Examinations |
ISBN |
1-283-59322-X
9786613905673 1-118-21940-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut Forensic Importance of Link Files |
Record Nr. | UNINA-9910807052003321 |
Bunting Steve V
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib |
Autore | Sohaib Mohd |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Delhi, India : , : BPB Publications, , [2022] |
Descrizione fisica | 1 online resource (432 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Electronic data processing personnel - Certification |
ISBN | 93-91392-21-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cyber Security Ethical Hacking and Penetration Testing -- CEH v11 Prerequisites and Syllabus -- SelfAssessment -- Reconnaissance -- Social Engineering -- Conclusion -- Scanning Networks -- UDP Scan -- Objectives -- Vulnerability Assessment -- System Hacking -- Rainbow tables -- Session Hijacking -- Web Server Hacking -- Web Application Hacking -- Hacking Wireless Networks -- Hacking Mobile Platforms -- Hacking Cloud IoT and OT Platforms -- Cryptography -- Evading Security Measures -- Practical Exercises on Penetration Testing and Malware Attacks -- Digital Compliances and Cyber Laws -- SelfAssessment 1 -- Copyright. |
Record Nr. | UNINA-9910794622503321 |
Sohaib Mohd
![]() |
||
Delhi, India : , : BPB Publications, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib |
Autore | Sohaib Mohd |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Delhi, India : , : BPB Publications, , [2022] |
Descrizione fisica | 1 online resource (432 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Electronic data processing personnel - Certification |
ISBN | 93-91392-21-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cyber Security Ethical Hacking and Penetration Testing -- CEH v11 Prerequisites and Syllabus -- SelfAssessment -- Reconnaissance -- Social Engineering -- Conclusion -- Scanning Networks -- UDP Scan -- Objectives -- Vulnerability Assessment -- System Hacking -- Rainbow tables -- Session Hijacking -- Web Server Hacking -- Web Application Hacking -- Hacking Wireless Networks -- Hacking Mobile Platforms -- Hacking Cloud IoT and OT Platforms -- Cryptography -- Evading Security Measures -- Practical Exercises on Penetration Testing and Malware Attacks -- Digital Compliances and Cyber Laws -- SelfAssessment 1 -- Copyright. |
Record Nr. | UNINA-9910826507403321 |
Sohaib Mohd
![]() |
||
Delhi, India : , : BPB Publications, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910456690103321 |
Gibson Darril
![]() |
||
Hoboken, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910781479003321 |
Gibson Darril
![]() |
||
Hoboken, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Microsoft Windows Security : Essentials / / Darril Gibson |
Autore | Gibson Darril |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (374 p.) |
Disciplina |
005.8
621.3916076 |
Collana |
Sybex serious skills
Essentials (Indianapolis, Ind.) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer networks - Examinations Computer networks -- Examinations -- Study guides Computer security - Examinations |
ISBN |
1-283-17725-0
9786613177254 1-118-11454-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA Chapter 6: Protecting Clients and Servers |
Record Nr. | UNINA-9910810340503321 |
Gibson Darril
![]() |
||
Hoboken, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills |
Autore | Miller David R |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (625 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | GreggMichael |
Collana |
Street smarts series
Sybex serious skills |
Soggetto topico |
Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides Electronic data processing personnel --Certification Electronic data processing personnel - Certification Computer security - Examinations Computer networks - Examinations - Security measures Engineering & Applied Sciences Computer Science |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-17720-X
9786613177209 1-118-11358-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure Criteria for Completion |
Record Nr. | UNINA-9910456700803321 |
Miller David R
![]() |
||
Hoboken, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills |
Autore | Miller David R |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Hoboken, : Wiley, 2011 |
Descrizione fisica | 1 online resource (625 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | GreggMichael |
Collana |
Street smarts series
Sybex serious skills |
Soggetto topico |
Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides Electronic data processing personnel --Certification Electronic data processing personnel - Certification Computer security - Examinations Computer networks - Examinations - Security measures Engineering & Applied Sciences Computer Science |
ISBN |
1-283-17720-X
9786613177209 1-118-11358-6 |
Classificazione | COM055000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure Criteria for Completion |
Record Nr. | UNINA-9910781478503321 |
Miller David R
![]() |
||
Hoboken, : Wiley, 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|