top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Autore Bunting Steve V
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (746 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
Computer crimes - Investigation - Examinations
Forensic sciences - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-283-59322-X
9786613905673
1-118-21940-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition
FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View
Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions
Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut
Forensic Importance of Link Files
Record Nr. UNINA-9910464984903321
Bunting Steve V  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Encase computer forensics [[electronic resource] ] : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Autore Bunting Steve V
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (746 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
Computer crimes - Investigation - Examinations
Forensic sciences - Examinations
ISBN 1-283-59322-X
9786613905673
1-118-21940-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition
FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View
Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions
Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut
Forensic Importance of Link Files
Record Nr. UNINA-9910792087503321
Bunting Steve V  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Encase computer forensics : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Encase computer forensics : the official ENCE : Encase certified examiner study guide / / Steve Bunting
Autore Bunting Steve V
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (746 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
Computer crimes - Investigation - Examinations
Forensic sciences - Examinations
ISBN 1-283-59322-X
9786613905673
1-118-21940-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto EnCase Computer Forensics The Official EnCE: EnCase Certified Examiner Study Guide, Third Edition; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Computer Hardware; The Boot Process; Partitions; File Systems; Summary; Exam Essentials; Review Questions; Chapter 2: File Systems; FAT Basics; NTFS Basics; exFAT; Exam Essentials; Chapter 3: First Response; Planning and Preparation; The Physical Location; Personnel; Computer Systems; What to Take with You Before You Leave
Recording and Photographing the Scene Seizing Computer Evidence; Bagging and Tagging; Summary; Exam Essentials; Review Questions; Chapter 4: Acquiring Digital Evidence; Booting a Computer Using the EnCase Boot Disk; Other Reasons for Using a DOS Boot; Steps for Using a DOS Boot; Drive-to-Drive DOS Acquisition; Steps for Drive-to-Drive DOS Acquisition; Supplemental Information About Drive-to-Drive DOS Acquisition; Network Acquisitions; Reasons to Use Network Acquisitions; Preparing an EnCase Network Boot Disk; FastBloc 2 Features; Steps for Tableau (FastBloc) Acquisition
FastBloc SE Acquisitions About FastBloc SE; Steps for FastBloc SE Acquisitions; LinEn Acquisitions; Mounting a File System as Read-Only; Updating a Linux Boot CD with the Latest Version of LinEn; Steps for LinEn Acquisition; Enterprise and FIM Acquisitions; Summary; Exam Essentials; Review Questions; Chapter 5: EnCase Concepts; CRC, MD5, and SHA-1; EnCase Backup Utility; Evidence Cache Folder; Summary; Exam Essentials; Review Questions; Chapter 6: EnCase Environment; Home Screen; EnCase Layout; Creating a Case; Tree Pane Navigation; Disk View; View Pane Navigation; Text View; Hex View
Picture View Report View; Doc View; Transcript View; File Extents View; Permissions View; Decode View; Field View; Lock Option; Dixon Box; Find Feature; Other Views and Tools; Conditions and Filters; EnScript; Text Styles; Adjusting Panes; Other Views; Global Views and Settings; EnCase Options; Summary; Exam Essentials; Review Questions; Chapter 7: Understanding, Searching For, and Bookmarking Data; Understanding Data; Binary Numbers; Characters; Unicode; Searching for Data; GREP Keywords; Starting a Search; Bookmarking; Summary; Exam Essentials; Review Questions
Chapter 8: File Signature Analysis and Hash AnalysisFile Signature Analysis; Creating a New File Signature; Conducting a File Signature Analysis; Hash Analysis; Summary; Exam Essentials; Review Questions; Chapter 9: Windows Operating System Artifacts; Dates and Times; Time Zones; Windows 64-Bit Time Stamp; Adjusting for Time Zone Offsets; Recycle Bin; Determining the Owner of Files in the Recycle Bin; Using an EnCase Evidence Processor to Determine the Status of Recycle Bin Files; Recycle Bin Bypass; Windows Vista/Windows 7 Recycle Bin; Link Files; Changing the Properties of a Shortcut
Forensic Importance of Link Files
Record Nr. UNINA-9910807052003321
Bunting Steve V  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib
Autore Sohaib Mohd
Edizione [1st ed.]
Pubbl/distr/stampa Delhi, India : , : BPB Publications, , [2022]
Descrizione fisica 1 online resource (432 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security - Examinations
Electronic data processing personnel - Certification
ISBN 93-91392-21-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Ethical Hacking and Penetration Testing -- CEH v11 Prerequisites and Syllabus -- SelfAssessment -- Reconnaissance -- Social Engineering -- Conclusion -- Scanning Networks -- UDP Scan -- Objectives -- Vulnerability Assessment -- System Hacking -- Rainbow tables -- Session Hijacking -- Web Server Hacking -- Web Application Hacking -- Hacking Wireless Networks -- Hacking Mobile Platforms -- Hacking Cloud IoT and OT Platforms -- Cryptography -- Evading Security Measures -- Practical Exercises on Penetration Testing and Malware Attacks -- Digital Compliances and Cyber Laws -- SelfAssessment 1 -- Copyright.
Record Nr. UNINA-9910794622503321
Sohaib Mohd  
Delhi, India : , : BPB Publications, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib
Ethical hacker's certification guide (CEHv11) : a comprehensive guide on penetration testing including network hacking, social engineering, and vulnerability assessment / / Mohd Sohaib
Autore Sohaib Mohd
Edizione [1st ed.]
Pubbl/distr/stampa Delhi, India : , : BPB Publications, , [2022]
Descrizione fisica 1 online resource (432 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security - Examinations
Electronic data processing personnel - Certification
ISBN 93-91392-21-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cyber Security Ethical Hacking and Penetration Testing -- CEH v11 Prerequisites and Syllabus -- SelfAssessment -- Reconnaissance -- Social Engineering -- Conclusion -- Scanning Networks -- UDP Scan -- Objectives -- Vulnerability Assessment -- System Hacking -- Rainbow tables -- Session Hijacking -- Web Server Hacking -- Web Application Hacking -- Hacking Wireless Networks -- Hacking Mobile Platforms -- Hacking Cloud IoT and OT Platforms -- Cryptography -- Evading Security Measures -- Practical Exercises on Penetration Testing and Malware Attacks -- Digital Compliances and Cyber Laws -- SelfAssessment 1 -- Copyright.
Record Nr. UNINA-9910826507403321
Sohaib Mohd  
Delhi, India : , : BPB Publications, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Autore Gibson Darril
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910456690103321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson
Autore Gibson Darril
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910781479003321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microsoft Windows Security : Essentials / / Darril Gibson
Microsoft Windows Security : Essentials / / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910810340503321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills
Autore Miller David R
Edizione [3rd ed.]
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (625 p.)
Disciplina 005.8
Altri autori (Persone) GreggMichael
Collana Street smarts series
Sybex serious skills
Soggetto topico Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides
Electronic data processing personnel --Certification
Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Examinations - Security measures
Engineering & Applied Sciences
Computer Science
Soggetto genere / forma Electronic books.
ISBN 1-283-17720-X
9786613177209
1-118-11358-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion
Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion
Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure
Criteria for Completion
Record Nr. UNINA-9910456700803321
Miller David R  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills
Security Administrator Street Smarts [[electronic resource] ] : A Real World Guide to CompTIA Security+ Skills
Autore Miller David R
Edizione [3rd ed.]
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (625 p.)
Disciplina 005.8
Altri autori (Persone) GreggMichael
Collana Street smarts series
Sybex serious skills
Soggetto topico Computer networks --Security measures --Examinations --Study guides
Computer security --Examinations --Study guides
Electronic data processing personnel --Certification
Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Examinations - Security measures
Engineering & Applied Sciences
Computer Science
ISBN 1-283-17720-X
9786613177209
1-118-11358-6
Classificazione COM055000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of Task
ProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for Completion
Task 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for Completion
Phase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; Procedure
Criteria for Completion
Record Nr. UNINA-9910781478503321
Miller David R  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui