1 - 20
Next
- Dutta, Nitul, author.
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource : illustrations (chiefly color) Digital: text file.PDF.
- Summary
-
- Chapter 1. Introduction to Cybersecurity.-
- Chapter 2. Being Hidden and Anonymous.-
- Chapter 3. TOR - The Onion Router.-
- Chapter 4. DarkNet and Hidden Services.-
- Chapter 5. Introduction to Digital Forensics.-
- Chapter 6. Intrusion Detection Systems fundamentals.-
- Chapter 7. Introduction to Malware Analysis.-
- Chapter 8. Design of a Virtual Cybersecurity Lab.- .
- Chapter 9. Importance of Cyber Law.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Reynolds, Maxie, author.
- [Place of publication not identified] : John Wiley & Sons, 2021.
- Description
- Book — 1 online resource (307 pages)
- Summary
-
- Cover
- Title Page
- Copyright Page
- About the Author
- Acknowledgments
- Contents
- Introduction
- Who Is This Book For?
- What This Book Covers
- Part I The Attacker Mindset
- Chapter 1 What Is the Attacker Mindset?
- Using the Mindset
- The Attacker and the Mindset
- AMs Is a Needed Set of Skills
- A Quick Note on Scope
- Summary
- Key Message
- Chapter 2 Offensive vs. Defensive Attacker Mindset
- The Offensive Attacker Mindset
- Comfort and Risk
- Planning Pressure and Mental Agility
- Emergency Conditioning
- Defensive Attacker Mindset
- Consistency and Regulation
- Anxiety Control
- Recovery, Distraction, and Maintenance
- OAMs and DAMs Come Together
- Summary
- Key Message
- Chapter 3 The Attacker Mindset Framework
- Development
- Phase 1
- Phase 2
- Application
- Preloading
- "Right Time, Right Place" Preload
- Ethics
- Intellectual Ethics
- Reactionary Ethics
- Social Engineering and Security
- Social Engineering vs. AMs
- Summary
- Key Message
- Part II The Laws and Skills
- Chapter 4 The Laws
- Law 1: Start with the End in Mind
- End to Start Questions
- Robbing a Bank
- Bringing It All together
- The Start of the End
- Clarity
- EfficiencyWhen you begin
- The Objective
- How to Begin with the End in Mind
- Law 2: Gather, Weaponize, and Leverage Information
- Law 3: Never Break Pretext
- Law 4: Every Move Made Benefits the Objective
- Summary
- Key Message
- Chapter 5 Curiosity, Persistence, and Agility
- Curiosity
- The Exercise: Part 1
- The Exercise: Part 2
- Persistence
- Skills and Common Sense
- Professional Common Sense
- Summary
- Key Message
- Chapter 6 Information Processing: Observation and Thinking Techniques
- Your Brain vs. Your Observation
- Observation vs. Heuristics
- Heuristics
- Behold Linda
- Observation vs. Intuition
- Using Reasoning and Logic
- Observing People
- Observation Exercise
- AMs and Observation
- Tying It All Together
- Critical and Nonlinear Thinking
- Vector vs. Arc
- Education and Critical Thinking
- Workplace Critical Thinking
- Critical Thinking and Other Psychological Constructs
- Critical Thinking Skills
- Nonlinear Thinking
- Tying Them Together
- Summary
- Key Message
- Chapter 7 Information Processing in Practice
- Reconnaissance
- Recon: Passive
- Recon: Active
- OSINT
- OSINT Over the Years
- Intel Types
- Alternative Data in OSINT
- Signal vs. Noise
- Weaponizing of Information
- Tying Back to the Objective
- Summary
- Key Message
- Part III Tools and Anatomy
- Chapter 8 Attack Strategy
- Attacks in Action
- Strategic Environment
- The Necessity of Engagement and Winning
- The Attack Surface
- Vulnerabilities
- AMs Applied to the Attack Vectors
- Phishing
- Mass Phish
- Spearphish
- Whaling
- Vishing
- Smishing/Smshing
- Impersonation
- Physical
- Back to the Manhattan Bank
- Summary
- Key Message
- Chapter 9 Psychology in Attacks
- Pease, Andrew, author.
- Birmingham : Packt Publishing Limited, 2021.
- Description
- Book — 1 online resource
- Summary
-
- Table of Contents Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks Hunting Concepts, Methodologies, and Techniques Introduction to the Elastic Stack Building Your Hunting Lab -
- Part 1 Building Your Hunting Lab -
- Part 2 Data Collection with Beats and Elastic Agent Using Kibana to Explore and Visualize Data The Elastic Security App Using Kibana to Pivot Through Data to Find Adversaries Leveraging Hunting to Inform Operations Enriching Data to Make Intelligence Sharing Information and Analysis.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Gupta, C. P., author.
- Dulles, Virginia : Mercury Learning and Information, [2020]
- Description
- Book — 1 online resource (xiii, 204 pages) : illustrations
- Summary
-
- 1: Introduction to Information Systems
- 2: Data Security and Cybersecurity Applications
- 3: Developing Secure Information Systems
- 4: Information Security Policies, Standards, and Cyberlaw Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Online
- Gupta, C. P., author.
- Dulles, Virginia : Mercury Learning and Information, [2020]
- Description
- Book — 1 online resource (xiii, 204 pages) : illustrations
- Summary
-
- 1: Introduction to Information Systems
- 2: Data Security and Cybersecurity Applications
- 3: Developing Secure Information Systems
- 4: Information Security Policies, Standards, and Cyberlaw Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
6. Security on IBM z/VSE [2018]
- Hellner, Helmut, author.
- Fourth edition. - Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2018.
- Description
- Book — 1 online resource (1 volume) : illustrations Digital: data file.
- Summary
-
Abstract One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE® system features extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from various sources. Insider threats and malicious hackers are not only difficult to detect and prevent, they might be using resources with the business being unaware. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security that is provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.
- Sammons, John, author.
- Cambridge, MA : Syngress, [2017]
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- 1. What is cyber safety?
- 2. Before connecting to the Internet
- 3. Software problems and solutions
- 4. Email safety and security
- 5. Cybercrime
- 6. Protecting yourself on social media
- 7. Finding a job online
- 8. Protecting your reputation
- 9. Beyond technology - dealing with people
- 10. Protecting your kids.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
8. Cyber Security Essentials [2016]
- 1st. - Auerbach Publications, 2016.
- Description
- Book — 1 online resource (342 pages : 131 illustrations)
- Summary
-
- Cyber Security Fundamentals. Network and Security Concepts. Microsoft Windows Security Principles. Attacker Techniques and Motivations. How Hackers Cover Their Tracks (Anti-forensics). Fraud Techniques. Threat Infrastructure. Exploitation. Techniques to Gain a Foothold. Misdirection, Reconnaissance and Disruption Methods. Malicious Code. Self-Replicating Malicious Code. Evading Detection and Elevating Privileges. Stealing Information and Exploitation. Defense and Analysis Techniques. Memory Forensics. Honeypots. Malicious Code Naming. Automated Malicious Code Analysis Systems. Intrusion Detection Systems. iDefense Special File Investigation Tools.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
9. IT-Sicherheit & Datenschutz [2012]
- Fröschle, Hans-Peter.
- Heidelberg : Dpunkt.verlag, 2012.
- Description
- Book — 1 online resource (129 pages).
- Summary
-
- Cartoon; Editorial; Einwurf; Jürgen Schoolmann, Die Herausforderungen nehmen zu
- Informationssicherheit und Informationsschutz im Umbruch; Stefan Pütz, Aleksandra Sowa, Michael Wißborn, Sicherheits- und Datenschutzanforderungen im Systementwicklungsprozess; Michael Föck, Hans-Peter Fröschle, Schutz der Unternehmensdaten
- Data Leakage Protection (DLP); Michael Karlinger, Klaus Ettmayer, Michael Schref, lVerschlüsselung bei ausgelagerter Datenhaltung; Danilo Karde, lIT-Sicherheitsmanagement in KMU; Daniel Voigtländer, Thomas Schmischke, Der Datenschutzbeauftragte.
- Mathias Ardelt, Frank Dölitzscher, Martin Knahl, Christoph Reich, Sicherheitsprobleme für IT-Outsourcing durch Cloud ComputingChristian Hrach, Rainer Alt, Lars Nöbel, Datenschutz im Callcenter; Stefan Knipl, Ali Sunyaev, Elektronische Gesundheitskarte: Sicherheitsbetrachtung der deutschen Telematikinfrastruktur; René Börner, Jürgen Moormann, Mitarbeiterschulung mit Rollenspielen und Workflow-Management-Systemen; Martin Juhrisch, Hannes Schlieter, Gunnar Dietz, Konzeptuelle Modellierung im klinischen Umfeld.
- Jan-Helge Deutscher, Wolfram Häußler, Prozessentwicklungskarte
- kosteneffektive Umsetzungdes IT-Servicemanagements nach ISO 20000Glossar; Notizen; Bücher; Vorschau; Stichwortverzeichnis; Impressum.
10. Podstawy ochrony komputerów [2012]
- Computer security basics. Polish
- Lehtinen, Rick.
- [Kościuszki] : Helion, ©2012.
- Description
- Book — 1 online resource (1 volume) : illustrations Digital: text file.
- Summary
-
Zadbaj o bezpiecze?stwo swojego komputera
Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniajšce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany sposób. Okazuje si? wówczas, ?e skaner wykrywa dziesištki, a nawet setki wirusów, programy zaczynajš dzia?a? nieprawid?owo, a z dysku ginš wa?ne dane. Pó? biedy, je?li jest to tylko domowy komputer z prywatnymi plikami. Du?o gorsze skutki mo?e mie? w?amanie do firmowej bazy danych lub przechwycenie poufnej komunikacji. Ksiš?ka "Podstawy ochrony komputerów" to wszechstronne wprowadzenie do najwa?niejszych zagadnie? dotyczšcych bezpiecze?stwa danych i sprz?tu. Czytajšc jš, poznasz zagro?enia, jakie czyhajš na u?ytkowników komputerów, ale tak?e skuteczne techniki ochrony. Nauczysz si? kontrolowa? dost?p do danych, prowadzi? efektywnš polityk? zabezpiecze?, wykrywa? i usuwa? wirusy oraz zapobiega? przenikaniu ich do systemu. Dowiesz si?, jak zapewni? bezpiecze?stwo komputera w sieci oraz jak u?ywa? szyfrowania do przesy?ania poufnych informacji. Przeczytasz te? o najnowszych technikach zabezpieczenia bazujšcego na danych biometrycznych (wzorze siatkówki czy odciskach palców) oraz ochronie sieci bezprzewodowych. Niebezpiecze?stwa gro?šce u?ytkownikom komputerów Kontrolowanie dost?pu do komputera Walka z wirusami Prowadzenie skutecznej polityki zabezpiecze? Bezpieczne korzystanie z sieci Szyfrowanie poufnych danych Komunikacja bez ryzyka Zabezpieczenia biometryczne Tworzenie bezpiecznych sieci bezprzewodowychStosuj skuteczne zabezpieczenia i zapewnij maksymalne bezpiecze?stwo swojemu komputerowi!
- 2nd ed - [Poughkeepsie, N.Y.] : IBM Corporation, International Technical Support Organization, ©2010
- Description
- Book — 1 online resource (464 pages)
12. Security on IBM z/VSE [2009]
- [United States?] : IBM, International Technical Support Organization, ©2009
- Description
- Book — 1 online resource (xii, 362 pages) : illustrations
- Provos, Niels.
- Upper Saddle River, N.J. : Addison-Wesley, 2007.
- Description
- Book — 1 online resource
- Summary
-
- Preface xiii Acknowledgments xxi About the Authors xxiii
- Chapter 1 Honeypot and Networking Background 1 1.1 Brief TCP/IP Introduction 1 1.2 Honeypot Background 7 1.3 Tools of the Trade 13
- Chapter 2 High-Interaction Honeypots 19 2.1 Advantages and Disadvantages 20 2.2 VMware 22 2.3 User-Mode Linux 41 2.4 Argos 52 2.5 Safeguarding Your Honeypots 62 2.6 Summary 69
- Chapter 3 Low-Interaction Honeypots 71 3.1 Advantages and Disadvantages 72 3.2 Deception Toolkit 73 3.3 LaBrea 74 3.4 Tiny Honeypot 81 3.5 GHH-Google Hack Honeypot 87 3.6 PHP.HoP-A Web-Based Deception Framework 94 3.7 Securing Your Low-Interaction Honeypots 98 3.8 Summary 103
- Chapter 4 Honeyd-The Basics 105 4.1 Overview 106 4.2 Design Overview 109 4.3 Receiving Network Data 112 4.4 Runtime Flags 114 4.5 Configuration 115 4.6 Experiments with Honeyd 125 4.7 Services 129 4.8 Logging 131 4.9 Summary 134
- Chapter 5 Honeyd-Advanced Topics 135 5.1 Advanced Configuration 136 5.2 Emulating Services 139 5.3 Subsystems 142 5.4 Internal Python Services 146 5.5 Dynamic Templates 148 5.6 Routing Topology 150 5.7 Honeydstats 154 5.8 Honeydctl 156 5.9 Honeycomb 158 5.10 Performance 160 5.11 Summary 161
- Chapter 6 Collecting Malware with Honeypots 163 6.1 A Primer on Malicious Software 164 6.2 Nepenthes-A Honeypot Solution to Collect Malware 165 6.3 Honeytrap 197 6.4 Other Honeypot Solutions for Learning About Malware 204 6.5 Summary 207
- Chapter 7 Hybrid Systems 209 7.1 Collapsar 211 7.2 Potemkin 214 7.3 RolePlayer 220 7.4 Research Summary 224 7.5 Building Your Own Hybrid Honeypot System 224 7.6 Summary 230
- Chapter 8 Client Honeypots 231 8.1 Learning More About Client-Side Threats 232 8.2 Low-Interaction Client Honeypots 241 8.3 High-Interaction Client Honeypots 253 8.4 Other Approaches 263 8.5 Summary 272
- Chapter 9 Detecting Honeypots 273 9.1 Detecting Low-Interaction Honeypots 274 9.2 Detecting High-Interaction Honeypots 280 9.3 Detecting Rootkits 302 9.4 Summary 305
- Chapter 10 Case Studies 307 10.1 Blast-o-Mat: Using Nepenthes to Detect Infected Clients 308 10.2 Search Worms 327 10.3 Red Hat 8.0 Compromise 332 10.4 Windows 2000 Compromise 343 10.5 SUSE 9.1 Compromise 351 10.6 Summary 357
- Chapter 11 Tracking Botnets 359 11.1 Bot and Botnet 101 360 11.2 Tracking Botnets 373 11.3 Case Studies 376 11.4 Defending Against Bots 387 11.5 Summary 390
- Chapter 12 Analyzing Malware with CWSandbox 391 12.1 CWSandbox Overview 392 12.2 Behavior-Based Malware Analysis 394 12.3 CWSandbox-System Description 401 12.4 Results 405 12.5 Summary 413 Bibliography 415 Index 423.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
14. Solaris 8 Security [2001]
- Danielyan, Edgar, author.
- 1st edition. - Que, 2001.
- Description
- Book — 1 online resource (296 pages) Digital: text file.
- Summary
-
Solaris 8 Security covers all the concepts and issues Solaris 8 administrators need to know in order to make and keep their Solaris 8 systems secure. This includes not only Solaris 8 security tools and features, but such subjects as cryptography and defenses against known attacks and vulnerabilities. Readers learn practical, command-level defenses, such as: How to configure a secure DNS server What to do with /etc/inet/inetd.conf How to make IPsec work Why DES fails How to identify and prevent system compromises How not to configure sendmail How to automate security checkups The book provides a proactive approach to security. Coverage includes intrusion detection systems, network-level filtering, firewalls and other network-level systems.
15. Cybersecurity Manager's Guide [2021]
- Barnum, Todd.
- [Place of publication not identified] : O'Reilly Media, Inc., 2021.
- Description
- Book — 1 online resource
- Summary
-
If you're a leader in Cybersecurity, then you know it often seems like no one cares about--or understands--information security. Infosec professionals struggle to integrate security into their companies. Most are under resourced. Most are at odds with their organizations. There must be a better way. This essential manager's guide offers a new approach to building and maintaining an information security program that's both effective and easy to follow. Author and longtime infosec leader Todd Barnum upends the assumptions security professionals take for granted. CISOs, CSOs, CIOs, and IT security professionals will learn a simple seven-step process that will help you build a new program or improve your current program. Build better relationships with IT and other teams within your organization Align your role with your company's values, culture, and tolerance for information loss Lay the groundwork for your security program Create a communications program to share your team's contributions and educate your coworkers Transition security functions and responsibilities to other teams Organize and build an effective infosec team Measure your progress with two key metrics: your staff's ability to recognize and report security policy violations and phishing emails.
- Kalsi, Tajinder, author.
- Second edition. - Birmingham, UK : Packt Publishing, 2018.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Table of Contents Linux Security Problem Configuring a Secure and Optimized Kernel Local Filesystem Security Local Authentication in Linux Remote Authentication Network Security Security Tools Linux Security Distros Bash Vulnerability Patching Security Monitoring and Logging Understanding Linux Service Security Scanning & Auditing Linux Vulnerability Scanning & Intrusion Detection.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
17. DataPower Architectural Design Patterns: Integrating and Securing Services Across Domains [2008]
- Mike.
- [Place of publication not identified] : IBM Redbooks, 2008
- Description
- Book — 1 online resource
- Watkins, Steve G.
- 2nd ed. - Ely, UK : IT Governance Pub., 2013.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Introduction
- 1: Information Security - What's That? Who does it matter to?
- 2: It's Not IT
- 3: ISO27001 and the Management System Requirements
- 4: Information Assets and the Information Security Risk Assessment
- r 5: Information Security Controls
- 6: Certification
- 7: Signposting
- ITG Resources.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project. *Ensure everyone is up to speed. Use this guide to give the non-specialists on the project board and in the project team a clearer understanding of what the project involves. *Raise awareness among staff. Use this guide to make sure your people know what is at stake with regard to information security and understand what is expected of them. *Enhance your competitiveness Use this guide to let your customers know that the information you hold about them is managed and protected appropriately. Buy this pocket guide and learn how you can keep your information assets secure.
(source: Nielsen Book Data)
19. The future of security [2022]
- Morillo, Christina, author.
- First edition. - Sebastopol, CA : O'Reilly Media, Inc., 2022.
- Description
- Book — 1 online resource (16 pages)
- Summary
-
The cybersecurity arms race is escalating. As businesses turn to technologies like cloud computing and mobile devices, security threats such as ransomware are increasing in both number and sophistication. The cloud age is forcing companies to embrace a new approach that includes automation, analytics, and context-aware capabilities for providing advanced threat protection. In this report, Christina Morillo examines why companies today need to take further steps to secure their networks, data, and identities. IT and infosec leaders, security engineers, and architects will dive into the latest strategies for countering ongoing and increasingly complex intrusions into their systems.
- MacMillan, Joseph.
- Birmingham : Packt Publishing, Limited, 2021.
- Description
- Book — 1 online resource (272 pages)
- Summary
-
- Table of Contents InfoSec and Risk Management Protecting the Security of Assets Designing Secure Information Systems Designing and Protecting Network Security Controlling Access and Managing Identity Designing and Managing Security Testing Processes Owning Security Operations Improving the Security of Software.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.