悟空视频

    在线播放云盘网盘BT下载影视图书

    Cybersecurity:Attack and Defense Strategies - 图书

    2018计算机·计算机综合
    导演:Yuri Diogenes Erdal Ozkaya
    This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
    Cybersecurity:Attack and Defense Strategies
    图书

    Cybersecurity Threats,Malware Trends,and Strategies - 图书

    2020计算机·理论知识
    导演:Tim Rains
    Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.The book provides an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
    Cybersecurity Threats,Malware Trends,and Strategies
    搜索《Cybersecurity Threats,Malware Trends,and Strategies》
    图书

    Cybersecurity Attacks:Red Team Strategies - 图书

    2020计算机·编程设计
    导演:Johann Rehberger
    It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.
    Cybersecurity Attacks:Red Team Strategies
    搜索《Cybersecurity Attacks:Red Team Strategies》
    图书

    Offense, Defense and War - 图书

    2004
    导演:Michael E Brown
    Offense-defense theory argues that the relative ease of offense and defense varies in international politics. When the offense has the advantage, military conquest becomes easier and war is more likely; the opposite is true when the defense has the advantage. The balance between offense and defense depends on geography, technology, and other factors. This theory, and the body o...(展开全部)
    Offense, Defense and War
    搜索《Offense, Defense and War》
    图书

    Effective Cybersecurity 中文版: Cybersecurity - 图书

    导演:威廉·斯托林斯
    本书是一部在组织中实现网络安全的指导性著作,对于组织的网络安全规划、网络安全功能的管理和网络安全的评估具有重要的指导意义。 全书主要包含三个部分。  第一部分 网络安全规划:介绍管理和控制网络安全功能的方法、定义给定IT环境的特定需求、制定管理安全职能的政策和程序。  第二部分 管理网络安全功能:详细探讨旨在满足定义的安全需求的安全控制。其中第13章涵盖实现有效网络安全的广泛的管理、运营和技术手段。  第三部分 安全评估:总结对网络安全进行评测与改进的相关问题。
    Effective Cybersecurity 中文版: Cybersecurity
    搜索《Effective Cybersecurity 中文版: Cybersecurity》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    Strategies and Games: Theory and Practice - 图书

    导演:Prajit K·Dutta
    Game theory has become increasingly popular among undergraduate as well as business school students. This text is the first to provide both a complete theoretical treatment of the subject and a variety of real-world applications, primarily in economics, but also in business, political science, and the law. Strategies and Games grew out of Prajit Dutta's experience teaching a co...(展开全部)
    Strategies and Games: Theory and Practice
    搜索《Strategies and Games: Theory and Practice》
    图书

    Bond Markets, Analysis, and Strategies - 图书

    2009
    导演:Frank J·Fabozzi
    Learn how to assess and invest in bonds with this best-selling text. Fabozzi's Bond Markets is the most applied book on the market. It prepares students to analyze the bond market and manage bond portfolios without getting bogged down in the theory. The author's extensive experience in the field is reflected in this uniquely applied approach. This seventh edition has been pai...(展开全部)
    Bond Markets, Analysis, and Strategies
    搜索《Bond Markets, Analysis, and Strategies》
    图书

    Bond Markets, Analysis and Strategies - 图书

    2006
    导演:Frank J Fabozzi
    <P style="MARGIN: 0px">Target Market: Fixed Income Securities Courses or Bond Markets Courses</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Fabozzi's, Bond Markets, prepares students to analyze the the bond market and use the tools for managing bond portfolios.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Many texts on the market are far too theoretical...(展开全部)
    Bond Markets, Analysis and Strategies
    搜索《Bond Markets, Analysis and Strategies》
    图书

    C++ Strategies and Tactics - 图书

    1993
    导演:Robert B·Murray
    In chess, learning the rules for how the pieces move is simply the first step; to master the game, you must understand the strategies and tactics that guide each move. The same applies to C++. Knowing the right strategies helps you avoid the traps and work more effectively. Luminary Rob Murray helps beginning to intermediate C++ programmers take that next step by sharing his ex...(展开全部)
    C++ Strategies and Tactics
    搜索《C++ Strategies and Tactics》
    图书
    加载中...