悟空视频

    在线播放云盘网盘BT下载影视图书

    Cybersecurity:Attack and Defense Strategies - 图书

    2018计算机·计算机综合
    导演:Yuri Diogenes Erdal Ozkaya
    This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
    Cybersecurity:Attack and Defense Strategies
    图书

    Cybersecurity Threats,Malware Trends,and Strategies - 图书

    2020计算机·理论知识
    导演:Tim Rains
    Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.The book provides an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
    Cybersecurity Threats,Malware Trends,and Strategies
    搜索《Cybersecurity Threats,Malware Trends,and Strategies》
    图书

    Cybersecurity Attacks:Red Team Strategies - 图书

    2020计算机·编程设计
    导演:Johann Rehberger
    It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.
    Cybersecurity Attacks:Red Team Strategies
    搜索《Cybersecurity Attacks:Red Team Strategies》
    图书

    Adversarial AI Attacks, Mitigations, and Defense Strategies - 图书

    2024计算机·理论知识
    导演:John Sotiropoulos
    “The book not only explains how adversarial attacks work but also shows you how to build your own test environment and run attacks to see how they can corrupt ML models. It's a comprehensive guide that walks you through the technical details and then flips to show you how to defend against these very same attacks.” – Elaine Doyle, VP and Cybersecurity Architect, Salesforce Key Features Understand the unique security challenges presented by predictive and generative A
    Adversarial AI Attacks, Mitigations, and Defense Strategies
    搜索《Adversarial AI Attacks, Mitigations, and Defense Strategies》
    图书

    Effective Cybersecurity 中文版: Cybersecurity - 图书

    导演:威廉·斯托林斯
    本书是一部在组织中实现网络安全的指导性著作,对于组织的网络安全规划、网络安全功能的管理和网络安全的评估具有重要的指导意义。 全书主要包含三个部分。  第一部分 网络安全规划:介绍管理和控制网络安全功能的方法、定义给定IT环境的特定需求、制定管理安全职能的政策和程序。  第二部分 管理网络安全功能:详细探讨旨在满足定义的安全需求的安全控制。其中第13章涵盖实现有效网络安全的广泛的管理、运营和技术手段。  第三部分 安全评估:总结对网络安全进行评测与改进的相关问题。
    Effective Cybersecurity 中文版: Cybersecurity
    搜索《Effective Cybersecurity 中文版: Cybersecurity》
    图书

    Effective Cybersecurity 中文版: Cybersecurity - 图书

    导演:威廉·斯托林斯
    本书是一部在组织中实现网络安全的指导性著作,对于组织的网络安全规划、网络安全功能的管理和网络安全的评估具有重要的指导意义。 全书主要包含三个部分。  第一部分 网络安全规划:介绍管理和控制网络安全功能的方法、定义给定IT环境的特定需求、制定管理安全职能的政策和程序。  第二部分 管理网络安全功能:详细探讨旨在满足定义的安全需求的安全控制。其中第13章涵盖实现有效网络安全的广泛的管理、运营和技术手段。  第三部分 安全评估:总结对网络安全进行评测与改进的相关问题。
    Effective Cybersecurity 中文版: Cybersecurity
    搜索《Effective Cybersecurity 中文版: Cybersecurity》
    图书

    Offense, Defense and War - 图书

    2004
    导演:Michael E Brown
    Offense-defense theory argues that the relative ease of offense and defense varies in international politics. When the offense has the advantage, military conquest becomes easier and war is more likely; the opposite is true when the defense has the advantage. The balance between offense and defense depends on geography, technology, and other factors. This theory, and the body o...(展开全部)
    Offense, Defense and War
    搜索《Offense, Defense and War》
    图书

    Offense, Defense and War - 图书

    2004
    导演:Michael E Brown
    Offense-defense theory argues that the relative ease of offense and defense varies in international politics. When the offense has the advantage, military conquest becomes easier and war is more likely; the opposite is true when the defense has the advantage. The balance between offense and defense depends on geography, technology, and other factors. This theory, and the body o...(展开全部)
    Offense, Defense and War
    搜索《Offense, Defense and War》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书

    SQL Injection Attacks and Defense - 图书

    2009
    导演:Justin Clarke
    SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and s...(展开全部)
    SQL Injection Attacks and Defense
    搜索《SQL Injection Attacks and Defense》
    图书
    加载中...