Hacker Techniques, Tools and Incident Handling + Virtual Security Cloud Access

Hacker Techniques, Tools and Incident Handling + Virtual Security Cloud Access
ISBN-10
1284172600
ISBN-13
9781284172607
Category
Computers
Language
English
Published
2018-09-06
Publisher
Jones & Bartlett Publishers
Authors
Michael G. Solomon, Sean-Philip Oriyano

Description

Print Textbook & Virtual Security Cloud Lab Access: 180-day subscription. Please confirm the ISBNs used in your course with your instructor before placing your order; your institution may use a custom integration or an access portal that requires a different access code.

Similar books

  • Hacker Techniques, Tools and Incident Handling with Virtual Security Cloud Access
    By Sean-Philip Oriyano

    Hacker Techniques, Tools and Incident Handling with Virtual Security Cloud Access

  • Hacker Techniques, Tools, and Incident Handling
    By Michael G. Solomon, Sean-Philip Oriyano

    Hacker Techniques, Tools, and Incident Handling, Third Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, ...

  • Fundamentals of Information Systems Security
    By David Kim, Michael G. Solomon

    With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.

  • System Forensics, Investigation, and Response
    By Chuck Easttom

    ... Edition Network Security, Firewalls, and VPNs, Second Edition David Kim and Michael G. Solomon J. Michael Stewart Legal Issues in Information Security, Second Edition Joanna Lyn Grama Hacker Techniques, Tools, and Incident Handling, ...

  • Security Strategies in Windows Platforms and Applications
    By Michael Solomon

    References. Altholz, Nancy, and Larry Stevenson. Rootkits for Dummies (For Dummies [Computer/Tech]). Hoboken, NJ: Wiley, 2007. Barrett, Larry. “Symantec's 'Unlucky 13' Security Trends for 2010.” InternetNews.com, November 20, ...

  • System Forensics, Investigation and Response
    By Chuck Easttom

    "System Forensics, Investigation, and Response, Second Edition begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of ...

  • Network Security, Firewalls and VPNs
    By J. Michael Stewart

    Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.

  • Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
    By Dr. Erdal Ozkaya

    Unlike physical IT infrastructures, which users have unfiltered access to, cloud resources are virtual and are accessible via accounts with a vendor. This introduces a point of failure whereby, if a hacker can guess, steal, or otherwise ...

  • Fundamentals of Information Systems Security + Cloud Labs
    By David Kim, Michael G Solomon

    The cybersecurity Cloud Labs for Fundamentals of Information Systems Security provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information ...

  • Fundamentals of Communications and Networking
    By Jeffrey L. Carrell, David Kim, Michael G. Solomon

    TAblE 7-7 Examples of vendors and their link aggregation solutions. vendor Link aggregation SoLution Cisco • 3750: ISL, Stackwise , StackPower • 7010: PVST , Rapid PVST , ISSU HP • IRF (Intelligent Resilient Framework) Avaya • SMLT ...