feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Type of Publication
Consortium
Language
  • 1
    UID:
    (DE-627)1023947781
    Format: 1 online resource (316 pages)
    Edition: 1st ed.
    ISBN: 9781788832496
    Content: Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the ...
    Content: Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Fundamental Security Concepts -- Why security? -- Building blocks of information security -- Computer security -- Network security -- Firewalls -- Intrusion detection systems / intrusion prevention systems -- Multitier topology -- Internet security -- Password -- System upgrade and updates -- Phishing -- Beware of phishing phone calls -- Phishing protection -- Security issues, threats, and attacks -- IoT security risk -- Computer security risk -- Security Risk-Border Gateway Protocol -- Security and threats -- Natural disasters -- Human threats -- Security vulnerabilities -- Technology weaknesses -- Configuration weaknesses -- Security policy weaknesses -- Using unencrypted or weak encryption for a website -- Summary -- Questions -- Further reading -- Chapter 2: Secure Network Design -- Access control -- Asset classification and physical security -- Authentication, authorization, and accounting -- Network management and security design -- Network segmentation -- Segmentation strategy steps -- Network protection consideration and design -- Hardening your TCP/IP stack -- DoS and DDoS attacks -- Volume-based attacks -- Application layer attacks -- Low-rate attacks -- IP spoofing -- Anti-spoofing using access lists -- Encryption -- Anti-spoofing using RPF checks -- Ping sweeps and Port scans -- Mitigation -- DNS vulnerabilities -- How does DNS work? -- DNS protocol attacks -- Mitigation -- Two factor authentication -- Summary -- Questions -- Further reading -- Chapter 3: Server-Level Security -- Classification of data -- Physical security -- Disk encryption -- Full-disk encryption -- Bitlocker -- Virtual Trusted Platform Module - vTPM -- Encrypt your Hyper-V Guest VMs -- Cloud VM disk encryption -- What is encryption at rest?.
    Content: Hardening server security -- Check for open ports or services -- System firewall configuration -- System update -- Disable USB -- Hard disk encryption -- BIOS protection -- Check the installed packages -- Password policies -- Secure and encrypt remote access -- Implement activity logging -- Document the host information -- Authentication NTLM versus Kerberos -- Password policies -- Server-level permissions -- Server antivirus and malware protection -- Local security policies -- Summary -- Questions -- Further reading -- Chapter 4: Cloud Security Design -- Cloud offerings -- IaaS -- PaaS -- SaaS -- Public versus private -- Public IaaS versus private IaaS -- Public PaaS versus private PaaS -- Public SaaS versus private SaaS -- Shared technology and shared danger -- Security approach for cloud computing -- Traditional enterprise network model -- Hybrid data center and cloud network -- Network security devices for IaaS -- Firewall Virtual Appliance -- Virtual TAP vTAP -- Virtual Router -- Virtual web application firewalls -- DDoS attack protection -- Data loss prevention -- Exploited system vulnerabilities -- Summary -- Questions -- Further reading -- Chapter 5: Application Security Design -- GDPR -- Getting consent -- Access to data -- Encryption -- SQL Injection -- Prevention of SQL Injection attack on web applications -- Employing comprehensive data sanitization -- Deploying a Web Application Firewall -- Limit database privileges -- Finding vulnerabilities -- WAFs -- WAF protection against common web attacks -- Blacklisting and whitelisting -- What is blacklisting? -- Benefit and disadvantage of blacklisting -- What is whitelisting? -- Benefit and disadvantage of whitelisting -- Which is better? -- Using HTTPS for everything -- HTTP versus HTTPS -- Web application security -- SSL/TLS deployment -- SSL/TLS key size -- Signing algorithm
    Content: Secure protocol -- Preventing an authentication hacking attack -- Use cookies securely -- Vulnerabilities scan -- Server security -- Introduce a bug bounty program -- Summary -- Questions -- Further reading -- Chapter 6: Threat Detection and Response -- Network threat detection -- Detection methods -- Intrusion detection system -- Types of IDSs -- Network capture solution -- Threat detection with Netflow/IPFIX -- NetFlow vs. IPFIX -- Endpoint threat detection -- What's an endpoint -- Endpoint Detection and Response (EDR) system -- Case Study - Why EDR system is required? -- Security policy -- How to choose an EDR solution ? -- Security information and event management -- SIEM-Event versus incident and data breach -- What is an event? -- What is a security incident? -- What is a data breach? -- How do SIEM systems work? -- Event generator sensors -- Event and log collection or data aggregation -- Correlation -- Reporting and Alerting -- Dashboards -- Automation -- Log management -- SIEM commercial products -- Summary -- Questions -- Further reading -- Chapter 7: Vulnerability Assessment -- Infrastructure concerns -- What is vulnerability assessment? -- Plan -- Network discovery -- Vulnerability scan -- Report -- Remediation -- Why do we need vulnerability assessment? -- Types of vulnerability assessment -- Network-based assessment -- Host-based assessment -- Nessus installation, configuration, and vulnerability assessment methodology -- Installation -- Policies -- Sample report -- Summary -- Questions -- Further reading -- Chapter 8: Remote OS Detection -- Reasons for OS detection -- Network operating system inventory - trace your infrastructure -- Determining vulnerability of target hosts -- Tailoring exploits -- OS detection technique with Nmap -- Nmap tool -- Operating system detection -- TCP/IP fingerprinting methods supported by Nmap
    Content: TCP/UDP/IP basic -- The FIN probe -- TCP ISN sampling -- TCP initial window -- Type of service -- Time-to-live (TTL) -- Don't Fragment (DF) bit -- Understanding an Nmap fingerprint -- OS matching algorithms -- Defense against port scans -- Summary -- Questions -- Further reading -- Chapter 9: Public Key Infrastructure - SSL -- Foundation of SSL -- How do I know that SSL is working? -- Why no PadLock? -- SSL certificate -- The evolution of SSL and TLS -- Current Supported Standard -- Why hasn't TLS 1.3 been implemented yet? -- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN
    Content: MPLS VPN -- VPN Design -- IKE V1 versus IKE V2 -- WAN Encryption technique -- IPsec Layer-3 encryption -- MACsec-Layer-2 Encryption -- Optical Network-Layer-1 Encryption -- Summary -- Questions -- Further Reading -- Chapter 12: Summary and Scope of Security Technologies -- DDoS protection -- Remotely triggered black hole routing (RTBH) -- Black hole traffic from the source of the attack -- Black hole traffic to the destination of the attack -- BGP FlowSpec -- DDoS scrubbing -- Blockchain Technology for Fighting DDoS Attacks -- AI in cyber security -- Next Gen SIEM -- Software Defined Networking Firewall -- Bring-Your-Own-Identity (BYOI) -- Summary -- Further reading -- Assessment -- Other Books you may enjoy -- Index
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9781788839235
    Additional Edition: Erscheint auch als Druck-Ausgabe 9781788839235
    Additional Edition: Print version Cox, Jacob Practical Network Scanning : Capture network vulnerabilities using standard tools such as Nmap and Nessus Birmingham : Packt Publishing,c2018
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Berlin : Springer
    UID:
    (DE-101)970160917
    Format: XVII, 309 S. , graph. Darst. , 24 cm
    ISBN: 9783540211013 , 3540211012
    Series Statement: Soil biology 2
    Content: The diverse metabolic capabilities of microorganisms and their interactions with hazardous organic and inorganic compounds have long been recognized. Microbial processes are environmentally compatible and can be integrated with non-biological processes to detoxify, degrade and immobilize environmental contaminants. Bioremediation, the application of biological methods, has been used successfully for soil remediation. For this volume, a number of experts from universities, government laboratories and industry, share their specialist knowledge in environmental microbiology and biotechnology. Chapters dealing with microbiological, biochemical and molecular aspects of biodegradation and bioremediation cover numerous topics, including: bioavailability, biodegradation of various pollutants, microbial community dynamics, properties and engineering of important biocatalysts, and methods for monitoring bioremediation processes. TOC: 1 Biotechnology and Bioremediation ? An Overview, A. Singh and O. Ward; 2 Microbial Community Dynamics During Bioremediation of Hydrocarbons, E.A. Green and G. Voordouw; 3 Bioavailability and Biodegradation of Organic Pollutants ? A Microbial Perspective, J.Van Hamme; 4 Anaerobic Biodegradation of Hydrocarbons, J.D. Coates; 5 Biotransformation, Biodegradation and Bioremediation of Polycyclic Aromatic Hydrocarbons, M. Aitken and T.C. Long; 6 Biodegradation and Bioremediation of Halogenated Organic Compounds, W.W. Mohn; 7 Biodegradation of N-Containing Xenobiotics, J. Ye, A. Singh and O.P. Ward; 8 Aromatic Hydrocarbon Dioxygenases, R. Parales and S.M. Resnick; 9 Bacterial Reductive Dehalogenases, M. B. Habash, J.D. Trevors and H. Lee; 10 Engineering of improved biocatalysts in bioremediation, W. Chen and A. Mulchandani; 11 Combined Biological and Abiological Degradation of Xenobiotic Compounds, R. Crawford, T.F. Hess and A. Paszczynski; 12 Methods for Monitoring and Assessment of Bioremediation Processes, A. Singh, R.C. Kuhad, Z. Shareefdeen and O.P. Ward
    Note: Literaturangaben
    Additional Edition: Online-Ausg. Biodegradation and Bioremediation Berlin, Heidelberg : Springer Berlin Heidelberg, 2004
    Language: English
    Keywords: Boden ; Schadstoff ; Biologischer Abbau ; Aufsatzsammlung ; Boden ; Bioremediation ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Saarbrücken : LAP LAMBERT Academic Publishing
    UID:
    (DE-101)1120594839
    Format: Online-Ressource
    Edition: 1. Auflage, neue Ausgabe
    ISBN: 9783330001794 , 3330001798
    Note: Lizenzpflichtig. - Vom Verlag als Druckwerk on demand und/oder als E-Book angeboten
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    New Delhi : Agam Kala Prakashan
    UID:
    (DE-603)340185260
    Format: XIV, 330 S. , Ill. , 28 cm
    Edition: 1. publ.
    ISBN: 8173200734
    Note: Includes index.
    Language: English
    Keywords: Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    UID:
    (DE-101)1029713286
    Format: Online-Ressource
    ISBN: 9783662060667
    Note: Lizenzpflichtig
    Additional Edition: Druckausg. Biodegradation and bioremediation Berlin ; Berlin ; Heidelberg ; New York ; Hong Kong ; London ; Milan ; Paris ; Tokyo : Springer, 2004
    Language: German
    Keywords: Boden ; Schadstoff ; Biologischer Abbau ; Aufsatzsammlung ; Boden ; Bioremediation ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Philadelphia : Wolters Kluwer
    UID:
    (DE-627)838380417
    Format: xvi, 283 Seiten , Illustrationen
    ISBN: 9781496307194
    Series Statement: Essentials series
    Note: Literaturangaben
    Language: English
    Keywords: Gastrointestinaltrakt ; Radiologische Diagnostik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Berlin [u.a.] :Springer,
    UID:
    (DE-602)almahu_BV025561941
    Format: XIII, 361 S. : , graph. Darst.
    ISBN: 978-3-540-89620-3
    Series Statement: Soil Biology 17
    Language: English
    Subjects: Agriculture, Forestry, Horticulture, Fishery, Domestic Science , Biology
    RVK:
    RVK:
    Keywords: Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    (DE-627)1616785527
    Format: XVII, 309 S. , Ill., graf. Darst.
    ISBN: 9783642059292
    Series Statement: Soil biology 2
    Language: English
    Subjects: Agriculture, Forestry, Horticulture, Fishery, Domestic Science , Biology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Boden ; Schadstoff ; Biologischer Abbau ; Boden ; Bioremediation ; Aufsatzsammlung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    (DE-627)1659566630
    Format: H. 2, S. 169 - 180
    ISSN: 0970-0161
    In: Strategic analysis, Abingdon : Routledge, 1977, 21 (1998/99)(1998), 2, Seite 169 - 180, 0970-0161
    In: volume:21 (1998/99)
    In: year:1998
    In: number:2
    In: pages:169 - 180
    Language: English
    Keywords: Krieg ; Kriegführung ; Strategie ; Technischer Fortschritt
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    (DE-627)1659570409
    Format: H. 3, S. 339 - 350
    ISSN: 0970-0161
    In: Strategic analysis, Abingdon : Routledge, 1977, 21 (1998/99)(1998), 3, Seite 339 - 350, 0970-0161
    In: volume:21 (1998/99)
    In: year:1998
    In: number:3
    In: pages:339 - 350
    Language: English
    Keywords: Indien ; Sicherheitspolitik ; Militärpolitik ; Unabhängigkeit ; Geschichte 1947-1995
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages