Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

5 kirjaa tekijältä Michael Gregg

Certified Ethical Hacker (CEH) Version 9 Pearson uCertify Course Student Access Card
Welcome to Certified Ethical Hacker (CEH) Version 9 Pearson uCertify Course Certified Ethical Hacker (CEH) Version 9 uCertify Course is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the Certified Ethical Hacker (CEH) Version 9 exam. Master all of the Certified Ethical Hacker (CEH) Version 9 exam objectives in the framework of C ertified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition interactive eBook. The interactive eBook includes informative text, tables, step-by-step lists, images, video, interactive exercises, glossary flash cards, and review activities. Gauge your readiness with a pre-assessment exam with questions specifically designed to identify your deficiencies. Then after you have worked through the course material practice use the two practice exams and the post assessment to see if you are ready or where you need to study more. In total there are over 440 practice questions. All of the content—the complete Cert Guide, the practice questions, and the exercises—is focused around the official Certified Ethical Hacker (CEH) Version 9 exam objectives.
CISSP Exam Cram

CISSP Exam Cram

Michael Gregg

Pearson IT Certification
2021
muu
CISSP Exam Cram, Fifth Edition is the perfect study guide to help you pass the latest update to the eight-domain version of the CISSP exam. It offers knowledge and practice questions for every exam topic, with new coverage of asset retention, secure provisioning, crypto attacks, machine learning tools, threat hunting, risk-based access control, zero trust, SAML, SOAR, CASB, securing microservices, containers, managed services, and more. Covers the critical information you'll need to score higher on your CISSP exam! Understand Security & Risk Management: ethics, security concepts, governance, compliance, law/regulation, policies/procedures, threat models, supply chain risk, awareness training, and moreEnsure Secure Assets: identify/classify information and assets; handling requirements, resource provisioning, data lifecycles, retentionReview Security Architecture & Engineering: secure processes and principles, security models and controls, system capabilities, vulnerability assessment/mitigation, crypto attacks/solutions, site/facility design and controlsImprove Communication & Network Security: secure network architectures, components, and channelsStrengthen Identity & Access Management (IAM): physical/logical access control, identification, authentication, federated identity services, authorization, identity/access provisioningEnhance Security Assessment & Testing: design/validate assessment, test, and audit strategies; test controls; collect process data; evaluate and report test results; conduct or support auditsManage Security Operations: investigations, logs, monitoring, resource protection, incident management, detection/prevention; configuration, patches, vulnerabilities, and changemanagement; DR/BC, physical and personnel security, and more
Field Epidemiology

Field Epidemiology

Michael Gregg

Oxford University Press Inc
2008
sidottu
This book is the definitive guide to field epidemiology - the application of epidemiologic methods to unexpected health problems (e.g. bioterrorist attacks, natural disasters, industrial accidents) where rapid, on-site investigation is necessary. The third edition includes new chapters on environmental investigations and immunization strategies and evaluation. Existing chapters on bioterrorism, surveillance, and operations have been completely rewritten. The rest of the chapters have been revised and updated with new case studies and examples.
Certified Ethical Hacker (CEH) Version 9 Pearson uCertify Course and Labs Access Card
Welcome to Certified Ethical Hacker (CEH) Version 9 Pearson uCertify Course and Labs Certified Ethical Hacker (CEH) Version 9 uCertify Course and Labs is an easy-to-use online course that allows you to assess your readiness and teaches you what you need to know to pass the Certified Ethical Hacker (CEH) Version 9 exam. Master all of the Certified Ethical Hacker (CEH) Version 9 exam objectives in the framework of Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition interactive eBook. The interactive eBook includes informative text, tables, step-by-step lists, images, video instruction, interactive exercises, glossary flash cards, and review activities. The course comes complete with extensive pre- and post-assessment tests. In total there are over 440 practice questions. The award-winning uCertify Labs help bridge the gap between conceptual knowledge and real-world application by providing competency-based, interactive, online, 24x7 training. uCertify Labs simulate the tools, techniques, and command line tools used by ethical hackers. The 60+ labs are supplemented with videos demonstrating lab solutions. Students can feel safe working in this virtual environment resolving real-world operating system and hardware problems. All of the content–the complete Cert Guide, the video instruction, the practice questions, the exercises, and the labs–is focused around the official Certified Ethical Hacker (CEH) Version 9 exam objectives.
The Network Security Test Lab

The Network Security Test Lab

Michael Gregg

John Wiley Sons Inc
2015
nidottu
The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. Get acquainted with your hardware, gear, and test platformLearn how attackers penetrate existing security systemsDetect malicious activity and build effective defensesInvestigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide.