Kirjojen hintavertailu. Mukana 12 384 670 kirjaa ja 12 kauppaa.

Kirjailija

Robert Shimonski

Kirjat ja teokset yhdessä paikassa: 15 kirjaa, julkaisuja vuosilta 2009-2025, suosituimpien joukossa Client-Side Attacks and Defense. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

15 kirjaa

Kirjojen julkaisuhaarukka 2009-2025.

Foundations of Cloud Computing

Foundations of Cloud Computing

Robert Shimonski

ELSEVIER SCIENCE TECHNOLOGY
2025
nidottu
Foundations of Cloud Computing provides readers with a guidebook to navigating the field of Cloud Computing, including the guiding principles, key concepts, history, terminology, state-of-the-art in research, and a roadmap to where the field intersects and interacts with related fields of research and development. In this age of total connectivity, researchers need to be able to communicate and collaborate with a wide range of colleagues across multiple disciplines. This book helps researchers from all fields understand what Cloud Computing is, how it works, and how to speak the language of collaboration with developers and researchers who specialize in the field. With a complete and in-depth foundation in the key concepts of the field, and a roadmap to where and how Cloud Computing intersects across the domains of scientific research and application development, this book gives readers everything they need to navigate and apply this important, ubiquitous technology.
CompTIA PenTest+ Study Guide

CompTIA PenTest+ Study Guide

Mike Chapple; Robert Shimonski; David Seidl

JOHN WILEY SONS INC
2025
nidottu
Prepare for the CompTIA PenTest+ certification exam and improve your information security job performance with Sybex In the newly revised third edition of the CompTIA PenTest+ Study Guide: Exam PT0-003, renowned information security professionals Mike Chapple, Rob Shimonski, and David Seidl deliver a comprehensive and up-to-date roadmap to succeeding on the challenging PenTest+ certification exam. Freshly updated to track the latest changes made to Exam PT0-003, the book will prepare you not just for the test, but for your first day at your first or next information security job. From penetration testing to vulnerability management and assessment, the authors cover every competency tested by the qualification exam. You'll also find: Complimentary access to the Sybex online learning environment, complete with hundreds of electronic flashcards and a searchable glossary of important termsUp-to-date info organized to track the newly updated PT0-003 PenTest+ certification examQuick reference material and practice tests designed to help you prepare smarter and faster for the test Succeed on the PT0-003 exam the first time. Grab a copy of CompTIA PenTest+ Study Guide and walk into the test—or your new information security job—with confidence.
CompTIA Security+ SY0-701 Exam Cram

CompTIA Security+ SY0-701 Exam Cram

Robert Shimonski; Martin Weiss

PEARSON EDUCATION (US)
2024
nidottu
CompTIA Security+ SY0-701 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Security+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams. This edition comes with a Pearson Test Prep Practice Test access code that is delivered upon product registration. Follow the instructions in the book's introduction to register your product. Covers the critical information needed to score higher on your Security+ SY0-701 exam! General security conceptsThreats, vulnerabilities, and mitigationsSecurity architectureSecurity operationsSecurity program management and oversight Prepare for your exam with Pearson Test Prep Realistic practice questions and answersComprehensive reporting and feedbackCustomized testing in study, practice exam, or flash card modesComplete coverage of CompTIA Security+ SY0-701 exam objectives
Security Strategies in Windows Platforms and Applications + Cloud Labs

Security Strategies in Windows Platforms and Applications + Cloud Labs

Robert Shimonski; Michael G. Solomon

JONES AND BARTLETT PUBLISHERS, INC
2023
nidottu
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for Security Strategies in Windows Platforms and Applications provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones amp Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Labs: Lab : Implementing Access Controls with Windows Active Directory Lab 2: Using Access Control Lists to Modify File System Permissions on Windows Systems Lab 3: Configuring Microsoft Encrypting File System and BitLocker Drive Encryption Lab 4: Identifying and Removing Malware from Windows Systems Lab 5: Managing Group Policy within the Microsoft Windows Environment Lab : Auditing Windows Systems for Security Compliance Lab 7: Creating a Scheduled Backup and Replicating System Folders Lab 8: Hardening Windows Systems for Security Compliance Lab 9: Securing Internet Client and Server Applications on Windows Systems Lab : Investigating Security Incidents within the Microsoft Windows Environment
Navigate EBook for Security Strategies in Windows Platforms and Applications

Navigate EBook for Security Strategies in Windows Platforms and Applications

Robert Shimonski; Michael G. Solomon

JONES AND BARTLETT PUBLISHERS, INC
2023
nidottu
This product provides 3 5-day Navigate eBook access to Security Strategies in Windows Platforms and Applications, Fourth Edition.Revised and updated to keep pace with this ever-changing field, Security Strategies in Windows Platforms and Applications, Fourth Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows , and Windows Server 2 22. The Fourth Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.
Security Strategies in Windows Platforms and Applications

Security Strategies in Windows Platforms and Applications

Robert Shimonski; Michael G. Solomon

JONES AND BARTLETT PUBLISHERS, INC
2023
nidottu
Revised and updated to keep pace with this ever-changing field, Security Strategies in Windows Platforms and Applications, Fourth Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows , and Windows Server 2 22. The Fourth Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques. The Fourth Edition further expands on previous discussions to include more coverage of cloud computing topics, IPv , and the Internet of Things (IoT). Malware and encryption sections have been completely updated as well to include the latest threats, mitigation techniques, and tools available. In all, the Fourth Edition includes the latest information needed to implement and manage Windows platforms in today's dynamic environments. This book has also been fully updated to reflect current technology trends such as cloud, AI/ML, DevOps and the use of Microsoft Azure.
Ethical Hacking: Techniques, Tools, and Countermeasures + Cloud Labs

Ethical Hacking: Techniques, Tools, and Countermeasures + Cloud Labs

Robert Shimonski; Michael G. Solomon

JONES AND BARTLETT PUBLISHERS, INC
2023
nidottu
Print Textbook amp Cloud Lab Access: 8 -day subscription.The cybersecurity Cloud Labs for Ethical Hacking: Techniques, Tools, and Countermeasures provide fully immersive mock IT infrastructures with live virtual machines and real software, where students will learn and practice the foundational information security skills they will need to excel in their future careers. Unlike simulations, these hands-on virtual labs reproduce the complex challenges of the real world, without putting an institution's assets at risk. Available as a standalone lab solution or bundled with Jones amp Bartlett Learning textbooks, these cybersecurity Cloud Labs are an essential tool for mastering key course concepts through hands-on training.Labs: Lab : Performing Passive Reconnaissance Lab 2: Performing Active Reconnaissance Lab 3: Exploiting Vulnerable Hosts Lab 4: Performing Malware-Based Attacks Lab 5: Performing Web Application and Database Attacks Lab : Performing Packet Capture and Session HijackingLab 7: Exploiting Wireless VulnerabilitiesLab 8: Performing Social Engineering Attacks Lab 9: Investigating and Responding to Security Incidents Lab : Applying Defense-in-Depth Strategies to Secure Network Assets
Penetration Tester werden für Dummies

Penetration Tester werden für Dummies

Robert Shimonski

Wiley-VCH Verlag GmbH
2022
nidottu
Pentests sind für Unternehmen unverzichtbar geworden, denn nur wer die Schwachstellen kennt, kann auch dagegen vorgehen. Robert Shimonski erklärt Ihnen in diesem Buch alles, was Sie brauchen, um selbst Pentests durchzuführen. Von den nötigen Vorbereitungen über Risikoanalyse und rechtliche Belange bis hin zur eigentlichen Durchführung und späteren Auswertung ist alles dabei. Versetzen Sie sich in Hacker hinein und lernen Sie, wo Unternehmen angreifbar sind. Werden Sie selbst zum Penetration Tester.
AI in Healthcare

AI in Healthcare

Robert Shimonski

John Wiley Sons Inc
2021
nidottu
The best source for cutting-edge insights into AI in healthcare operations AI in Healthcare: How Artificial Intelligence Is Changing IT Operations and Infrastructure Services collects, organizes and provides the latest, most up-to-date research on the emerging technology of artificial intelligence as it is applied to healthcare operations. Written by a world-leading technology executive specializing in healthcare IT, this book provides concrete examples and practical advice on how to deploy artificial intelligence solutions in your healthcare environment. AI in Healthcare reveals to readers how they can take advantage of connecting real-time event correlation and response automation to minimize IT disruptions in critical healthcare IT functions. This book provides in-depth coverage of all the most important and central topics in the healthcare applications of artificial intelligence, including: Healthcare ITAI Clinical OperationsAI Operational InfrastructureProject PlanningMetrics, Reporting, and Service PerformanceAIOps in AutomationAIOps Cloud OperationsFuture of AI Written in an accessible and straightforward style, this book will be invaluable to IT managers, administrators, and engineers in healthcare settings, as well as anyone with an interest or stake in healthcare technology.
Penetration Testing For Dummies

Penetration Testing For Dummies

Robert Shimonski

John Wiley Sons Inc
2020
nidottu
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completionThreat modeling and understanding riskWhen to apply vulnerability management vs penetration testingWays to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
Cyber Reconnaissance, Surveillance and Defense

Cyber Reconnaissance, Surveillance and Defense

Robert Shimonski

Syngress Media,U.S.
2014
nidottu
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.
The Wireshark Field Guide

The Wireshark Field Guide

Robert Shimonski

Syngress Media,U.S.
2013
nidottu
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic. Readers will learn the fundamentals of packet capture and inspection, the use of color codes and filters, deep analysis, including probes and taps, and much more. The Wireshark Field Guide is an indispensable companion for network technicians, operators, and engineers.
Client-Side Attacks and Defense

Client-Side Attacks and Defense

Sean-Philip Oriyano; Robert Shimonski

Syngress Media,U.S.
2012
nidottu
Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file format vulnerabilities. It also covers defenses, such as antivirus and anti-spyware, intrusion detection systems, and end-user education. The book explains how to secure Web browsers, such as Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Apple Safari, and Opera. It discusses advanced Web attacks and advanced defenses against them. Moreover, it explores attacks on messaging, Web applications, and mobiles. The book concludes with a discussion on security measures against client-side attacks, starting from the planning of security. This book will be of great value to penetration testers, security consultants, system and network administrators, and IT auditors.
GIMP Bible

GIMP Bible

Jason van Gumster; Robert Shimonski

John Wiley Sons Inc
2010
nidottu
The ultimate reference and guide to the GNU image manipulation program GIMP is a free, Photoshop-like image manipulation program, and as its use grows, so does the demand for detailed instruction on how to get the very most out of it. GIMP Bible is the most comprehensive and current independent GIMP reference available that goes beyond official documentation. If you're a digital artist or photographer, the step-by-step explanations in this authoritative guide show you how to power-use GIMP throughout a production pipeline. Topics include understanding the GIMP interface and how to work with it, how to use all of GIMP's tools to create high-quality images, GIMP's default filters and plug-ins, advanced techniques for customization with Python and Scheme scripting, and much more. GIMP (GNU Image Manipulation Program) is a free graphics editor that runs on Linux, Windows, or Macs; it is used to process digital graphics and photographs including creating graphics and logos, resizing and cropping photos, altering colors, combining images, creating basic GIF animated images, and moreWhether you're a digital artist, professional photographer, or beginner, this detailed how-to shows you best practices, valuable techniques, and helpful tips for getting the most out of GIMP for your projectsTopics include the GIMP interface and how to work with it, in-depth description of GIMP's tools and how to use them to create high-quality images, a comprehensive reference for all of GIMP's default filters and common plug-ins, and advanced customization with Python and Scheme scripting Get the most out of this free image editing tool for your production pipeline with the GIMP Bible.
CompTIA Network+ Certification Study Guide: Exam N10-004
CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam. The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such as centralized and decentralized, and distinguishes between a local area network (LAN) and a wide area network (WAN). The discussions include cable connections and termination for the Network+ exam; the meaning of convergence; and the most common network devices being used on small and large networks, including the Internet. The role of switches in improving network functionality and enhancing security is described. The book also contains chapters on wireless networking; Open Systems Interconnection (OSI) model; Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN) technologies; network security; and network management and troubleshooting.