Search Results - "vulnerability"

  1. 81
  2. 82

    Cybersecurity - Attack and Defense Strategies by Diogenes, Yuri, Ozkaya, Erdal

    Published 2019
    Table of Contents: “…Understanding the Cybersecurity Kill ChainReconnaissanceCompromising the SystemChasing a User's IdentityLateral MovementPrivilege EscalationSecurity PolicyNetwork SegmentationActive SensorsThreat IntelligenceInvestigating an IncidentRecovery ProcessVulnerability ManagementLog Analysis…”
    Click Here to View Status and Holdings.
    Book
  3. 83
  4. 84
  5. 85
  6. 86

    Defensive Security Handbook Best Practices for Securing Infrastructure by Brotherston, Lee, Berlin, Amanda

    Published 2017
    Table of Contents: “…Creating a security program -- Asset management and documentation -- Policies -- Standards and procedures -- User education -- Incident response -- Disaster recovery -- Industry compliance standards and frameworks -- Physical security -- Microsoft Windows infrastructure -- Unix application servers -- Endpoints -- Password management and multifactor authentication -- Network infrastructure -- Segmentation -- Vulnerability management -- Development -- Purple teaming -- IDS and IPS -- Logging and monitoring -- The extra mile.…”
    Click Here to View Status and Holdings.
    Book
  7. 87
  8. 88
  9. 89
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94
  15. 95
  16. 96
  17. 97
  18. 98
  19. 99
  20. 100