語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
360° vulnerability assessment with Nessus and Wireshark/ Raphael Hungaro Moretti, Emerson E. Matsukawa.
其他題名:
identify, evaluate, treat, and report threats and vulnerabilities across your network /
作者:
Moretti, Raphael Hungaro.
其他作者:
Matsukawa, Emerson E.,
面頁冊數:
1 online resource (240 pages)
標題:
COMPUTERS / Operating Systems / Linux. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000408.html
ISBN:
9789355513380
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
Moretti, Raphael Hungaro.
360° vulnerability assessment with Nessus and Wireshark
identify, evaluate, treat, and report threats and vulnerabilities across your network /[electronic resource] :Raphael Hungaro Moretti, Emerson E. Matsukawa. - 1 online resource (240 pages)
Includes bibliographical references and index.
360? vulnerability assessment with Nessus and Wireshark: identify, evaluate, treat, and report threats and vulnerabilities across your network -- About the Author and Co-Author -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Chapter 1 Fundamentals of 360° Vulnerability Assessment -- Chapter 2 IT Security Frameworks and Vulnerability Assessment -- Chapter 3 Recognizing Services and Network Infrastructure -- Chapter 4 Segregating Services and Applications -- Chapter 5 Good Practices About Network Information -- Chapter 6 The AAA Importance in Security -- Chapter 7 Hardening Web Application Services -- Chapter 8 Performing Hardening in Operational Systems -- Chapter 9 Wireless and IoT Security Treatment -- Chapter 10 Security Policy in IT Environment -- Index.
Access restricted to authorized users and institutions.
Starting with the fundamentals of the databricks lakehouse platform, the book teaches readers on administering various data operations, including Machine Learning, DevOps, Data Warehousing, and BI on the single platform. The subsequent chapters discuss working around data pipelines utilizing the databricks lakehouse platform with data processing and audit quality framework. The book teaches to leverage the Databricks Lakehouse platform to develop delta live tables, streamline ETL/ELT operations, and administer data sharing and orchestration. The book explores how to schedule and manage jobs through the Databricks notebook UI and the Jobs API. The book discusses how to implement DevOps methods on the Databricks Lakehouse platform for data and AI workloads. The book helps readers prepare and process data and standardizes the entire ML lifecycle, right from experimentation to production. The book doesn't just stop here, instead, it teaches how to directly query data lake with your favourite BI tools like Power BI, Tableau, or Qlik. Some of the best industry practices on building data engineering solutions are also demonstrated towards the end of the book.
Mode of access: World Wide Web.
ISBN: 9789355513380Subjects--Topical Terms:
1483840
COMPUTERS / Operating Systems / Linux.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105
Dewey Class. No.: 005.8
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
LDR
:03052nam a2200289 i 4500
001
1157305
006
m eo d
007
cr cn |||m|||a
008
250717s2023 ob 000 0 eng d
020
$a
9789355513380
020
$a
9789355513397
035
$a
BPB0000408
041
0
$a
eng
050
0 0
$a
TK5105
082
0 0
$a
005.8
100
1
$a
Moretti, Raphael Hungaro.
$3
1483894
245
1 0
$a
360° vulnerability assessment with Nessus and Wireshark
$h
[electronic resource] :
$b
identify, evaluate, treat, and report threats and vulnerabilities across your network /
$c
Raphael Hungaro Moretti, Emerson E. Matsukawa.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2023.
264
4
$c
©2023
300
$a
1 online resource (240 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
360? vulnerability assessment with Nessus and Wireshark: identify, evaluate, treat, and report threats and vulnerabilities across your network -- About the Author and Co-Author -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Chapter 1 Fundamentals of 360° Vulnerability Assessment -- Chapter 2 IT Security Frameworks and Vulnerability Assessment -- Chapter 3 Recognizing Services and Network Infrastructure -- Chapter 4 Segregating Services and Applications -- Chapter 5 Good Practices About Network Information -- Chapter 6 The AAA Importance in Security -- Chapter 7 Hardening Web Application Services -- Chapter 8 Performing Hardening in Operational Systems -- Chapter 9 Wireless and IoT Security Treatment -- Chapter 10 Security Policy in IT Environment -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Starting with the fundamentals of the databricks lakehouse platform, the book teaches readers on administering various data operations, including Machine Learning, DevOps, Data Warehousing, and BI on the single platform. The subsequent chapters discuss working around data pipelines utilizing the databricks lakehouse platform with data processing and audit quality framework. The book teaches to leverage the Databricks Lakehouse platform to develop delta live tables, streamline ETL/ELT operations, and administer data sharing and orchestration. The book explores how to schedule and manage jobs through the Databricks notebook UI and the Jobs API. The book discusses how to implement DevOps methods on the Databricks Lakehouse platform for data and AI workloads. The book helps readers prepare and process data and standardizes the entire ML lifecycle, right from experimentation to production. The book doesn't just stop here, instead, it teaches how to directly query data lake with your favourite BI tools like Power BI, Tableau, or Qlik. Some of the best industry practices on building data engineering solutions are also demonstrated towards the end of the book.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Operating Systems / Linux.
$2
bisacsh
$3
1483840
650
7
$a
COMPUTERS / Operating Systems / Windows Server.
$2
bisacsh
$3
1483896
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Information Technology.
$2
bisacsh
$3
1057148
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Matsukawa, Emerson E.,
$e
author
$3
1483895
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000408.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入