Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
360° vulnerability assessment with Nessus and Wireshark/ Raphael Hungaro Moretti, Emerson E. Matsukawa.
Reminder of title:
identify, evaluate, treat, and report threats and vulnerabilities across your network /
Author:
Moretti, Raphael Hungaro.
other author:
Matsukawa, Emerson E.,
Description:
1 online resource (240 pages)
Subject:
COMPUTERS / Information Technology. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000408.html
ISBN:
9789355513380
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
Moretti, Raphael Hungaro.
360° vulnerability assessment with Nessus and Wireshark
identify, evaluate, treat, and report threats and vulnerabilities across your network /[electronic resource] :Raphael Hungaro Moretti, Emerson E. Matsukawa. - 1 online resource (240 pages)
Includes bibliographical references and index.
360? vulnerability assessment with Nessus and Wireshark: identify, evaluate, treat, and report threats and vulnerabilities across your network -- About the Author and Co-Author -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Chapter 1 Fundamentals of 360° Vulnerability Assessment -- Chapter 2 IT Security Frameworks and Vulnerability Assessment -- Chapter 3 Recognizing Services and Network Infrastructure -- Chapter 4 Segregating Services and Applications -- Chapter 5 Good Practices About Network Information -- Chapter 6 The AAA Importance in Security -- Chapter 7 Hardening Web Application Services -- Chapter 8 Performing Hardening in Operational Systems -- Chapter 9 Wireless and IoT Security Treatment -- Chapter 10 Security Policy in IT Environment -- Index.
Access restricted to authorized users and institutions.
Starting with the fundamentals of the databricks lakehouse platform, the book teaches readers on administering various data operations, including Machine Learning, DevOps, Data Warehousing, and BI on the single platform. The subsequent chapters discuss working around data pipelines utilizing the databricks lakehouse platform with data processing and audit quality framework. The book teaches to leverage the Databricks Lakehouse platform to develop delta live tables, streamline ETL/ELT operations, and administer data sharing and orchestration. The book explores how to schedule and manage jobs through the Databricks notebook UI and the Jobs API. The book discusses how to implement DevOps methods on the Databricks Lakehouse platform for data and AI workloads. The book helps readers prepare and process data and standardizes the entire ML lifecycle, right from experimentation to production. The book doesn't just stop here, instead, it teaches how to directly query data lake with your favourite BI tools like Power BI, Tableau, or Qlik. Some of the best industry practices on building data engineering solutions are also demonstrated towards the end of the book.
Mode of access: World Wide Web.
ISBN: 9789355513380Subjects--Topical Terms:
1057148
COMPUTERS / Information Technology.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105
Dewey Class. No.: 005.8
360° vulnerability assessment with Nessus and Wireshark = identify, evaluate, treat, and report threats and vulnerabilities across your network /
LDR
:03052nam a2200289 i 4500
001
1157305
006
m eo d
007
cr cn |||m|||a
008
250717s2023 ob 000 0 eng d
020
$a
9789355513380
020
$a
9789355513397
035
$a
BPB0000408
041
0
$a
eng
050
0 0
$a
TK5105
082
0 0
$a
005.8
100
1
$a
Moretti, Raphael Hungaro.
$3
1483894
245
1 0
$a
360° vulnerability assessment with Nessus and Wireshark
$h
[electronic resource] :
$b
identify, evaluate, treat, and report threats and vulnerabilities across your network /
$c
Raphael Hungaro Moretti, Emerson E. Matsukawa.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2023.
264
4
$c
©2023
300
$a
1 online resource (240 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
360? vulnerability assessment with Nessus and Wireshark: identify, evaluate, treat, and report threats and vulnerabilities across your network -- About the Author and Co-Author -- Acknowledgements -- Preface -- Errata -- Table of Contents -- Chapter 1 Fundamentals of 360° Vulnerability Assessment -- Chapter 2 IT Security Frameworks and Vulnerability Assessment -- Chapter 3 Recognizing Services and Network Infrastructure -- Chapter 4 Segregating Services and Applications -- Chapter 5 Good Practices About Network Information -- Chapter 6 The AAA Importance in Security -- Chapter 7 Hardening Web Application Services -- Chapter 8 Performing Hardening in Operational Systems -- Chapter 9 Wireless and IoT Security Treatment -- Chapter 10 Security Policy in IT Environment -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
Starting with the fundamentals of the databricks lakehouse platform, the book teaches readers on administering various data operations, including Machine Learning, DevOps, Data Warehousing, and BI on the single platform. The subsequent chapters discuss working around data pipelines utilizing the databricks lakehouse platform with data processing and audit quality framework. The book teaches to leverage the Databricks Lakehouse platform to develop delta live tables, streamline ETL/ELT operations, and administer data sharing and orchestration. The book explores how to schedule and manage jobs through the Databricks notebook UI and the Jobs API. The book discusses how to implement DevOps methods on the Databricks Lakehouse platform for data and AI workloads. The book helps readers prepare and process data and standardizes the entire ML lifecycle, right from experimentation to production. The book doesn't just stop here, instead, it teaches how to directly query data lake with your favourite BI tools like Power BI, Tableau, or Qlik. Some of the best industry practices on building data engineering solutions are also demonstrated towards the end of the book.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Information Technology.
$2
bisacsh
$3
1057148
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Operating Systems / Windows Server.
$2
bisacsh
$3
1483896
650
7
$a
COMPUTERS / Operating Systems / Linux.
$2
bisacsh
$3
1483840
655
4
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Matsukawa, Emerson E.,
$e
author
$3
1483895
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000408.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login