Listing 1 - 6 of 6 |
Sort by
|
Choose an application
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly im
Identity theft. --- Internet fraud. --- Phishing. --- Brand spoofing (Internet fraud) --- Carding (Internet fraud) --- Spoofing, Brand (Internet fraud) --- Identity theft --- Internet fraud --- Computer crimes --- Fraud --- Identity fraud --- False personation --- Theft --- Information Technology --- General and Others --- Computer security --- Electronic government information --- Information technology --- Risk management --- Government policy --- Security measures --- Management. --- Insurance --- Management --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Electronic government publications --- Government information --- Government publications --- Computer network resources
Choose an application
Follows a fictitious organization through the risk management framework process, allowing the reader to follow the development of proper compliance measures such as FISMA and OMB requirements. Can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information.
Information systems --- Regional documentation --- United States of America
Choose an application
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration
Choose an application
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and
Computer security. --- Computer hackers. --- Computer software --- Computer crimes --- Testing. --- Prevention. --- Information Technology --- General and Others --- Software, Computer --- Computer systems --- Computer hackers --- Computer programmers --- Computer users --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Hackers.
Choose an application
This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed.
Choose an application
Listing 1 - 6 of 6 |
Sort by
|