Narrow your search
Listing 1 - 6 of 6
Sort by
Risk management framework : a lab-based approach to securing information systems
Author:
ISBN: 9781597490306 1423754301 9781423754305 159749030X 0080489532 9780080489537 9781597499958 1597499951 1281035874 9781281035875 9786611035877 1299730426 0124047238 Year: 2013 Publisher: Amsterdam ; Boston : Elsevier/Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly im

Risk management framework
Author:
ISBN: 9780124047235 0124047238 1423754301 9781423754305 9781597490306 159749030X 0080489532 9780080489537 1281035874 9781281035875 9781597499958 1597499951 Year: 2013 Publisher: Amsterdam Syngress, an imprint of Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Follows a fictitious organization through the risk management framework process, allowing the reader to follow the development of proper compliance measures such as FISMA and OMB requirements. Can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers. * Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts * Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic * Stay one step ahead of the enemy with all the latest information.


Book
Hacking with Kali : practical penetration testing techniques
Authors: ---
ISBN: 0124078834 0124077498 9780124078833 1306195705 9781306195706 9780124077492 Year: 2014 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration


Book
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
Authors: ---
ISBN: 1283164450 9786613164452 1597496561 1597496553 9781597496568 9781597496551 Year: 2010 Publisher: Waltham, Mass. : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and


Digital
Hacking with Kali : practical penetration testing techniques
Authors: ---
ISBN: 9780124078833 0124078834 1306195705 9781306195706 Year: 2014 Publisher: Boston Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed.

Keywords


Book
A-Z Advancing Geography
Authors: --- ---
ISBN: 1899085793 1903448107 Year: 2002 Publisher: Sheffield Goegraphical Association

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Geography --- Fieldwork

Listing 1 - 6 of 6
Sort by