|
Showing 1 - 2 of
2 matches in All Departments
Fully updated coverage of the 2018 CISSP exam, including 1250+
in-depth practice questions Take the 2018 version of the
challenging CISSP exam with confidence using this up-to-date,
exam-focused study resource. Designed as a companion to CISSP
All-in-One Exam Guide, Eighth Edition, the book contains more than
1250 realistic practice exam questions and offers 100% coverage of
the 2018 CISSP Common Body of Knowledge. You will get in-depth
explanations of both the correct and incorrect answers for every
question. CISSP Practice Exams, Fifth Edition, fully covers all
eight exam domains. The logical structure of the book allows you to
focus on specific topics and tailor your study to areas of
expertise and weakness. Each chapter presents more than 25 exam
questions-an additional 1000+ review questions are contained on the
book's CD-ROM. *Thoroughly revised to cover the 2018 CISSP Common
Body of Knowledge*Written by leading experts in IT security
certification and training*Electronic content includes 1000+
practice exam questions, including drag & drop and hotspot
formats
""This is a must-have work for anybody in information security,
digital forensics, or involved with incident handling. As we move
away from traditional disk-based analysis into the
interconnectivity of the cloud, Sherri and Jonathan have created a
framework and roadmap that will act as a seminal work in this
developing field.""- Dr. Craig S. Wright (GSE), Asia Pacific
Director at Global Institute for Cyber Security + Research. ""It's
like a symphony meeting an encyclopedia meeting a spy
novel.""-Michael Ford, Corero Network Security On the Internet,
every action leaves a mark-in routers, firewalls, web proxies, and
within network traffic itself. When a hacker breaks into a bank, or
an insider smuggles secrets to a competitor, evidence of the crime
is always left behind. Learn to recognize hackers' tracks and
uncover network-based evidence in "Network Forensics: Tracking
Hackers through Cyberspace."Carve suspicious email attachments from
packet captures. Use flow records to track an intruder as he pivots
through the network. Analyze a real-world wireless
encryption-cracking attack (and then crack the key yourself).
Reconstruct a suspect's web surfing history-and cached web pages,
too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the
Operation Aurora exploit, caught on the wire. Throughout the text,
step-by-step case studies guide you through the analysis of
network-based evidence. You can download the evidence files from
the authors' web site (lmgsecurity.com), and follow along to gain
hands-on experience. Hackers leave footprints all across the
Internet. Can you find their tracks and solve the case? Pick up
"Network Forensics"and find out.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Not available
Ab Wheel
R209
R149
Discovery Miles 1 490
Sound Of Freedom
Jim Caviezel, Mira Sorvino, …
DVD
R325
R218
Discovery Miles 2 180
|