Table of contents: Part I : Data Center Networking Chapter 1 : Data Center Network Architecture Chapter 2 : Cisco Nexus Product Family Chapter 3 : Virtualizing Cisco Network Devices Chapter 4 : Data Center Interconnect Chapter 5 : Management and Monitoring of Cisco Nexus Devices Part II : Data Center Storage-Area Networking Chapter 6 : Data Center Storage Architecture Chapter 7…
Table of contents: 1. How virtualization happens 2. Server virtualization 3. Desktop virtualization 4. Portable virtualization, emulators, and appliances 5. Investigation dead virtual environments 6. Investigating live virtual environments 7. Finding and imaging virtual environments 8. Virtual environments and compliance 9. Virtualization challenges 10. Cloud computing and the forensi…
Table of contents: 1. Distributed system models and enabling technologies 2. Computer clusters for scalable parallel computing 3. Virtual machines and virtualization of clusters and data centers 4. Cloud platform architecture over virtualized data centers 5. Service-oriented architectures for distributed computing 6. Cloud programming and software environments 7. Grid computing systems a…
Table of contents: Part I: Foundation Chapter 1: Practical Investigative Strategies Chapter 2: Technical Fundamentals Chapter 3: Evidence Acquisition Part II: Traffic Analysis Chapter 4: Packet Analysis Chapter 5: Statistical Flow Analysis Chapter 6: Wireless: Network Forensics Unplugged Chapter 7: Network Intrusion Detection and Analysis Part III: Network Devices and Servers…
1.Introduction 1.1.Classical Ciphers 1.2.Secret Key Encryption 1.3.Public-Key Encryption 2.Homomorphic Encryption 2.1.Homomorphic Encryption Definition 2.2.Goldwasser-Micali Encryption Scheme 2.3.ElGamal Encryption Scheme 2.4.Paillier Encryption Scheme 2.5.Boneh-Goh-Nissim Encryption Scheme 3.Fully Homomorphic Encryption 3.1.Fully Homomorphic Encryption Definition 3.2.Overview o…
Table of contents: Chapter 1 WLAN Security Overview 1 Chapter 2 Legacy 802.11 Security 29 Chapter 3 Encryption Ciphers and Methods 61 Chapter 4 802.1X/EAP Authentication 87 Chapter 5 802.11 Layer 2 Dynamic Encryption Key Generation 151 Chapter 6 PSK Authentication 193 Chapter 7 802.11 Fast Secure Roaming 215 Chapter 8 WLAN Security Infrastructure 257 Chapter 9 RADIUS and LDAP 291 Chap…
Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …
Content: 1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.
Created with today’s increasingly complex business and technology landscape in mind, COBIT 5 for Assurance can be used for many different purposes including: - Obtaining a view (based on COBIT 5 concepts such as the enablers) on current good practices on assurance - Learning how to use different COBIT 5 components and related concepts for planning, scoping, executing and reporting on vari…
Contents: 1. The stages of incident response 2. The security incident response team members 3. Incident evidence 4. Incident response tools 5. Incident response policies and procedures 6. Legal requirements and considerations 7. Governmental laws, policies and procedures 8. Forensics process 9. Forensics team member requirements 10. Forensics team policies and procedures 11. Manageme…