Cybersecurity Blue Team Toolkit最新文献

筛选
英文 中文
Monitoring with OSSEC 使用OSSEC进行监控
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch5
{"title":"Monitoring with OSSEC","authors":"","doi":"10.1002/9781119552963.ch5","DOIUrl":"https://doi.org/10.1002/9781119552963.ch5","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Wireless Communication 保护无线通信
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch6
{"title":"Protecting Wireless Communication","authors":"","doi":"10.1002/9781119552963.ch6","DOIUrl":"https://doi.org/10.1002/9781119552963.ch6","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Management 脆弱性管理
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch4
Park Foreman
{"title":"Vulnerability Management","authors":"Park Foreman","doi":"10.1002/9781119552963.ch4","DOIUrl":"https://doi.org/10.1002/9781119552963.ch4","url":null,"abstract":"Vulnerability management is the detailed, cyclical process of identifying and remediating weaknesses in an information technology system. It includes skills, processes, standards, and technologies combined to appropriately address the most relevant vulnerabilities in the target environment. While many standards and technologies exist, their selection and application are unique to the organization and threat environment.","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Kali Linux Kali Linux
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch14
{"title":"Kali Linux","authors":"","doi":"10.1002/9781119552963.ch14","DOIUrl":"https://doi.org/10.1002/9781119552963.ch14","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Metasploit Metasploit
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch10
{"title":"Metasploit","authors":"","doi":"10.1002/9781119552963.ch10","DOIUrl":"https://doi.org/10.1002/9781119552963.ch10","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"19 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Wireshark Wireshark
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch7
Wireshark Lab
{"title":"Wireshark","authors":"Wireshark Lab","doi":"10.1002/9781119552963.ch7","DOIUrl":"https://doi.org/10.1002/9781119552963.ch7","url":null,"abstract":"One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. In the Wireshark labs you’ll be doing in this course, you’ll be running various network applications in different scenarios using your own computer. You’ll observe the network protocols in your computer “in action,” interacting and exchanging messages with protocol entities executing elsewhere in the Internet. Thus, you and your computer will be an integral part of these “live” labs. You’ll observe, and you’ll learn, by doing.","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127175552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 179
Fundamental Networking and Security Tools 基础网络和安全工具
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch1
{"title":"Fundamental Networking and Security Tools","authors":"","doi":"10.1002/9781119552963.ch1","DOIUrl":"https://doi.org/10.1002/9781119552963.ch1","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132896641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nmap-The Network Mapper nmap——网络映射器
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch3
{"title":"Nmap-The Network Mapper","authors":"","doi":"10.1002/9781119552963.ch3","DOIUrl":"https://doi.org/10.1002/9781119552963.ch3","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116955776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Managing Logs 管理日志
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch9
{"title":"Managing Logs","authors":"","doi":"10.1002/9781119552963.ch9","DOIUrl":"https://doi.org/10.1002/9781119552963.ch9","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing OSI Layer 8 保护OSI第8层
Cybersecurity Blue Team Toolkit Pub Date : 2019-04-08 DOI: 10.1002/9781119552963.ch13
{"title":"Securing OSI Layer 8","authors":"","doi":"10.1002/9781119552963.ch13","DOIUrl":"https://doi.org/10.1002/9781119552963.ch13","url":null,"abstract":"","PeriodicalId":278277,"journal":{"name":"Cybersecurity Blue Team Toolkit","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115208988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信