1
by Chapple, Mike, Seidl, David
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ...Kerberos Exploits 326 -- Exploiting Authorization Vulnerabilities 327 -- Insecure Direct Object...

2
by Stewart, James Michael
Published 2009
Wiley Pub.
Table of Contents: ...2.7 Explain the vulnerabilities and implement mitigations associated with wireless...

3
by Meyers, Mike
Published 2023
McGraw-Hill Education
Table of Contents: ...Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23...

4
by Gordon, Adam
Published 2023
Packt Publishing

5
by Dunkerley, Dawn, Meyers, Mike
Published 2021
McGraw-Hill Education
Table of Contents: ... 2.2 Summarize virtualization and cloud computing concepts -- Objective 2.3 Summarize secure...

6 Table of Contents: ...Vulnerability Testing -- Auditing -- Vulnerabilities -- Chapter 16 Review -- Chapter 17 Web...

7
Published 2022
Expanding Security
... and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities...

8
by Birch, Mark, Neil, Ian
Published 2023
Packt Publishing Ltd.
Table of Contents: ... -- Introduction -- Practice Exam Questions -- 2.1 Summarize various security measures and their purposes -- 2.2...

9
by Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents: ... the Ripper 280 -- Rainbow Tables 282 -- Kerberoasting 284 -- Client-Side Vulnerabilities 289 -- Living Off...

10
by Chapple, Mike, Stewart, James Michael, Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents: ... -- Organizational Roles and Responsibilities 21 -- Security Control Frameworks 22 -- Due Diligence and Due Care 23...

11
by Dion, Jason
Published 2019
Packt Publishing
..., and vulnerabilities; Technologies and tools; Architecture and design; Identity and access management; Risk management...

12
Published 2022
Packt Publishing
.... In the fourth domain, we have network security at 19%. You will learn about threats, vulnerabilities, exploits...

13
Published 2023
Pragmatic AI Solutions