• Dansk
  • English

term.subject="sikkerhed"

Afgræns din søgning

Materialetype
Emne
Forfatter
Årstal
Sprog
Kilde
Kategori
Set sort order for search result
HjemmeHjemme
UdlåntUdlånt
Kan ikke reserveresKan ikke reserveres
Læs på biblioteketLæs på biblioteket
Vis antal:102550
  1. Designing secure software : a guide for developers

    • Bog
    19.657 KOH

    Designing secure software : a guide for developers

    2022
    An introduction to computer security that focuses on basic security concepts, like threats and how developers mitigate them. It covers the process of reviewing design documents with security in mind and explores techniques attackers use to exploit systems and how to protect against them with secure coding and development practices
    Find den her
    Detaljer
    Haves: 
    870970-basis:62010975|980|.
    ISBN nr.: 
    9781718501928
    Omfang: 
    xxxi, 291 sider
    Udgiver: 
    No Starch
    Målgruppe: 
    alment niveau, voksenmaterialer
    Haves:: 
    870970-basis:62010975|980|a
  2. Grey hat hacking : the ethical hacker's handbook

    • Bog
    19.625 GRE

    Grey hat hacking : the ethical hacker's handbook

    2022
    6. edition
    Forlagets beskrivelse: "This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats. Includes proof-of-concept code stored on the GitHub repository. Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides"
    Find den her
    Detaljer
    Haves: 
    830380-katalog:134601728|980|.
    Note: 
    Indhold: Gray Hat Hacking ; Programming Survival Skills ; Linux Exploit Development Tools ; Introduction to Ghidra ; IDA Pro ; Red and Purple Teams ; Command and Control (C2) ; Building a Threat Hunting Lab ; Introduction to Threat Hunting ; Basic Linux Exploits ; Advanced Linux Exploits ; Linux Kernel Exploits ; Basic Windows Exploitation ; Windows Kernel Exploitation ; PowerShell Exploitation ; Getting Shells Without Exploits ; Post-Exploitation in Modern Windows Environments ; Next-Generation Patch Exploitation ; Internet of Things to Be Hacked ; Dissecting Embedded Devices ; Exploiting Embedded Devices ; Software-Defined Radio ; Hypervisors 101 ; Creating a Research Framework ; Inside Hyper-V
    ISBN nr.: 
    9781264268948
    Omfang: 
    xxxiii, 670 sider
    Udgiver: 
    McGraw Hill Education
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:134601728|980|a
  3. Go h*ck yourself : a hands-on introduction to hacking

    • Bog
    19.625 PAY

    Go h*ck yourself : a hands-on introduction to hacking

    2022
    Summary: "This book provides an introduction to the experience of hacking, with hands-on activities demonstrating phishing attacks, malware, password cracking, web hacking, and more. Readers learn how to set up a network of virtual machines to safely and ethically practice attacks, with step-by-step instructions guiding them through each hack"
    Find den her
    Detaljer
    Haves: 
    830380-katalog:132972354|980|.
    Note: 
    Online version: Payne, Bryson ; Go h*ck yourself, Includes index
    ISBN nr.: 
    9781718502000
    Omfang: 
    xx, 160 sider
    Udgiver: 
    No Starch Press
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:132972354|980|a
  4. It-sikkerhed i praksis - en introduktion

    • Bog
    Find den her
    Detaljer
    Haves: 
    870970-basis:134555475|980|.
    Note: 
    Indhold: Trusler og risici (It-kriminalitet og trusler fra cyberspace ; Sårbarheder i informationssystemer ; Risikoanalyse og risikostyring) ; Tekniske foranstaltninger (Beskyttelse af it-systemer ; Udvikling af sikker software ; Praktisk kryptografi ; Hacking og penetration testing med Kali Linux) ; Organisatoriske foranstaltninger og it-sikkerhedsledelse (Organisatoriske foranstaltninger ; Information Security Management Systems (IMS) ; General Data Protection Regulation (GDPR) ; Etik og it-sikkerhed ; Appendix - it-sikkerhed i casevirksomheden Hamilton)
    ISBN nr.: 
    9788759339299
    Omfang: 
    467 sider
    Udgiver: 
    Samfundslitteratur
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    870970-basis:134555475|980|a
  5. Cybertrusler : det digitale samfunds skyggeside

    • Bog
    62.67 CYB

    Cybertrusler : det digitale samfunds skyggeside

    2022
    1. udgave, 1. oplag (2022)
    Introduktion til de mest centrale trusler fra cyberspace samt forsøg på håndtering af disse
    Find den her
    Detaljer
    Haves: 
    870970-basis:62904089|980|.
    Bidrag af: 
    Tobias Liebetrau, Jeppe Teglskov Jacobsen
    Note: 
    Indhold: Introduktion til cybertrusler (Cybertruslerne i kontekst / Jeppe T. Jacobsen, Tobias Liebetrau. Hackere, crackere og phreakere : om oprindelsen af krig og kriminalitet i cyberspace / Rasmus Dahlberg). Truslerne - hvad er nyt? (Cyberkrigen og den sårbare militære operation / Lasse Kronborg. Cyberspace som politisk påvirkningsredskab : kampen om det kognitive domæne / Flemming Splidsboel Hansen. Cyberterrorisme - hvor blev den af? / Jeppe T. Jacobsen. Cyberspionage : fra irritation til strategisk trussel / Mikkel Storm Jensen. Cyberkriminalitet : fra nigerianske prinser til ransomware og deepfakes / Jens Myrup Pedersen, Lene Wacher Lentz. Hacktivisme som politisk faktor : fra WANK til K-pop / Jeppe T. Jacobsen. Overvågning : efterretningstjenesternes slaraffenland og privatlivets død? / Kira Vrist Rønn, Adam Diderichsen). Hvordan kan truslerne håndteres? (Medarbejderadfærd : en trussel mod cybersikkerheden? / Kasper Tobias Ekmann. EU's cybersikkerhedsstyring : spændingsfeltet mellem sikkerhed, digitalisering og marked / Tobias Liebetrau. Cyberresiliens og kritisk infrastruktur : vanskelige udfordringer og trælse løsninger / Mikkel Storm Jensen. Cyberkapacitetsopbygning : samarbejde mellem sikkerhedspolitik og udviklingsbistand / Johann Ole Willers. Folkeret i cyberspace : udfordringer og muligheder / Marc Schack. Tvungne cyberforsikringer : virksomhedernes livline eller radikal idé? / Jan M. Lemnitzer). Fremtidens cybersikkerhed? (Konklusion : fra udfordringer til foregangsland / Tobias Liebetrau, Jeppe T. Jacobsen. Efterskrift : Cyber Armageddon - fiktion eller fremtid? / Andreas Immanuel Graae)
    ISBN nr.: 
    9788757451559
    Omfang: 
    374 sider
    Udgiver: 
    Djøf
    Målgruppe: 
    fagligt niveau, alment niveau, voksenmaterialer
    Haves:: 
    870970-basis:62904089|980|a
  6. How to hack like a legend : breaking windows

    • Bog
    19.625 PAY

    How to hack like a legend : breaking windows

    2022
    Forlagets beskrivelse: “Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real life weaknesses in today’s advanced Windows defense systems. You’ll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft’s best security systems. The adventure starts with setting up your elite hacking infrastructure complete with virtual Windows system. After some thorough passive recon, you’ll craft a sophisticated phishing campaign to steal credentials and gain initial access. Once inside you’ll identify the security systems, scrape passwords, plant persistent backdoors, and delve deep into areas you don’t belong. Throughout your task you’ll get caught, change tack on a tee, dance around defensive monitoring systems, and disable tools from the inside. Spark Flow’s clever insights, witty reasoning, and stealth maneuvers teach you to be patient, persevere, and adapt your skills at the drop of a hat. You’ll learn how to: Identify and evade Microsoft security systems like Advanced Threat Analysis, QRadar, MDE, and AMSI ; Seek out subdomains and open ports with Censys, Python scripts, and other OSINT tools ; Scrape password hashes using Kerberoasting ; Plant camouflaged C# backdoors and payloads ; Grab victims’ credentials with more advanced techniques like reflection and domain replication. Like other titles in the How to Hack series, this book is packed with interesting tricks, ingenious tips, and links to useful resources to give you a fast-paced, hands-on guide to penetrating and bypassing Microsoft security systems.”
    Find den her
    Detaljer
    Haves: 
    830380-katalog:134999152|980|.
    Note: 
    Indhold: Part 1 Starting Blocks: Bending but Never Breaking ; Buried Alive ; Scream, Aim, Fire! ; Perfecting the Hook. Part 2 First Dive in: Prison Break ; Busting in and Getting Busted ; Know Thy Enemy. Part 3 Back to the Arena: Through Logs and Fire ; Russian Roulette ; Finally Free ; Defeating the Machines ; Perfecting the Backdoor. Part 4 Salvation: Hunting for Data ; Jackpot
    ISBN nr.: 
    9781718501508
    Omfang: 
    xx, 190 sider
    Udgiver: 
    No Starch Press
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:134999152|980|a
  7. Hacking APIs : breaking web application programming interfaces

    • Bog
    19.625 BAL

    Hacking APIs : breaking web application programming interfaces

    2022
    Indhold: An Application Programming Interface (API) is a software connection that allows applications to communicate and share services. Hacking APIs will teach you how to test web APIs for security vulnerabilities. You’ll learn how the common API types, REST, SOAP, and GraphQL, work in the wild. Then you’ll set up a streamlined API testing lab and perform common attacks, like those targeting an API’s authentication mechanisms, and the injection vulnerabilities commonly found in web applications. In the book’s guided labs, which target intentionally vulnerable APIs, you’ll practice: Enumerating API users and endpoints using fuzzing techniques ; Using Postman to discover an excessive data exposure vulnerability ; Performing a JSON Web Token attack against an API authentication process ; Combining multiple API attack techniques to perform a NoSQL injection ; Attacking a GraphQL API to uncover a broken object level authorization vulnerability. By the end of the book, you’ll be prepared to uncover those high-payout API bugs that other hackers aren’t finding, and improve the security of applications on the web.
    Find den her
    Detaljer
    Haves: 
    830380-katalog:133865969|980|.
    ISBN nr.: 
    9781718502444
    Omfang: 
    xxvi, 332 sider
    Udgiver: 
    No Starch Press
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:133865969|980|a
  8. Primary Health Care

    • Bog
    ? PRI

    Primary Health Care

    2022
    Forlagets beskrivelse: This book presents examples from various countries about the provision of health services at the primary care level. Chapters examine the role of professionals in primary healthcare services and how they can work to improve the health of individuals and communities. Written by authors from Africa, Asia, America, Europe, and Australia, this book provides up-to-date information on primary health care, including telehealth services in the era of COVID-19.
    Find den her
    Detaljer
    Haves: 
    830380-katalog:133257411|980|.
    Note: 
    Indhold: What is Primary Health Care? (Health Promotion (Florence Tochukwu Sibeudu) ; Primary Care in the USA: The Long Struggle to Build its Foundational Role (John Geyman) ; Patient-Centred Point-of-Care Testing: A Life-Changing Technology for Remote Primary Care (Brooke Spaeth, Susan Matthews & Mark Shephard)) ; Child Health in Primary Care (The Newborn Baby Check (Harishan Tharmarajah) ; COVID-19 Transmission in Children: Implications for Schools (Evelyn Mendoza-Torres, Franklin Torres, Wendy Rosales-Rada, Liliana Encinales, Lil Avendaño, María Fernanda Pérez, Ivana Terán, David Vergara, Estefanie Osorio-Llanes, Paige Fierbaugh, Wendy Villamizar, Aileen Y. Chang & Jairo Castellar-Lopez) ; Erratum: COVID-19 Transmission in Children: Implications for Schools (Evelyn Mendoza-Torres, Franklin Torres, Wendy Rosales-Rada, Liliana Encinales, Lil Avendaño, María Fernanda Pérez, Ivana Terán, David Vergara, Estefanie Osorio-Llanes, Paige Fierbaugh, Wendy Villamizar, Aileen Y. Chang & Jairo Castellar-Lopez) ; Sexually Transmitted Infections in Pediatrics (Diana Coronel-Martínez & Luis Augusto Moya-Barquín) ; Chlamydial Infection (Dimitra Metallinou, Christina Nanou, Antigoni Sarantaki, Eleftheria Lazarou, Anastasia Liagkou & Katerina Lykeridou)) ; Maternal Health in Primary Care (The Effects of Multivitamin Use In Pregnancy on Mother and Fetus Health (Neda Taner & Gülden Zehra Omurtag) ; Anemia during Pregnancy and Its Prevalence (Sehar Zulkifal, Shumaila Sarwar, Madiha Saddique, Khalida Yaqoob, Arshia Muneer, Aisha Fatima, Ayesha Kabir, Muhammad Asad Mangat, Laiba Mateen, Zeeshan Javed & Maleeha Manzoor)) ; Adult and Elderly Health in Primary Care (Managing Polypharmacy and Deprescribing in Elderly (Çiğdem Apaydın Kaya) ; Use of Primary Healthcare Facilities for Care and Support of Chronic Diseases: Hypertension (Maseabata Ramathebane, Maja Lineo & Sello Molungoa) ; Impact of Cardiovascular Diseases on the Outcome of Patients with COVID-198 (Seeta Devi Akyana & Dipali Dumbre) ; Aplication Arterial Oscilography to Study the Adaptive Capacity of Subject with COVID-19 in Primary Care (Dmytro Vakulenko, Liudmyla Vakulenko, Leonid Hryshchuk & Lesya Sas)) ; Mental Health Prevention in Primary Care (The Need to Strengthen Primary Health Care Services to Improve Mental Health Care Services in South Africa (Kebogile Elizabeth Mokwena & Velaphi Anthony Mokwena)) ; Environmental Health and Infection Control in Primary Care (Water, Sanitation, and Hygiene (WASH) and Infection Prevention and Control (IPC) in Primary Healthcare Facilities in Jordan in the Context of COVID-19 (Yousef Khader, Mohamad Alyahya & Rami Saadeh)) ; Occupational Health and Safety in Primary Care (Strategies to Enhance Compliance to Health and Safety Protocols within the South African Mining Environment (Livhuwani Muthelo, Tebogo Maria Mothiba & Rambelani Nancy Malema) ; Early Occupational Therapy Intervention: Patients’ Occupational Needs (Margherita Schiavi, Barbara Volta, Gilda Sandri, Erica Keeling & Maria Teresa Mascia)) ; Telehealth and Telemedicine in Primary Care (Telephone Consultations by Medical Scheme Patients Consulting General Medical Practitioners, South Africa (Michael Mncedisi Willie, Neo Nonyana & Sipho Kabane) ; Utilisation of Digital Health in Early Detection and Treatment of Pre-Eclampsia in Primary Health Care Facilities South Africa: Literature Review (Mxolisi Welcome Ngwenya, Livhuwani Muthelo, Masenyani Oupa Mbombi, Mamare Adelaide Bopape & Tebogo Maria Mothiba) ; Evaluating A Mobile App for Data Collection in Occupational Therapy Practice (Tanja Svarre, Marie Bangsgaard Bang & Tine Bieber Lunn))
    ISBN nr.: 
    9781839698088, 9781839698071, 9781839698064
    Omfang: 
    xiii, 329 p.
    Udgiver: 
    IntechOpen
    Målgruppe: 
    voksenmaterialer
    Haves:: 
    830380-katalog:133257411|980|a
  9. Information risk management : a practitioner's guide

    • Bog
    19.625 SUT

    Information risk management : a practitioner's guide

    2021
    2nd edition
    Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline.
    Find den her
    Detaljer
    Haves: 
    830380-katalog:133661344|980|.
    ISBN nr.: 
    9781780175720
    Omfang: 
    xvii, 219 sider
    Udgiver: 
    BCS The Chartered Institure for IT
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:133661344|980|a
  10. Ethical hacking : a hands-on introduction to breaking in

    • Bog
    Find den her
    Detaljer
    Haves: 
    830380-katalog:132585032|980|.
    Note: 
    Table of contents: Foreword by Juan Gilbert ; Setting Up. PART I: NETWORK FUNDAMENTALS: Capturing Traffic with ARP Spoofing ; Analyzing Captured Traffic ; Crafting TCP Shells and Botnets. PART II: CRYPTOGRAPHY: Cryptography and Ransomware ; TLS & Diffie-Hellman. PART III: SOCIAL ENGINEERING: Phishing and Deepfakes ; Scanning Targets. PART IV: EXPLOITATION: Fuzzing for Zero-Day Vulnerabilities ; Building Trojans ; Building and Installing Linux Rootkits ; Stealing and Cracking Passwords ; Serious Cross-Site Scripting Exploitation. PART V: CONTROLLING THE NETWORK: Pivoting and Privilege Escalation ; Moving Through the Corporate Windows Network ; Next Steps, Includes index
    ISBN nr.: 
    9781718501874
    Omfang: 
    xxv, 347 sider
    Udgiver: 
    No Starch Press, Inc.
    Målgruppe: 
    fagligt niveau, voksenmaterialer
    Haves:: 
    830380-katalog:132585032|980|a