000 | 01923nkm a2200409Ia 4500 | ||
---|---|---|---|
001 | on1013545172 | ||
003 | OCoLC | ||
005 | 20180530132845.0 | ||
006 | m o c | ||
007 | cr cna|||||||| | ||
007 | vz czazuu | ||
008 | 171130s2017 xx 184 o vleng d | ||
035 | _a(OCoLC)1013545172 | ||
037 |
_aCL0500000916 _bSafari Books Online |
||
040 |
_aDLC _beng _cDLC _dSafari Books Online, LLC _dAU |
||
049 | _aAlfaisal Main Library | ||
050 | 4 | _aHV8079.C65 | |
100 | 1 |
_aRussell, Chad, _eon-screen presenter. |
|
245 | 1 | 0 |
_aIncident response for cyber professionals / _cChad Russell. |
264 | 1 |
_a[Place of publication not identified] : _bStone River eLearning, _c2017. |
|
300 |
_a1 online resource (1 streaming video file (3 hr., 3 min., 29 sec.)) : _bdigital, sound, color |
||
336 |
_atwo-dimensional moving image _btdi _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
337 |
_avideo _bv _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
511 | 0 | _aPresenter, Chad Russell. | |
500 | _aTitle from resource description page (Safari, viewed November 29, 2017). | ||
520 | _a"In this course you will learn how to use open source tools for incident response purposes. This course utilizes first hand explanations and screencast demonstrations of how to use these tools in a step-by-step manner so you can start incident response work immediately on your own. This course is for you if you have desire to learn more about defending networks and systems against hackers."--Resource description page. | ||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aComputer crimes _xInvestigation. |
|
650 | 0 | _aComputer security. | |
655 | 7 |
_aElectronic books. _2local |
|
710 | 2 | _aSafari eBooks. | |
856 | 4 | 0 | _uhttp://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=100000006A0726 |
942 |
_2lcc _cEBOOKS |
||
994 |
_aC0 _bUMI |
||
260 | _c2017. | ||
999 |
_c549965 _d549965 |