" "



:





...

.. 1 2 3 4 5 6 7 8 9 10 ... 181

: Extending OpenStack: Leverage extended OpenStack projects to implement containerization, deployment, and architecting robust cloud solutions
: Omar Khedher
: Packt Publishing
ISBN: 1786465531
: 2018
: 300
:
: epub, pdf (conv)
: 12.4 MB

Discover new opportunities to empower your private cloud by making the most of the OpenStack universe.
OpenStack is a very popular cloud computing platform that has enabled several organizations during the last few years to successfully implement their Infrastructure as a Service (IaaS) platforms. This book will guide you through new features of the latest OpenStack releases and how to bring them into production straightaway in an agile way.
: Ingvar16 , 13:54 | : 0 |

: Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition
: Joel Scambray, Vincent Liu, Caleb Sima
: McGraw Hill Professional
: 2011
: PDF
: 481
: 11,83
: English

The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures.
: ak5812 , 13:54 | : 0 |

: Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
: Rich Cannings, Himanshu Dwivedi, Zane Lackey
: McGraw Hill Professional
: 2008
: PDF
: 290
: 11,17
: English

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
: ak5812 , 13:52 | : 0 |

: Hacking Exposed Wireless
: Johnny Cache, Joshua Wright, Vincent Liu
: McGraw Hill
: 2010
: PDF
: 513
: 11,24
: English

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems.
: ak5812 , 13:11 | : 0 |

: Hacking Exposed 6: Network Security Secrets & Solutions
: Stuart McClure, Joel Scambray, George Kurtz
: McGraw-Hill
: 2009
: PDF
: 720
: 15,8
: English

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.
: ak5812 , 12:56 | : 0 |
: Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
: Chiheb Chebbi
: Packt Publishing
ISBN: 1788624483
: 2018
: 396
:
: epub
: 12.7 MB

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure.
It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN.
: Ingvar16 , 12:26 | : 0 |
: Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
: George Gilder
: Gateway Editions
: 2018
ISBN: 9781621575764; 1621575764
: epub
: 256
: 5,5 mb
: English

The Age of Google, built on big data and machine intelligence, has been an awesome era. But its coming to an end. In Life after Google, George Gilderthe peerless visionary of technology and cultureexplains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns
: daromir , 10:36 | : 0 |

: .
: .. , .. , .. , ..
: -
: 2013
: 206
ISBN: 978-5-16-004889-5
: PDF
: 27
:
:

, . .
: MIHAIL62 , 09:30 | : 0 |
: Data Analysis for Network Cyber-Security
: Robert Moreno
: Amazon Digital Services LLC
ASIN: B07FLT9N83
: 2018
: 540
:
: epub, pdf (conv)
: 10.1 MB

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.
: Ingvar16 16-07-2018, 21:15 | : 0 |
: QlikView Server and Publisher
: Stephen Redmond
: Packt Publishing
: 2014
: PDF, EPUB
: 9
: / English

QlikView is the most flexible enterprise Business Intelligence platform for transforming information into knowledge. Users can effectively consolidate relevant data from multiple sources into a single application, create reports, and visualize content for unprecedented business insight using QlikView. QlikView Server allows the nesting of multiple servers for data load balancing and enables users to access data using their PC and mobile devices. QlikView Publisher ensures that the right information reaches the right user at the right time, and gives further centralized administration and management.
: black 16-07-2018, 16:16 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 181

 MirKnig.Su  2018