Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Манифест криптоанархиста
Автор: Ян Хеглер
Издательство: Страта
Год: 2018
Формат: FB2/RTF
Размер: 10.1 Мб
Язык: русский

Криптоанархизм – философия, суть которой в том, чтобы использовать сильную криптографию для защиты приватности и личной свободы. Криптоанархисты – люди, которые поддерживают философию криптоанархизма. Они считают, что криптография защищает людей от слежки в Интернете и уверены, что законы математики сильнее человеческих законов и что без шифрования сообщений и информации личная жизнь людей пострадает. Их глобальная цель – Интернет доверия.
Это явление можно отнести к сфере социально-политической идеологии, направленной на борьбу за свободу слова, тайну личности и частной переписки. Только в качестве основного инструмента этой борьбы криптоанархисты видят не стачки, митинги и уличные протесты, а математические алгоритмы и глубокое шифрование.
Возможно ли реализовать в киберпространстве социально-технологические модели, которые многие современные эксперты считают утопиями? Книга знакомит с мнениями авторитетных специалистов в различных областях современной науки.
Разместил: R2186RX 4-06-2020, 21:23 | Комментарии: 0 | Подробнее
Cybersecurity Explained: With security tools and techniques (Volume Book 1)Название: Cybersecurity Explained: With security tools and techniques (Volume Book 1)
Автор: J.A. Poppen
Издательство: Amazon.com Services LLC
Год: 2020
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.1 MB

Cybersecurity has become progressively important to the average user of the cyberspace. The increased opportunities allowed by today's technology also bring about new security worries that must be checked. Organizations need to be conscious of the complication in using today's Cyber technology, where an increasing number of average items in use is being connected to the Internet. Safeguarding information has become one of the biggest challenges in the present day where Cyberattacks and crimes are growing immensely day by day.
Разместил: Ingvar16 4-06-2020, 19:26 | Комментарии: 0 | Подробнее
Название: Dive Into the 5th Domain: Threat Intelligence (Cyber Intelligence Report Book 201)
Автор: Jeremy Martin, Nitin Sharma,, Richard Medlin, Justin Casey
Издательство: Information Warfare Center
Год: 2020
Формат: epub/pdf(conv.)
Страниц: 202
Размер: 59 Mb
Язык: English

The content includes: Cyber Attacks Can Kill, Dark Web News and Dark Market Exit Scams, OSINT & Online Investigation Tips, Online and Dark Web Investigations: CSI Linux, CSI Linux Forensic Challenge, Chain of Custody Template, Data destruction & recoverability, Anonymity on the Web (Tor and Privoxy), OSINT Reconnaissance (Recon-ng walkthrough), Autopsy Installation in Linux,Elastic Stack with Zeek (Bro) IDS Integration, Configuring Zeek (Bro) IDS Signatures, and more...The Cyber Intelligence Report (CIR) is an Open Source Intelligence (AKA OSINT) resource centering around an array of subjects ranging from Exploits, Advanced Persistent Threat, National Infrastructure, Dark Web, Digital Forensics & Incident Response (DIFR), and the gambit of digital dangers.This publication focuses on OSINT investigations, CSI Linux, reconnaissance, Dark Web,Tor, and Threat Intelligence,
Разместил: bomboane 4-06-2020, 14:53 | Комментарии: 0 | Подробнее
Название: Dark Web Demystified: Into the Power of Anonymity
Автор: Adarsh Nair, Greeshma M R
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, EPUB
Страниц: 77
Размер: 24,4 Mb
Язык: English

Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just encrypting/decrypting data, where, the identities are also hidden. Dark Web is that part of the Internet, which achieves anonymity and security to the highest level. Requiring specialized access methodologies unlike the normal web, Dark Web is most popularly known as "Evil twin of the Internet,” as more than 57% of this space is filled with illegal content. Onion Routing is the protocol used for anonymous and secret communications over the Internet. The Onion Router (Tor) is an implementation of the Onion Routing protocol, which is free and open source. Tor constantly encrypts messages that traverse through various nodes of a network, before reaching the destination. Onion services are the building blocks for Dark Web, which can be accessed through Tor.
Разместил: vitvikvas 4-06-2020, 14:45 | Комментарии: 0 | Подробнее
Название: Teach Yourself Visually Quickbooks 2015
Автор: Elaine Marmel
Издательство: Visual
Год: 2014
Формат: EPUB
Размер: 32 Мб
Язык: английский / English

The visual way to master QuickBooks 2015. If you learn better by seeing rather than wading through confusing text, then this visual guide is for you! Teach Yourself VISUALLY QuickBooks 2015 gives you hundreds of succinctly captioned, step-by-step screenshots that reveal how to master QuickBooks 2015 and get your business finances in working order.
Разместил: _аdmin_ 3-06-2020, 20:20 | Комментарии: 0 | Подробнее
Название: Guide to Computer Network Security (Texts in Computer Science) Fifth edition
Автор: Joseph Migga Kizza
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 599
Размер: 11 Mb
Язык: English

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.
Разместил: bomboane 3-06-2020, 17:44 | Комментарии: 0 | Подробнее
Название: Web and Network Data Science: Modeling Techniques in Predictive Analytics
Автор: Thomas W. Miller
Издательство: Pearson
Год: 2014
Формат: EPUB
Размер: 39 Мб
Язык: английский / English

Master modern web and network data modeling: both theory and applications. In Web and Network Data Science, a top faculty member of Northwestern University’s prestigious analytics program presents the first fully-integrated treatment of both the business and academic elements of web and network modeling for predictive analytics.
Разместил: _аdmin_ 2-06-2020, 20:14 | Комментарии: 0 | Подробнее
Statistical Analysis of Network Data with R, Second EditionНазвание: Statistical Analysis of Network Data with R, Second Edition
Автор: Eric D. Kolaczyk, Gabor Csardi
Издательство: Springer
Серия: Use R!
Год: 2020
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks.
Разместил: Ingvar16 2-06-2020, 15:07 | Комментарии: 0 | Подробнее
Название: Security from Zero: A Practical Guide to Security for Busy People (Revision 7)
Автор: Eric Higgins
Издательство: Fullstack.io
Год: 2020-04-17
Формат: true pdf/epub/mobi
Страниц: 131
Размер: 10 Mb
Язык: English

Security from Zero is the busy person's guide to running a security program.
Разместил: bomboane 2-06-2020, 00:34 | Комментарии: 0 | Подробнее
Название: A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
Автор: Richard Medlin
Издательство: Information Warfare Center
Год: 2020
Формат: PDF
Страниц: 202
Размер: 22,6 Mb
Язык: English

Have you ever found yourself questioning whether your network is in good hands? Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you’re new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you don’t know where to start. If you have ever asked yourself any of these questions — or you just really want to learn about ELK Stack and Zeek (Bro) — You’ve come to the right place. A quick Google search will show you that there isn’t a lot of information for configuring Zeek (Bro), ElasticSearch, Logstash, Filebeat, and Kibana— it is rather complicated because the websites will describe how to install, but they don’t really lead you to specifics on what else you need to do, or they are really outdated. That’s where you have to piece together the information yourself, and really research — lucky for you, I did the leg work for you and decided to write this book.
Разместил: vitvikvas 1-06-2020, 03:11 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности