|
|
|
|
|
|
|
| |
|
Название: Хакинг на примерах. Уязвимости, взлом, защита Автор: Ярошенко А.А. Издательство: Наука и техника Год: 2021 Страниц: 320 Язык: русский Формат: pdf Размер: 29.1 MB
Из этой книги вы не узнаете, как взламывать банки — ничего противозаконного описано здесь не будет. Мы не хотим, чтобы у наших читателей или кого-либо ещё возникли какие-то проблемы из-за нашей книги. Будет рассказано: об основных принципах взлома сайтов (а чтобы теория не расходилась с практикой, будет рассмотрен реальный пример взлома); отдельная глава будет посвящена угону почтового ящика (мы покажем, как взламывается почтовый ящик — будут рассмотрены различные способы). |
Разместил: Ingvar16 29-09-2021, 19:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Методы защиты информации. Защита от внешних вторжений Автор: Никифоров С. Н. Издательство: Лань Год: 2020 - 3-е изд. Cтраниц: 100 Формат: pdf (ocr) Размер: 18 мб Язык: русский
Предназначено для всех пользователей, стремящихся обеспечить защиту своей информации. Рассматриваются вопросы использования антивирусных программ Comodo Internet Security, Dr. Web CureIt, AVZ и др. |
Разместил: rivasss 29-09-2021, 08:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Nmap cookbook: Beat the Beast Автор: Nima Shahmoradi, Nasim Kangari Издательство: Amazon.com Services LLC Год: 2021 Страниц: 241 Язык: английский Формат: epub Размер: 10.3 MB
To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation. Nmap is the scanner that other scanners are measured against. it is an indispensable tool that all techies should know well. It is used by all ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. This book is based on real experiences using Nmap in network security tests on a huge variety of networks. In the end, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts. You will start out at the very basics and work your way up to writing your own basic Nmap Scripting Engine (NSE) scripts, and you will become an expert to using the most powerful and flexible network scanner available.
|
Разместил: Ingvar16 28-09-2021, 18:30 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: UNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Автор: George Mansour Издательство: Lasting Press Год: 2020 Страниц: 377 Язык: английский Формат: pdf, epub Размер: 10.2 MB
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind. Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones protected with iron-clad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your valuable digital life. Unhackable provides you with a unique Cyber security strategy that combines user psychology and easy-to-apply techniques that teach you how to become your own strongest line of defense. Informative and insightful, Mansour uses anecdotes, professional experience, and step-by-step procedures to make protecting your personal data as easy as hitting the power button. |
Разместил: Ingvar16 28-09-2021, 12:27 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Principles of Blockchain Systems Автор: Antonio Fernandez Anta, Chryssis Georgiou Издательство: Morgan & Claypool Год: 2021 Страниц: 235 Язык: английский Формат: pdf (true) Размер: 14.94 MB
This book is the first to present the state of the art and provide technical focus on the latest advances in the foundations of blockchain systems. It is a collaborative work between specialists in cryptography, distributed systems, formal languages, and economics, and addresses hot topics in blockchains from a theoretical perspective: cryptographic primitives, consensus, formalization of blockchain properties, game theory applied to blockchains, and economical issues. This book reflects the expertise of the various authors, and is intended to benefit researchers, students, and engineers who seek an understanding of the theoretical foundations of blockchains. |
Разместил: Ingvar16 28-09-2021, 11:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Information Security Management, Second Edition Автор: Michael Workman Издательство: ?Jones & Bartlett Learning Год: 2023 Страниц: 500 Язык: английский Формат: epub Размер: 16.4 MB
This text will provide you with an overview of information and cybersecurity and offer a summary of security topics that are addressed in more detail in the Jones & Bartlett Learning “New Information Systems Security & Assurance” series. Cybersecurity is an aspect of information security. Cybersecurity deals with the electronic elements of protecting assets such as information. Information security encompasses broader threats, including theft of physical documents, perhaps left unattended on an employee’s desk. In this text, we will use the term cybersecurity when we are referring to the electronic aspects and information security when discussing these other elements. We begin with some foundational materials that cover the broad spectrum of information technology management, including what the main departments such as software engineering, operations, and compliance do, and what their roles and responsibilities are. |
Разместил: Ingvar16 27-09-2021, 13:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyberwarfare: Information Operations in a Connected World, 2nd Edition Автор: Mike Chapple, David Seidl Издательство: Jones & Bartlett Learning Год: 2021 Формат: True ePUB Страниц: 425 Размер: 11 Mb Язык: English
Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations – operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered–from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora's box opened by recent events, which have set the stage for future cyber attacks. |
Разместил: vitvikvas 27-09-2021, 11:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Victimology: Decoding Cyber Crime Victimization Автор: Debarati Halder Издательство: Routledge Год: 2022 Формат: True PDF Страниц: 121 Размер: 10 Mb Язык: English
Cyber Victimology provides a global socio-legal-victimological perspective on victimisation online, written in clear, non-technical terms, and presents practical solutions for the problem. Halder qualitatively analyzes the contemporary dimensions of cyber-crime victimisation, aiming to fill the gap in the existing literature on this topic. A literature review, along with case studies, allows the author to analyze the current situation concerning cyber-crime victimisation. A profile of victims of cyber-crime has been developed based on the characteristics of different groups of victims. As well, new policy guidelines on the basis of UN documents on cybercrimes and victim justice are proposed to prevent such victimisation and to explore avenues for restitution of justice for cases of cyber-crime victimisation. This book shows how the effects of cyber victimisation in one sector can affect others. This book also examines why perpetrators choose to attack their victim/s in specific ways, which then have a ripple effect, creating greater harm to other members of society in unexpected ways. This book is suitable for use as a textbook in cyber victimology courses and will also be of great interest to policy makers and activists working in this area. |
Разместил: vitvikvas 26-09-2021, 17:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Computing: Theory and Practice, 2nd Edition Автор: Dan C. Marinescu Издательство: Morgan Kaufmann/Elsevier Год: 2018 Страниц: 588 Язык: английский Формат: epub Размер: 44.4 MB
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing.
|
Разместил: Ingvar16 26-09-2021, 13:33 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: IoT System Design: Project Based Approach Автор: Alice James, Avishkar Seth, Subhas Chandra Mukhopadhyay Издательство: Springer Год: 2022 Формат: True PDF Страниц: 291 Размер: 13,8 Mb Язык: English
This book presents a step by step design approach to develop and implement an IoT system starting from sensor, interfacing to embedded processor, wireless communication, uploading measured data to cloud including data visualization along with machine learnings and artificial intelligence. The book will be extremely useful towards a hands-on approach of designing and fabricating an IoT system especially for upper undergraduate, master and PhD students, researchers, engineers and practitioners. |
Разместил: vitvikvas 26-09-2021, 09:38 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|