|
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in General Автор: Raymond Deep Издательство: Amazon.com Services LLC Год: 2019 Язык: английский Формат: pdf, azw Размер: 11.1 MB
If you want to learn about Kali Linux but aren’t sure where to start then keep reading… Does the world of cybersecurity seem exciting, but a little overwhelming to grasp? Do you want to learn about ethical hacking? IF YES, then this is the perfect book for you. Our dependence on technology is increasing by the day. Gone are the days when a crime was restricted to the physical realm alone! These days, crime has seeped into the virtual world too! Cybercrimes have become rampant, and with it, the need for cybersecurity is ever increasing. A single attack on an organization’s network can cause irreparable harm to the company’s assets as well as reputation. Learning about cybersecurity, along with ethical hacking using Kali Linux gives you all the practical information you require for developing your skills as a professional in the industry of information security. |
Разместил: Ingvar16 5-05-2020, 19:53 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Fog Computing: Theory and Practice Автор: Assad Abbas, Samee U. Khan Издательство: Wiley Год: 2020 Страниц: 582 Язык: английский Формат: pdf (true) Размер: 12.2 MB
Summarizes the current state and upcoming trends within the area of fog computing. Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industrial process control and improvement, smart cities, and virtual learning environments. In addition, the Machine-to-Machine (M2M) communication methods for fog computing environments are covered in depth. |
Разместил: Ingvar16 4-05-2020, 07:09 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Cybersecurity Fundamentals: A Real-World Perspective Автор: Kutub Thakur, Al-Sakib Khan Pathan Издательство: CRC Press Год: 2020 Формат: True PDF Страниц: 304 Размер: 24.5 Mb Язык: English
Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. |
Разместил: bomboane 3-05-2020, 20:33 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux Автор: Hugo Hoffman Издательство: Amazon.com Services LLC Год: 2020 Формат: PDF, AZW3 Страниц: 728 Размер: 16,9 Mb Язык: English
This Book Bundle Includes 7 Books: Book 1 - 25 Most Common Security Threats & How To Avoid Them Book 2 - 21 Steps For Implementing The Nist Cybersecurity Framework Book 3 - Cryptography Fundamentals & Network Security Book 4 - How to Get Into Cybersecurity Without Technical Background Book 5 - Wireless Technology Fundamentals Book 6 - Learn Fast How To Hack Any Wireless Networks Book 7 - Learn Fast How To Hack Like A Pro |
Разместил: vitvikvas 3-05-2020, 17:08 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Azure:Microsoft Azure: Build, manage, and scale cloud applications using the Azure Infrastructure Автор: Mikey Lindsey Издательство: Amazon.com Services LLC Год: 2020 Формат: PDF Страниц: 269 Размер: 29 Mb Язык: English
Microsoft Azure is a cloud computing platform that provides a wide variety of services that we can use without purchasing and arranging our hardware. It enables the fast development of solutions and provides the resources to complete tasks that may not be achievable in an on-premises environment. Azure Services like compute, storage, network, and application services allow us to put our effort into building great solutions without worrying about the assembly of physical infrastructure. |
Разместил: vitvikvas 3-05-2020, 11:29 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Атака на Internet Автор: Илья Медведовский, Павел Семьянов, Дмитрий Леонов Издательство: ДМК Год: 1999 ISBN: 5-89818-036-2 Формат: fb2, mobi, epub Страниц: 341 Размер: 12,6 Mb Язык: Русский
Эта книга является одним из первых специализированных изданий, написанных отечественными авторами, которое посвящено обстоятельному анализу безопасности сети Internet. В книге предлагаются и подробно описываются механизмы реализации основных видов удаленных атак как на протоколы TCP/IP и инфраструктуру Сети, так и на многие популярные сетевые операционные системы и приложения. Особое внимание авторы уделили причинам возникновения и успеха удаленных атак, а также их классификации. |
Разместил: oksanavalera 2-05-2020, 15:45 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: Darknet Master: Tor and Deep Web Secrets Автор: Procolo Scotto Издательство: Amazon.com Services LLC Год: 2020 Формат: PDF, AZW3 Страниц: 127 Размер: 10 Mb Язык: English
The vast Internet includes 3 layers. The initial layer (surface web) is public, comprising websites we use regularly like Facebook, Twitter, Amazon and LinkedIn. This coating makes up just 4% of the full Internet.
What's another 96%? The deep web along with the darknet. The deep net, the next coating, is a system where information is stored in databases that are inaccessible. The darknet is that the third largest, deeper layer of the Web where you can find practically everything. People normally can't access it if they don't know how. Do you want to know and access the deep web? Do you want to know how to navigate in complete safety, anonymous and 100% invisible? Do you want to know what Tor is and how use it? VPNs? Differences between Tor, I2P, Freenet and much more? This is the book for you. Read it!
|
Разместил: vitvikvas 2-05-2020, 10:22 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: CCIE/CCNP Security SNCF 300-710: Todd Lammle Authorized Volume 1 Автор: Todd Lammle Издательство: Amazon Год: 2020 Формат: pdf(conv.) Страниц: 635 Размер: 20.3 Mb Язык: English
Best Selling Cisco Author Todd Lammle has just completed his newest study guide: CCNP Security Securing Networks with Cisco Firepower (SNCF) 300-710—the most popular CCNP Security elective! This book, written by the preeminent Cisco Firepower expert, thoroughly covers the Cisco CCNP SNCF exam objectives in a step-by-step, user friendly manner that will help get you through the grueling Cisco exam the first time! Covers ALL the CCNP Security Cisco Firepower SNCF 300-710 exam objectives! Real life examples abound in this book! |
Разместил: bomboane 1-05-2020, 19:00 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
Название: PCI DSS: An Integrated Data Security Standard Guide Автор: Jim Seaman Издательство: Apress Год: 2020 Формат: true pdf/epub Страниц: 558 Размер: 48.5 Mb Язык: English
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets. |
Разместил: bomboane 1-05-2020, 12:57 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
![](/templates/mirknig91169/images/1.gif) |
|
![](/templates/mirknig91169/images/3.gif) |
|
|
![](/templates/mirknig91169/images/block/8.gif) |
| ![](/templates/mirknig91169/images/block/9.gif) |
|
![](https://mirknig.su/uploads/posts/2020-05/thumbs/1588309810_f3a3c8.jpg) Название: Яндекс.Книга Автор: Дмитрий Соколов-Митрич Издательство: Манн, Иванов и Фербер Год: 2014 Формат: PDF/RTF Страниц: 300 Размер: 10.1 Мб Язык: русский
Это захватывающая и практически полная история крупнейшей IT-компании России, основанная на десятках авторских интервью с теми, кто строил главный поисковик Рунета начиная с 90-х и заканчивая сегодняшним днем. |
Разместил: R2186RX 1-05-2020, 08:12 | Комментарии: 0 | Подробнее
| | | |
![](/templates/mirknig91169/images/8.gif) |
| ![](/templates/mirknig91169/images/9.gif) |
br>
|