|
|
|
|
|
|
|
| |
|
Название: CEH Certified Ethical Hacker Cert Guide Автор: Michael Gregg, Omar Santos Издательство: Pearson Год: 2022 Формат: ePUB Страниц: 752 Размер: 46,6 Mb Язык: English
Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The authors’ concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. |
Разместил: vitvikvas 13-01-2022, 19:02 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Великий Китайский Файрвол Автор: Джеймс Гриффитс Издательство: Бомбора Год: 2022 Формат: ePUB, PDF Страниц: 464 Размер: 10 Mb Язык: Русский
Представьте, что вы оказались в мире без интернета. Некуда загрузить фотографию, не с кем поделиться смешной картинкой, негде быстро получить нужную информацию. Кажется, что сегодня такое практически невозможно, но иногда это результат единственного решения и нескольких нажатий на кнопку. Интернет начинался как развиваемый энтузиастами островок свободы, но с тех пор им научились управлять — как государства, так и крупные корпорации. Фраза "интернет помнит все" обрела второй смысл — контент стал подконтролен, иллюзия анонимности исчезла, а любое неосторожное сообщение может создать массу трудностей автору. Книга рассказывает о том, как Китай первым в мире научился управлять интернетом и как другие страны перенимали его опыт. |
Разместил: vitvikvas 12-01-2022, 22:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Администрирование почтовых серверов sendmail Автор: Блам Р. Издательство: ИНТУИТ Год: 2021 Cтраниц: 700 Формат: pdf Размер: 88 мб Язык: русский
Основной целью создания данного учебного пособия является оказание помощи сетевым администраторам небольших учреждений в организации высокопроизводительной и качественной системы электронной почты, которая бы не уступала коммерческим аналогам. Вся информация, представленная в издании, может использоваться либо в учебных целях, либо в качестве справочника (или и в том, и другом качестве). В книге приводятся примеры установки и настройки сервера электронной почты (почтового сервера) на базе ОС Linux для вымышленной организации. |
Разместил: rivasss 12-01-2022, 09:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Securing Systems: Applied Security Architecture and Threat Models Автор: Brook S. E. Schoenfield Издательство: CRC Press Год: 2015 Страниц: 416 Язык: английский Формат: pdf (true) Размер: 14.5 MB
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis. |
Разместил: Ingvar16 12-01-2022, 05:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacking with Kali Linux Автор: Casey Pena Издательство: Casey Pena Год: 2022 Формат: ePUB Страниц: 95 Размер: 10 Mb Язык: English
Hacking is a phenomenon that is sweeping the globe. With more individuals migrating online and doing nearly every work that they can, it is expected that hacking and other similar assaults will rise with time. Our personal, financial, and commercial information can all be available online, which is a bonanza for hackers all around the globe. We must understand how to secure our personal and financial information and ensure that we are protected from any hacking attempt. Using Kali Linux to do a penetration test may be one of the greatest methods to identify our system's weaknesses and how to guard against a hacker exploiting them. This handbook will discuss how to do a penetration test using the Kali Linux system and how we can utilize this to keep our networks secure. In addition to working with the penetration test, we will look at how to safeguard our identity online, download the Kali Linux system in several methods, and work with various hacking tactics so that we may constantly be on the alert for harmful attackers. |
Разместил: vitvikvas 11-01-2022, 21:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacker's Manual 2021, 11th Edition Автор: Charles Ginger (Editor) Издательство: Future Publishing Limited Год: 2021 Формат: True PDF Страниц: 164 Размер: 30,1 Mb Язык: English
Welcome to the 2021 edition of the Hacker’s Manual! You hold in your hands 164 pages of Linux hacking tutorials, guides and features from the experts at Linux Format magazine – the home of open source software. In this edition we’ve gone in hard for security. You’ll find guides to securing servers, getting a grounding in hacking, using security tools such as Kali and Fedora Security Lab, alongside solid features explaining how to protect your privacy online using established tools like Tails. But we shouldn’t live in fear! Hacking is monumental fun. Never mind setting up and playing with Linux, we take a look at hacking tablets, media servers, virtual machines, cloud servers, multi-booting with Grub and much more. If you’re a little timid when it comes to the Terminal we even have a meaty reference section at the back. |
Разместил: vitvikvas 11-01-2022, 09:31 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Electro-optic Modulation for Photonic Networks: Precise and high-speed control of lightwaves Автор: Tetsuya Kawanishi Издательство: Springer Год: 2022 Формат: PDF Страниц: 241 Размер: 10 Mb Язык: English
This textbook provides comprehensive and detailed information on electro-optic modulation, which plays important roles in lightwave networks including optical fiber links, visible ray communications, fiber-wireless, etc. The first part of this book describes roles and basic functions of optical modulators as well as various modulation schemes. The second part is on mathematical expressions dedicated to optical modulation, where sideband generation are clearly described. In conclusion, this book provides useful information for device and system technologies, and helps in understanding fundamental issues on telecommunication systems as well as electro-optic devices. Contents in this book provide valuable information for engineering students in telecommunications. It also gives useful examples of applied mathematics using Bessel functions. It is ideal for upper undergraduate and graduate level classes. |
Разместил: vitvikvas 10-01-2022, 16:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Recurrent Neural Networks: From Simple to Gated Architectures Автор: Fathi M. Salem Издательство: Springer Год: 2022 Формат: PDF Страниц: 130 Размер: 10 Mb Язык: English
This textbook provides a compact but comprehensive treatment that provides analytical and design steps to recurrent neural networks from scratch. It provides a treatment of the general recurrent neural networks with principled methods for training that render the (generalized) backpropagation through time (BPTT). This author focuses on the basics and nuances of recurrent neural networks, providing technical and principled treatment of the subject, with a view toward using coding and deep learning computational frameworks, e.g., Python and Tensorflow-Keras. |
Разместил: vitvikvas 10-01-2022, 09:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework Автор: Cynthia Brumfield and Brian Haugli Издательство: Wiley Год: 2022 Страниц: 224 Язык: английский Формат: epub Размер: 10.2 MB
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. |
Разместил: Ingvar16 9-01-2022, 17:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication Автор: Holger Kaschner Издательство: Springer Год: 2021 Страниц: 230 Язык: английский Формат: pdf (true), epub Размер: 10.2 MB
Cyber attacks and IT outages threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. With its practical structure, it is ideally suited to day-to-day business for crisis team members, communicators, security, IT and data protection experts. With numerous illustrations and checklists. A cyber crisis is therefore a crisis in which IT systems and the data processed on them play a central role. This involves the classic protection goals of information security: confidentiality, integrity, and availability of the data as well as authenticity of the communication participants and contents of the communication (technically as well as organizationally). We are therefore dealing with a cyber crisis whenever a breach of the protection goals (can) result in real dangers to the life and limb of people or to the strategic goals, reputation, or survivability of our organization. |
Разместил: Ingvar16 9-01-2022, 06:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|