|
 |
|
 |
|
|
 |
|  |
|
Название: Securing Microsoft 365 Автор: Joe Stocker Издательство: Publishing Xpert Год: 2021 Страниц: 270 Язык: английский Формат: pdf, epub Размер: 12.6 MB
Learn how to defend against the top cybersecurity threats targeting Microsoft 365 including attacks on Identity, Email and Devices. Network Firewalls have been the de facto security perimeter since they were invented in the late 1980s. If a firewall blocked all incoming traffic from the internet, then the level of difficulty for the hacker was significant. So, what changed? As organizations began adopting Cloud Computing in general, or Software as a Service (SaaS) in particular, the security perimeter shifted to the credentials used to authenticate to internet-connected systems. More than 80% of breaches in the present era can be traced to a guessed or stolen password. For Microsoft 365, the username is the email address, and for 90 percent of all M365 users, it is protected by a single factor (a password). This is a HUGE problem because anyone with an internet connection can attempt to guess the password of nearly any account. |
Разместил: Ingvar16 19-11-2021, 15:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Hacking Exposed: Know the secrets of Network Security Автор: Soumya Ranjan Behera Издательство: BPB Publications Год: 2018 Страниц: 206 Язык: английский Формат: pdf (true) Размер: 37.4 MB
Basic Guide learn to save yourself from hacking. Book teaches anyone interested to an in-depth discussion of what hacking is all about and to save yourself. Book provides techniques and tools which are used by both criminals and ethical hackers, all the things that you will find here will show you how information security is compromised and how you can identify an attack in a system that you are trying to protect. Furthermore, you will also learn how you can minimise any damage in your system or stop an ongoing attack. This book is written for the benefits of user to save himself from hacking. This book is intended for those who want to know more about information security. This book helps both beginners and intermediates by allowing them to gain in-depth knowledge. |
Разместил: Ingvar16 19-11-2021, 15:08 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Оптические системы передачи и транспортные сети Автор: Фокин В.Г. Издательство: Эко-Трендз Год: 2008 Cтраниц: 271 Формат: pdf Размер: 15 мб Язык: русский
Изложены основные принципы построения оптических систем передачи, современное определение моделей оптических транспортных сетей с точки зрения Международного Союза Электросвязи (МСЭ), технологии мультиплексирования и сопряжения транспортных сетей. Рассмотрены различные виды сетевых элементов с оптическими и электрическими компонентами и архитектуры сетей на их основе, включая сети синхронизации и управления. Уделено внимание новейшим направлениям развития транспортных сетей на основе стандартов OTN-OTH, Ethernet, T-MPLS, автоматически коммутируемых сетей (ASON/ASTN) и т.д. |
Разместил: rivasss 18-11-2021, 15:15 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cloud Computing Security: Foundations and Challenges, 2nd Edition Автор: John R. Vacca Издательство: CRC Press Год: 2021 Страниц: 522 Язык: английский Формат: epub Размер: 19.1 MB
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide. |
Разместил: Ingvar16 17-11-2021, 18:46 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Интеллектуальные интерактивные системы и технологии управления удаленным доступом (Методы и модели управления процессами защиты и сопровождения интеллектуальной собственности в сети Internet/Intranet) Автор: Ботуз С.П. Издательство: СОЛОН-ПРЕСС Год: 2016 - 3-е изд., допол. Cтраниц: 340 Формат: pdf Размер: 27 мб Язык: русский
В учебном пособии рассматриваются методы и модели управления удаленным доступом в процессе идентификации и визуализации основных этапов экспертизы (исследования, разработки и патентования) таких объектов интеллектуальной собственности как, например, электронные базы данных и базы знаний, на всем их жизненном цикле в сети Internet. Подробно рассмотрены графо-аналитические методы визуализации области допустимых решений распределенных в сети динамических процессов, объектно-ориентированная технология экспертизы многорежимных систем интерактивного управления. |
Разместил: rivasss 17-11-2021, 09:46 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: 5G Networks: Background, Issues and Security Автор: Max Hemmings Издательство: Nova Science Publishers, Inc. Год: 2021 Страниц: 432 Язык: английский Формат: pdf (true) Размер: 20.1 MB
Since the first mobile phones were made available in the 1980s, telecommunication providers have been investing in mobile networks to expand coverage, improve services, and attract more users. First-generation networks supported mobile voice calls but were limited in coverage and capacity. To address those limitations, providers developed and deployed second-generation (2G) mobile networks, then third-generation (3G), and fourth-generation (4G) networks. Each generation offered improved speeds, greater capacity, and new features and services. This book provides a background on mobile technologies, and addresses the race to 5G, factors affecting 5G deployment, and national security. |
Разместил: Ingvar16 15-11-2021, 17:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking Автор: Mohd Sohaib Издательство: BPB Publications Год: 2022 Формат: ePUB, PDF Страниц: 850 Размер: 22 Mb Язык: English
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features ● Courseware and practice papers with solutions for C.E.H. v11. ● Includes hacking tools, social engineering techniques, and live exercises. ● Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. |
Разместил: vitvikvas 15-11-2021, 14:38 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cracking the Emerging Tech Code: 17 Steps to a Rewarding Career in Emerging Technologies Автор: Prayukth K.V. Издательство: BPB Publications Год: 2021 Страниц: 658 Язык: английский Формат: pdf, epub Размер: 10.2 MB
Learn how to work towards making the most out of a career in emerging tech. Cracking the emerging tech code will help you attain your Emerging Technology (ET) career goals faster without spending years in committing avoidable mistakes, recovering from them, and learning things the hard way. You can apply practical tips in areas such as improving your ability to craft market-friendly use cases and evolving a solution approach in new and diverse tech or business environments, to propel forward your career in strategic and proactive ways. This book is for current and aspiring emerging tech professionals, students, and anyone who wishes to understand ways to have a fulfilling career in emerging technologies such as AI, blockchain, cybersecurity, IoT, space tech, and more. |
Разместил: Ingvar16 14-11-2021, 03:00 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Fundamental of Cyber Security: Principles, Theory and Practices Автор: Mayank Bhushan, Rajkumar Singh Rathore, Aatif Jamshed Издательство: BPB Publications Год: 2017 Страниц: 608 Язык: английский Формат: pdf, epub Размер: 10.2 MB
The book has been written in such a way that the concepts are explained in detail, giving adequate emphasis on examples. To make clarity on the topic, diagrams are given extensively throughout the text. Various questions are included that vary widely in type and difficulty to understand the text. This text is user-focused and has been highly updated including topics, pictures and examples. The book features the most current research findings in all aspects of information Security. From successfully implementing technology change to understanding the human factors in IT utilization, these volumes address many of the core concepts and organizational applications, implications of information technology in organizations. |
Разместил: Ingvar16 13-11-2021, 02:15 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Certified Ethical Hacker (CEH) Exam Cram Автор: William Chuck Easttom Издательство: Pearson Education Год: 2022 Страниц: 313 Язык: английский Формат: epub Размер: 11.7 MB
CEH v11 Certified Ethical Hacker Exam Cram is the perfect study guide to help you score higher on the updated EC-Council CEH v11 exam. Using the proven Exam Cram method of study, it offers comprehensive foundational learning for all facets of ethical hacking and penetration testing. Chuck Easttom's expert real-world approach reflects both his expertise as one of the leading cybersecurity practitioners and instructors in the world, as well as test-taking insights he has gained from teaching CEH preparation courses worldwide, including courses taught directly for EC-Council. Easttom assumes no prior knowledge: readers will little or no experience in ethical hacking and penetration testing can obtain the knowledge they need to take and pass the exam. |
Разместил: Ingvar16 12-11-2021, 01:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|