|
 |
|
 |
|
|
 |
|  |
|
Название: CCISO Certified Chief Information Security Officer All-in-One Exam Guide Автор: Steve Bennett, Jordan Genung Издательство: McGraw-Hill Education Год: 2020 Страниц: 400 Язык: английский Формат: epub Размер: 10.1 MB
100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam. Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. |
Разместил: Ingvar16 23-10-2020, 19:11 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CCNA Certification Practice Tests: Exam 200-301 Автор: Jon Buhagiar Издательство: Sybex Год: 2020 Формат: true pdf/epub Страниц: 464 Размер: 15.5 Mb Язык: English
The definitive study guide for the new CCNA and CCNP certifications CCNA Certification Practice Test: Exam 200-301 is the definitive practice guide for professionals preparing for the new CCNA or CCNP certifications, and for those looking to master the latest technologies in Cisco networking fundamentals. The practice exams, written by 17-year industry professional Jon Buhagiar, explore a broad range of exam objectives essential for passing the certification exam. |
Разместил: bomboane 23-10-2020, 14:47 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Computer Security and Encryption: An Introduction Автор: S. R. Chauhan, S. Jangra Издательство: Mercury Learning & Information Год: 2020 Формат: true pdf/epub Страниц: 350 Размер: 16.7 Mb Язык: English
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers. |
Разместил: bomboane 23-10-2020, 12:01 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Information and Communication Technologies for Humanitarian Services Автор: Edited by Muhammad Nazrul Islam Издательство: The Institution of Engineering and Technology Год: 2020 Формат: PDF Страниц: 393 Размер: 13,37 МБ Язык: English
Humanitarian services seek to promote welfare to save lives, maintain human dignity, alleviate suffering, strengthen preparedness, and provide material and logistical assistance in response to humanitarian crises. They are thus different from development aids that address underlying socioeconomic factors and provides support for the social, economic and political developments of developing nations. |
Разместил: ak5812 20-10-2020, 21:16 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Penetration Testing A - Z: Vulnerability Security and Tools Автор: Walter V. Ayres Издательство: by Walter V. Ayres Год: 2020 Формат: EPUB, PDF Страниц: 539 Размер: 11 Mb Язык: English
This book introduces penetration testing and its vital role in an overall network security plan. You will learn about the roles and responsibilities of a penetration testing professional, the motivation and strategies of the underground hacking community, and potential system vulnerabilities, along with corresponding avenues of attack. Most importantly, the book provides a framework for performing penetration testing and offers stepby- step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. |
Разместил: vitvikvas 20-10-2020, 18:55 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mastering Blockchain. An Intrоduсtiоn to Blockchain аnd thе Technology that Pоwеrѕ Them (Blockchain Applications, Cryptocurrency, Bitcoin, Mining and Investing…. Ethereum, Litecoin, Zcash, Monero, Ripple, Dash, IOTA…) Автор: Emma Witt Издательство: Amazon.com Services LLC Год: 2020 Страниц: 118 Язык: английский Формат: pdf, mobi, epub Размер: 10.1 MB
This book starts with the specialized establishments of blockchain innovation, showing you the basics of appropriated frameworks, cryptography, and how it keeps information secure. You will find out about the systems behind cryptographic forms of money and how to create applications utilizing Ethereum, a decentralized virtual machine. You will likewise investigate diverse other blockchain arrangements and get a prologue to business blockchain structures under Hyperledger, a collective exertion for the progression of blockchain innovations facilitated by the Linux Foundation. You will likewise be told the best way to execute blockchain arrangements past monetary standards, the Internet of Things with blockchain, blockchain versatility, and the future extent of this captivating and amazing innovation. |
Разместил: Ingvar16 20-10-2020, 14:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: ACI Advanced Monitoring and Troubleshooting (Networking Technology) Автор: Sadiq Memon, Carlo Schmidt, Joseph Ristaino Издательство: Cisco Press Год: 2021 Формат: epub Страниц: 944 Размер: 97.4 Mb Язык: English
ACI Advanced Monitoring and Troubleshooting provides a solid conceptual foundation and in-depth technical knowledge for monitoring and troubleshooting virtually any problem encountered during testing, deployment, or operation of Cisco Application Centric Infrastructure (ACI) infrastructure. Authored by leading ACI support experts at Cisco, it covers all you’ll need to keep your ACI deployment working optimally. |
Разместил: bomboane 18-10-2020, 10:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Разработка правил информационной безопасности Автор: Бармен С. Издательство: М.: Вильямс Год: 2002 Cтраниц: 208 Формат: pdf Размер: 13 мб
Правила информационной безопасности играют ключевую роль в обеспечении защиты систем и сети. Продуманные, реализованные и внедренные правила информационной безопасности помогут почувствовать разницу между наметками безопасности и организованной системой безопасности, которая эффективно функционирует. Эта книга поможет понять, какими знаниями нужно обладать для разработки эффективных правил информационной безопасности. |
Разместил: rivasss 18-10-2020, 09:01 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Практическая безопасность сетей Автор: Ольков Евгений Издательство: NetSkills Год: 2017 Страниц: 142 Язык: русский Формат: pdf Размер: 11.2 MB
Из этой книги вы сможете узнать каким образом можно “закрутить гайки безопасности” на обычных коммутаторах и маршрутизаторах. Попробуем описать самые лучшие практики по настройке оборудования, а также процессы, необходимые для обеспечения информационной безопасности. |
Разместил: Ingvar16 17-10-2020, 21:30 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: NGINX Unit Cookbook: Recipes for Using a Versatile Open Source Server, First Edition Автор: Derek DeJonghe Издательство: O'Reilly Media Год: 2020 Страниц: 108 Язык: английский Формат: True PDF + pdf, rtf, epub Размер: 10.1 MB, 10.1 MB
The NGINX Unit Cookbook aims to provide a reference for using NGINX Unit through practical real-world examples. Throughout this book, you will learn about NGINX Unit, its features, and where it fits in your system architecture. This guide will provide you with the knowledge to effectively use NGINX Unit and simplify your system architecture by using a single middleware server for a wide range of web application use cases. NGINX Unit is a dynamic web application server, which means that it can be dynamically reconfigured during runtime without dropping requests. The architecture of Unit is such that request handling is broken into layers. These layers comprise a controller process, a router process, and some application processes. |
Разместил: Ingvar16 17-10-2020, 11:55 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|