|
|
|
|
|
|
|
| |
|
Название: Dark Web in ten minutes: A quick guide how to stay anonymous using TOR network Автор: Paweł Winowicz Издательство: Amazon.com Services LLC Год: 2020 Язык: английский Формат: pdf, mobi, epub Размер: 10.1 MB
Would you feel comfortable with someone looking at your phone while you're texting your friend? I guess not. So why accept that the government and big companies collect our private data and share it with each other? My short guide will show you how to become anonymous on the web and not leave a trace. In a nutshell, this is a layer of the Internet that we can't access from a normal browser, or we need the appropriate permissions to do so. The things that this corner of the Internet hides include government databases, medical reports, information about users of various websites, clouds content, private videos on YouTube etc. Most statistics show that the average Internet user is able to access only 4% of the information contained on the Internet. |
Разместил: Ingvar16 31-08-2020, 13:17 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Enabling Technologies for the Successful Deployment of Industry 4.0 (Manufacturing Design and Technology) Автор: Antonio Sartal (Editor), Diego Carou (Editor), J. Paulo Davim (Editor) Издательство: CRC Press Год: 2020 Формат: True PDF Страниц: 145 Размер: 14.6 Mb Язык: English
This book offers the latest research advances in the field of Industry 4.0, focusing on enabling technologies for its deployment in a comprehensive way. This book offers successful implementation of technologies such as artificial intelligence, augmented and virtual reality, autonomous and collaborative robots, cloud computing, and up-to-date guidelines. It investigates how the technologies and principles surrounding Industry 4.0 (e.g., interoperability, decentralized decisions, information transparency, etc.) serve as support for organizational routines and workers (and vice versa). |
Разместил: bomboane 31-08-2020, 11:54 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Android Apps Security: Mitigate Hacking Attacks and Security Breaches, Second Edition Автор: Sheran Gunasekera Издательство: Apress Год: 2020 Формат: true pdf/epub Страниц: 300 Размер: 24.3 Mb Язык: English
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. |
Разместил: bomboane 31-08-2020, 11:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide: Designing & Implementing Cisco Enterprise Wireless Networks Автор: Henry Jerome Издательство: Cisco Press Год: 2021 Формат: epub Страниц: 995 Размер: 33.3 Mb Язык: English
CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Wireless networking experts Jerome Henry, Robert Barton, and David Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. |
Разместил: bomboane 31-08-2020, 11:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computer Network Security Автор: Ali Sadiqui Издательство: Wiley-ISTE Год: 2020 Страниц: 276 Язык: английский Формат: pdf (true) Размер: 13.3 MB
Developed in collaboration with a training and certification team from Cisco, Computer Network Security is an exploration of the state-of-the-art and good practices in setting up a secure computer system. Concrete examples are offered in each chapter, to help the reader to master the concept and apply the security configuration. This book is intended for students preparing for the CCNA Security Exam (210-260 IINS), whether at professional training centers, technical faculties, or training centers associated with the “Cisco Academy” program. It is also relevant to anyone interested in computer security, be they professionals in this field or users who want to identify the threats and vulnerabilities of a network to ensure better security. |
Разместил: Ingvar16 30-08-2020, 17:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Internet of Things: What Everyone Needs to Know Автор: Scott J. Shackelford Издательство: Oxford University Press Год: 2020 Страниц: 257 Язык: английский Формат: pdf (true) Размер: 11.2 MB
The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. |
Разместил: Ingvar16 30-08-2020, 12:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Exam Ref MS-500 Microsoft 365 Security Administration Автор: Ed Fisher, Bryan Lesko Издательство: Pearson Education, Inc. Год: 2021 Формат: epub Страниц: 416 Размер: 13.7 Mb Язык: English
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft MS-500 Microsoft 365 Security Administration certification exam. Exam Ref MS-500 Microsoft 365 Security Administration offers professional-level preparation that helps candidates maximize their exam performance and sharpen their skills on the job. It focuses on the specific areas of expertise modern IT professionals need to implement and administer security in any Microsoft 365 environment. |
Разместил: bomboane 29-08-2020, 07:55 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Next Level Cybersecurity: Detect the Signals, Stop the Hack Автор: Sai Huda Издательство: Leaders Press Год: 2019 Страниц: 207 Язык: английский Формат: pdf, djvu Размер: 10.1 MB
Even with over $100 billion spent each year on security, attackers break in. They stay hidden and steal data or disrupt with ransomware. Can anything be done to stop the hack? The answer is yes. Intensive reviews of the world's largest hacks uncovered the secret: detect attackers' signals early. This book reveals what those signals are and shows how to detect them. |
Разместил: Ingvar16 28-08-2020, 12:48 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Firewalls. Практическое применение межсетевых экранов Автор: Терри Вильям Оглтри Издательство: ДМК Пресс Год: 2001 ISBN: 5-94074-037-5 Формат: pdf Страниц: 377 Размер: 78,7 Mb Язык: Русский
Книга посвящена устройству межсетевых экранов и практическим аспектам работы с ними. Она включает необходимый объем теоретических сведений, в частности описание семейства протоколов TCP/IP и модели OSI, принципы шифрования и организации виртуальных частных сетей и т.д. |
Разместил: oksanavalera 27-08-2020, 19:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World Автор: Kevin E. Foltz, William R. Simpson Издательство: CRC Press Год: 2020 Страниц: 339 Язык: английский Формат: pdf (true), epub Размер: 28.3 MB
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. |
Разместил: Ingvar16 27-08-2020, 13:25 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|