|
|
|
|
|
|
|
| |
|
Название: Secrets of a Cyber Security Architect Автор: Brook S. E. Schoenfield Издательство: Auerbach Publications Год: 2019 Страниц: 254 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered 'valuable'? By “system architectures” I meant to include any system that requires digital security, be it the architecture of a discrete application or program, a library or application programming interface (API), a global cloud, an organization’s digital assets, etc. Th ough my definition may have sufficed for the purposes of a book on threat modeling, it still feels a bit too opaque, and I fear that it excludes some important aspects. |
Разместил: Ingvar16 15-03-2020, 03:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Методы и средства защиты информации Автор: Хорошко В.А., Чекатков А.А. Издательство: Юниор Год: 2003 Cтраниц: 476 Формат: pdf Размер: 11 мб Язык: русский
Книга предназначена широкому кругу читателей: от технического специалиста, связанного с использованием средств защиты информации, до рядового пользователя современных информационных технологий. Однако наиболее полезна книга будет специалистам в области технической защиты информации, защиты информации в автоматизированных системах, организации комплексной защиты информации, а также руководителям предприятий, учреждений и организаций, нуждающихся в защите своей информации. |
Разместил: rivasss 13-03-2020, 18:50 | Комментарии: 2 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Securing Office 365: Masterminding MDM and Compliance in the Cloud Автор: Matthew Katzer Издательство: Apress Год: 2019 Язык: английский Формат: pdf (true), epub Размер: 77.5 MB
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business. |
Разместил: bomboane 13-03-2020, 11:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking Автор: Jennifer Kurtz Издательство: Syngress Год: 2016 Формат: True PDF/ePub Страниц: 172 Размер: 10.2 Mb Язык: English
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. |
Разместил: bomboane 12-03-2020, 05:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Web Scalability for Startup Engineers Автор: Artur Ejsmont Издательство: McGraw-Hill Education Год: 2015 Формат: PDF Размер: 16,2 Мб Язык: английский / English
This is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment. |
Разместил: bomboane 11-03-2020, 22:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacking: Rooting & Jailbreaking Автор: Alex Wagner Издательство: Amazon.com Services LLC Год: 2020 Страниц: 110 Язык: английский Формат: pdf (conv), rtf, epub Размер: 10.1 MB
If you are a complete beginner to Informational Technology or Information Security in the realm of Ethical Hacking, the contents in this book will deliver all the answers you have in mind on topics revolving around hacking mobile devices. Considering that you are preparing to become an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about mobile devices, you will find this book extremely useful. |
Разместил: Ingvar16 11-03-2020, 16:43 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cryptocurrency: A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain! Автор: Mark Morgan Издательство: Amazon.com Services LLC Год: 2020 Формат: EPUB Страниц: 83 Размер: 10 Mb Язык: English
Cryptocurrencies like Bitcoin, Ethereum, and Litecoin are powerful technologies and money-making tools, and are quickly becoming the way of the future. Now, this book breaks down the fundamentals of cryptocurrency in a way that even the beginner can understand, uncovering the history of the blockchain, how crypto works, and how you can use it to start making money today! |
Разместил: vitvikvas 11-03-2020, 11:12 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel Автор: Leonard Carli Издательство: Amazon.com Services LLC Год: 2020 Формат: EPUB Страниц: 69 Размер: 10 Mb Язык: English
Most people coming into this industry approach Internet marketing completely the wrong way and don’t have the right idea of what some of these core business concepts really are. This lack of knowledge will only lead to more failures and frustration. |
Разместил: vitvikvas 11-03-2020, 10:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: HTTP/2 in Action Автор: Barry Pollard Издательство: Manning Publications Год: 2019 Страниц: 410 Язык: английский Формат: pdf (true), epub (true), mobi (true) Размер: 19.7 MB, 14.4 MB
HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites. |
Разместил: Ingvar16 10-03-2020, 14:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide Автор: Omar Santos Издательство: Cisco Press Год: 2020 Формат: epub Страниц: 904 Размер: 61.9 Mb Язык: English
The CCNP Security Core SCOR 350-701 Official Cert Guide serves as a comprehensive guide for individuals who are pursuing the Cisco CCNP Security certification. This book helps all network professionals who want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. Complete and easy to understand, it explains key concepts and techniques through real-life examples. This book will be valuable to any individual who wants to learn about modern cybersecurity concepts and frameworks. |
Разместил: bomboane 9-03-2020, 15:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|