Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Особенности киберпреступлений в России: инструменты нападения и защита информацииНазвание: Особенности киберпреступлений в России. Инструменты нападения и защита информации
Автор: Андрей Масалков
Издательство: ДМК Пресс
Год: 2018
Страниц: 228
Формат: pdf, djvu
Размер: 11,4 MB
Язык: русский

Материал книги помогает разобраться в том, что обычно скрывается за терминами и шаблонными фразами «взлом электронной почты», «кибершпионаж» и «фишинг». Автор старался показать информационную безопасность как поле битвы с трех сторон: со стороны преступного сообщества, использующего информационные технологии, со стороны законодательства и правоохранительной системы и со стороны атакуемого.
Разместил: Dovegone 31-03-2020, 22:24 | Комментарии: 0 | Подробнее
Название: Azure: Microsoft Azure: Essential User Guide to Learn Microsoft Azure Vol.1
Автор: William Hazelberg
Издательство: Amazon.com Services LLC
Год: 2020
Формат: epub/pdf(conv.)
Страниц: 183
Размер: 13 Mb
Язык: English

Azure. Invent with purpose.
Turn ideas into solutions with more than 100 services to build, deploy, and manage applications—in the cloud, on-premises, and at the edge—using the tools and frameworks of your choice.

Разместил: bomboane 31-03-2020, 20:14 | Комментарии: 0 | Подробнее
Название: Cybersecurity for Space: Protecting the Final Frontier
Автор: Jacob G. Oakley
Издательство: Apress
Год: 2020
Формат: true pdf/epub
Страниц: 183
Размер: 12.7 Mb
Язык: English

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.
Space is one of the fastest growing military, government, and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations.
Разместил: bomboane 31-03-2020, 12:24 | Комментарии: 0 | Подробнее
Название: The Book of GNS3: Build Virtual Network Labs Using Cisco, Juniper, and More
Автор: Jason C. Neumann
Издательство: No Starch Press
Год: 2015
Страниц: 272
Язык: английский
Формат: pdf (true), epub (true)
Размер: 20.6 MB

Networks are everywhere. They connect all kinds of businesses, from local bookshops to huge corporations to universities, across multiple cities and continents. Networks are conceptually simple to understand, yet they are becoming more and more complex, with innovation in areas such as Software Defined Networks (SDN), the Internet of Things (IoT), and other technologies just around the corner. GNS3 is open source software that emulates Cisco router and switch hardware to simulate complex networks. You can use GNS3 on any computer to experiment with various router configurations, study for that next big Cisco certification, or build the ubernetwork of your wildest dreams—all without plugging in a single physical network cable.
Разместил: Ingvar16 30-03-2020, 18:07 | Комментарии: 0 | Подробнее
Название: AI, IoT & the Intelligent Edge: Building Your Enterprise Tech Strategy
Автор: Daniel Sexton
Издательство: RedChip Ventures
Год: 2020
Страниц: 180
Язык: английский
Формат: pdf, epub
Размер: 12.1 MB

The term “Edge” describes a physical location. It is where computing resources are moved as close as possible to end users and devices. But, in some ways, ”Edge” is a misnomer. It is the Edge only with respect to centralized computing systems such as the cloud or enterprise data centers. Yet the Edge is everywhere. It is where people and machines unite with the digital world. The Edge landscape includes our homes, bodies, apparel, stores, factories, cities, streets, parks, buildings, hospitals, sports facilities, outer space, and unlimited other places and spaces, people and things, living and not. Increasingly, the Edge will be at the center of our lives.
Разместил: Ingvar16 30-03-2020, 16:21 | Комментарии: 0 | Подробнее
Название: Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
Автор: Stuart Nicholas
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 110
Язык: английский
Формат: pdf, rtf, epub
Размер: 10.1 MB

Have you always wondered if there was a way to improve your standing in the networking industry? Did you know about the CCNA Routing and Switching examination but didn’t know what to study? Do you want to know what it will take for you to ace the examination? If you answered yes to these questions, then you have come to the right place. If you are an employee in the networking industry, you know that the CCNA Routing and Switching certification is one of the most sought-after certifications one can obtain. Most employers want to hire candidates who have a CCNA certification, and networking companies want to hire employees with the CCNA Routing and Switching certification.
Разместил: Ingvar16 30-03-2020, 15:49 | Комментарии: 0 | Подробнее
Название: Cisco CCNA Command Guide: A Comprehensive Beginner's Guide from A-Z for CCNA and Computer Networking Users
Автор: Stuart Nicholas
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, EPUB
Страниц: 122
Размер: 10 Mb
Язык: English

The Cisco CCNA certification is considered one of the most valued in the field of networks and communications worldwide. It proves that its holders have the necessary knowledge to perform each of the functions carried out by a network administrator. In addition, it acts as an access requirement for more prestigious certifications, such as the CCNP.
This book contains the official Cisco agenda required to obtain the CCNA and, as a result, the reader will acquire the necessary skills to design, manage and secure a medium-sized corporate network, as well as the capacity for analysis and resolution of incidents when necessary.
To achieve this purpose, the work is divided into 7 chapters, through which they are analyzed from the most basic concepts, such as TCP / IP and OSI, to advanced protocols. It is a mostly practical approach, where all configuration is applied to Cisco devices.
Разместил: vitvikvas 30-03-2020, 14:43 | Комментарии: 0 | Подробнее
Название: Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
Автор: Stefano Novelli, Marco Silvestri
Издательство: Inforge.net
Год: 2019
Страниц: 338
Язык: английский
Формат: pdf, rtf
Размер: 10.1 MB

Have you ever wished to become a hacker? If the answer is yes, this book is for you! Started as a crowdfunding project, Hacklog Volume 1: Anonymity is the first of a book collection dedicated to who wants to enter the world of Hacking and IT Security. You’ll learn how to use the tools real-life hackers leverage everyday to avoid controls, how to conceal your most hidden files (and also how to recover them!) and you’ll get a deeper insight over the broad world of anonymity.
Разместил: Ingvar16 30-03-2020, 02:48 | Комментарии: 0 | Подробнее
Название: CompTIA Security+ All-in-One Exam Guide, (Exam SY0-501) 5th Edition
Автор: Wm. Arthur Conklin, Greg White, Dwayne Williams
Издательство: McGraw-Hill Education
Год: 2018
Страниц: 658
Язык: английский
Формат: pdf (true), epub
Размер: 36.4 MB, 10.9 MB

This fully updated study guide covers every topic on the current version of the CompTIA Security+ exam.
Take the latest version of the CompTIA Security+ exam with complete confidence using the detailed information contained in this highly effective self-study system. Written by a team of leading information security experts, this authoritative guide addresses the skills required for securing a network and managing risk and enables you to become CompTIA Security+ certified.
Разместил: Ingvar16 30-03-2020, 01:58 | Комментарии: 0 | Подробнее
Название: Информационная безопасность предприятия
Автор: Садердинов А. А., Трайнев В. А., Федулов А. А.
Издательство: Дашков и К°
Год: 2005
ISBN: 5-94798-558-6
Формат: pdf
Страниц: 301
Размер: 11,1 Mb
Язык: Русский

В книге изложен системный подход к построению комплексной защиты информационной системы предприятия. Рассмотрены принципы и предпосылки обеспечения информационной безопасности предприятия; характеристики угроз и анализ уязвимостей системы; требования к системе защиты. Впервые отечественными авторами описывается подход к построению комплексной защиты интегрированной информационной системы предприятия с применением отечественных средств защиты, криптографических средств в составе зарубежных ERP-систем.
Разместил: oksanavalera 29-03-2020, 08:21 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности