|
|
|
|
|
|
|
| |
|
Название: Hierarchical Neural Networks for Image Interpretation Автор: Sven Behnke Издательство: Springer-Verlag Год: 2003 Формат: PDF Страниц: 245 Для сайта: mymirknig.ru Размер: 10,35 MB Язык: English
Human performance in visual perception by far exceeds the performance of contemporary computer vision systems. While humans are able to perceive their environment almost instantly and reliably under a wide range of conditions, computer vision systems work well only under controlled conditions in limited domains. |
Разместил: ak5812 12-11-2018, 11:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA Security+ Study Guide Authorized Courseware: Exam SY0-301 Автор: Emmett Dulaney Издательство: Sybex Год: 2011 Формат: PDF Страниц: 696 Для сайта: mymirknig.ru Размер: 10 Mb Язык: English
The preparation you need for the new CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside the new, CompTIA Authorized edition, you'll find complete coverage of all Security+ exam objectives, loads of real-world examples, and a CD packed with cutting-edge exam prep tools. The book covers key exam topics such as general security concepts, infrastructure security, the basics of cryptography, and much more. |
Разместил: Ice Zero 12-11-2018, 09:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide Автор: Darril Gibson Издательство: CreateSpace Independent Publishing Platform Год: 2011 Формат: PDF Страниц: 573 Для сайта: mymirknig.ru Размер: 3.4 Mb Язык: English
CompTIA Security+: Get Certified Get Ahead: SY0-301 Study Guide is an update to the top-selling SY0-201 guide, which helped thousands of readers pass the exam the first time they took it. The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. |
Разместил: Ice Zero 12-11-2018, 09:09 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Metasploit: The Penetration Tester's Guide Автор: David Kennedy, Jim O'gorman, Devon Kearns, Mati Aharoni Издательство: No Starch Press Год: 2011 Формат: PDF Страниц: 328 Для сайта: mymirknig.ru Размер: 4.1 Mb Язык: English
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. |
Разместил: Ice Zero 12-11-2018, 09:05 | Комментарии: 1 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Neural Networks in Healthcare: Potential And Challenges Автор: Rezaul Begg, Joarder Kamruzzaman, Ruhul Sarker Издательство: Idea Group Publishing Год: 2006 Формат: PDF Страниц: 349 Для сайта: mymirknig.ru Размер: 10,92 MB Язык: English
Neural Networks in Healthcare: Potential and Challenges presents interesting and innovative developments from leading experts and scientists working in health, biomedicine, biomedical engineering, and computing areas. This book covers many important and state-of-the-art applications in the areas of medicine and healthcare, including: cardiology, electromyography, electroencephalography, gait and human movement, therapeutic drug monitoring for patient care, sleep apnea, and computational fluid dynamics areas. |
Разместил: ak5812 12-11-2018, 07:19 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Mobile Ad Hoc Networking Автор: Edited by Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic Издательство: Wiley-IEEE Press Год: 2004 Формат: PDF Страниц: 480 Для сайта: mymirknig.ru Размер: 11.65 MB Язык: English
From physical issues up to applications aspects, Mobile Ad Hoc Networking comprehensively covers all areas of the technology, including protocols and models, with an emphasis on the most current research and development in the rapidly growing area of ad hoc networks. All material has been carefully screened for quality and relevance and reviewed by the most renowned and involved experts in the field. |
Разместил: ak5812 12-11-2018, 07:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Автор: TJ O'Connor Издательство: Syngress Год: 2012 Формат: PDF Страниц: 288 Для сайта: mymirknig.ru Размер: 1.5 Mb Язык: English
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. |
Разместил: Ice Zero 12-11-2018, 00:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA Security+ SY0-301 Exam Cram (3rd Edition) Автор: Kirk Hausman, Martin Weiss, Diane Barrett Издательство: Pearson IT Certification Год: 2011 Формат: PDF Страниц: 552 Для сайта: mymirknig.ru Размер: 3.4 Mb Язык: English
Prepare for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Exam Cram from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. CompTIA® Security+ Exam Cram, Third Edition, is the perfect study guide to help you pass CompTIA’s newly updated version of the Security+ exam. It provides coverage and practice questions for every exam topic. The book contains a set of 200 questions in two full practice exams. |
Разместил: Ice Zero 11-11-2018, 23:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Social Engineering: The Art of Human Hacking Автор: Christopher Hadnagy Издательство: Wiley Год: 2010 Формат: EPUB Страниц: 410 Для сайта: mymirknig.ru Размер: 6 Mb Язык: English
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. |
Разместил: Ice Zero 11-11-2018, 23:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Complete Guide to Cybersecurity Risks and Controls Автор: Charlie Pierce Издательство: CreateSpace Independent Publishing Platform ISBN: 1722677996 Год: 2018 Страниц: 322 Язык: английский Формат: epub Размер: 10.18 MB
The guide is based on the thought ICT function is a ideal government issue rather than a technical concern. With the rapid growth of protection breaches and the increasing need exterior associates to achieve business success, the effective use of ICT government and enterprise-wide frameworks to guide the execution of incorporated protection manages are critical in order to minimize data robbery. Amazingly, many companies do not have official techniques or guidelines to guard their resources from inner or exterior risks.The guide describes how to set up methodical control features and appropriate confirming techniques within a standard business structure and how to build auditable trust into the routine guarantee of ICT features. |
Разместил: Ingvar16 11-11-2018, 14:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|