Hacking for Beginners with Kali Linux: Learn Kali Linux and Master Tools to Crack Websites, Wireless Networks and Earn Income (5 Books in 1)

Автор: Igor1977 от 5-02-2021, 13:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Hacking for Beginners with Kali Linux: Learn Kali Linux and Master Tools to Crack Websites, Wireless Networks and Earn Income (5 Books in 1)
Автор: Darwin Tye
Издательство: Independently published
Год: 2020
Формат: pdf/djvu
Страниц: 300
Размер: 12 mb
Язык: английский

Hacking is a Skill. Hacking is a practice. Hacking is a passion. To be a hacker you need not build things but you need to crack them. Hackers are always decipted as evil in popular cultural references. However, there are good hackers called as ” Ethical hackers “ also known as ” Penetration testers” and “security researchers”. This Mega book set is written by a penetration researcher who have 20 years experience in the industry. He had spent time with hundreds of hackers and security researchers and compiled all his thoughts into this book.
Hacking is not easy. But if you can follow a pathway followed by thousands of hackers from years ago you can easily become one. Author of this book explains these hacking procedures in 5 modules for your easy understanding.
 

Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures

Автор: buratino от 5-02-2021, 11:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures
Автор: Basel Halak (Editor)
Издательство: Springer
Год: 2021
Формат: true pdf/epub
Страниц: 221
Размер: 26.6 Mb
Язык: English

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.
 

Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition

Автор: admin от 4-02-2021, 20:49, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition
Автор: Kief Morris
Издательство: O’Reilly
Год: 2021
Страниц: 577
Размер: 17.72 МБ
Формат: PDF, EPUB
Язык: English

Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other conservative organizations plan moves to the cloud, development teams for companies worldwide are attempting to build large infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by DevOps teams to manage cloud-age infrastructure.
 

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Автор: literator от 4-02-2021, 18:26, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access ConnectionНазвание: Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Автор: Dr. Hidaia Mahmood Alassouli
Издательство: Independently published
Год: 2021
Страниц: 137
Язык: английский
Формат: pdf, azw3, epub
Размер: 15.4 MB

Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems.
 

What Are the Dangers of Online Scams?

Автор: harun54 от 4-02-2021, 13:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: What Are the Dangers of Online Scams?
Автор: John Allen
Издательство: Referencepoint Press
Год: 2020
Формат: PDF
Размер: 10 Мб
Язык: английский / English

As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.
 

Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition

Автор: TRex от 3-02-2021, 12:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
Автор: Bastian Ballmann
Издательство: Springer
Год: 2021
Формат: PDF, EPUB
Страниц: 235
Размер: 17 Mb
Язык: English

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.
 

Building Confidence in Blockchain: Investing in Cryptocurrency and a Decentralized Future

Автор: alex66 от 3-02-2021, 10:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Building Confidence in Blockchain: Investing in Cryptocurrency and a Decentralized Future
Автор: Carter Lee Woetzel
Издательство: New Degree Press
Год: 2020
Страниц: 264
Размер: 11.56 МБ
Формат: PDF, EPUB
Язык: English

Did you know that the US dollar has lost more than 97% of its value since 1917?
The reality is that inflation is just one of the many issues that plagues the dollar as a primary form of currency. Other issues like centralization, increasingly expensive transaction and contract infrastructure, and entrenched trust deficits all make this traditional asset both inefficient and impractical as the currency of the future.
 

Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context

Автор: buratino от 3-02-2021, 08:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context (Simulation Foundations, Methods and Applications)
Автор: Jose L. Risco Mart?n (Editor), Saurabh Mittal (Editor), Tuncer Oren (Editor)
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 453
Размер: 67.4 Mb
Язык: English

This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. It highlights the underlying infrastructure, modeling paradigms, and simulation methodologies that can be brought to bear to develop the next generation of systems for a highly connected society. Such systems, aptly termed cyber-physical systems (CPS), are now widely used in e.g. transportation systems, smart grids, connected vehicles, industrial production systems, healthcare, education, and defense.
 

Computer Networking: A Top-Down Approach 8th Edition

Автор: buratino от 2-02-2021, 17:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Computer Networking: A Top-Down Approach, Eighth Edition
Автор: James Kurose, Keith Ross
Издательство: Pearson
Год: 2021
Формат: True PDF
Страниц: 774
Размер: 14.4 Mb
Язык: English

A top-down, layered approach to computer networking.
Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors’ long tradition of teaching this complex subject through a layered approach in a “top-down manner.”
 

Серия "Мир технологий" в 3 книгах

Автор: SCART56 от 2-02-2021, 06:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Серия "Мир технологий" в 3 книгах
Автор(ы): разные
Издательство: Москва
Год: 2018-2019
Страниц: 1000+
Формат: fb2, pdf
Размер: 15 Мб
Язык: русский
Серия: Мир технологий

Вашу почту читают, за вашими передвижениями следят, а «умный» телевизор записывает все ваши разговоры. Нет, это не сценарий очередной антиутопии, это наша повседневная жизнь. И если вы думаете, что вашими персональными данными никто не интересуется, то вы глубоко заблуждаетесь.