CCNA: Simple and Effective Strategies for Mastering CCNA (Cisco Certified Network Associate) Routing And Switching Certification From A-Z

Автор: literator от 7-10-2020, 14:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

CCNA: Simple and Effective Strategies for Mastering CCNA (Cisco Certified Network Associate) Routing And Switching Certification From A-ZНазвание: CCNA: Simple and Effective Strategies for Mastering CCNA (Cisco Certified Network Associate) Routing And Switching Certification From A-Z
Автор: Walker Schmidt
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 108
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.2 MB

One thing is for sure, CCNA (Cisco Certified Network Associate) is a must have certification. Anywhere in the world, this certification can offer a great career option and allow you to obtain high-end jobs. Now is the time to learn the simple and effective strategies for mastering CCNA mentioned in this book and become CCNA certified. We have covered all the major points you need to know about CCNA certification including the preparation strategy, study materials, practice tests, objectives of the exam, scope of CCNA, CCNA security, and more.
 

Network Security, Firewalls, and VPNs, 3rd Edition

Автор: TRex от 7-10-2020, 06:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Network Security, Firewalls, and VPNs, 3rd Edition
Автор: J. Michael Stewart, Denise Kinsey
Издательство: Jones & Bartlett Learning
Год: 2020
Формат: EPUB
Страниц: 400
Размер: 24 Mb
Язык: English

Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
 

Профессиональный поиск в Интернете

Автор: gol8425 от 6-10-2020, 12:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Профессиональный поиск в Интернете
Автор: Кутовенко Алексей
Издательство: Питер
Год: 2011
Страниц: 256
Формат: fb2
Размер: 10 мб
Качество: хорошее
Язык: русский

Найти нужную и актуальную информацию в Интернете порой очень непросто. Количество информационного мусора в Сети растет как снежный ком, и добраться до данных, которые вам действительно необходимы, используя традиционные Яндекс и Google, иногда просто невозможно. Книга, которую вы держите в руках, позволит увеличить эффективность вашего поиска информации в Интернете во много раз. Здесь описаны приемы, поисковые сайты и программы для специализированного поиска информации. Рассмотрены современные разновидности интернет-поиска: универсальный поиск, вертикальный поиск, метапоисковые системы, построение персональных поисковиков, поиск аудиовизуального контента, поиск по скрытому Интернету. Для всех рассмотренных систем приведены их характеристика и советы по максимально эффективному использованию.
 

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud

Автор: literator от 5-10-2020, 18:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google CloudНазвание: Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Автор: Miguel A. Calles
Издательство: Apress
Год: 2020
Страниц: 352
Язык: английский
Формат: pdf (true), epub
Размер: 14.2 MB

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.
 

Information Security and Optimization

Автор: buratino от 5-10-2020, 09:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Information Security and Optimization
Автор: Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 224
Размер: 23 Mb
Язык: English

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.
 

Hacking Multifactor Authentication

Автор: TRex от 4-10-2020, 04:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking Multifactor Authentication
Автор: Roger A. Grimes
Издательство: Wiley
Год: 2021
Формат: PDF
Страниц: 576
Размер: 20 Mb
Язык: English

Protect your organization from scandalously easy-to-hack MFA security “solutions”
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised.
 

5G Multimedia Communication: Technology, Multiservices, and Deployment

Автор: alex66 от 2-10-2020, 14:52, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: 5G Multimedia Communication: Technology, Multiservices, and Deployment
Автор: Edited by Zoran S. Bojkovic, Dragorad A. Milovanovic, and Tulsi Pawan Fowdur
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 357
Размер: 16.17 МБ
Язык: English

In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Deployment, the aim is to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The past two decades have witnessed an extremely fast evolution of mobile cellular network technology. The fifth generation of mobile wireless systems has achieved the first milestone toward finalization and deployment by 2020.
 

Communication Protocols: Principles, Methods and Specifications

Автор: buratino от 1-10-2020, 22:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Communication Protocols: Principles, Methods and Specifications
Автор: Drago Hercog
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 382
Размер: 11.4 Mb
Язык: English

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language.
 

Введение в вычислительные сети и кибербезопасность

Автор: Igor1977 от 1-10-2020, 16:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Введение в вычислительные сети и кибербезопасность
Автор: Ву Хван-Хуа [Джон], Ирвинг Дж. Дэвид
Издательство: Астана: Холдинг «Кəсіпқор»
Год: 2017
Формат: pdf, djvu
Страниц: 610
Размер: 18 mb
Язык: Русский

Трудно переоценить важность вычислительных сетей и сетевой безопасности в современном мире. Они стали неотъемлемой частью нашего существования, где минутное изображение требует описать множество способов, которые по существу влияют на каждый аспект нашей жизни.
 

Blockchain technologies and Crypto-currencies

Автор: TRex от 1-10-2020, 10:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Blockchain technologies and Crypto-currencies
Автор: Jovan Pehcevski
Издательство: Arcler Press
Год: 2020
Формат: PDF
Страниц: 414
Размер: 10 Mb
Язык: English

Blockchain Technologies and Crypto-Currencies takes into account the methods and technologies involved in blockchain along with its significant application in the field of finance. It includes the analysis of R & D capability of china’s blockchain technology and implementation of blockchain as a breakthrough in the development of artificial intelligence. This book also discusses about Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys, Blockchain Platform for Industrial Internet of Things, Blockchain Based Credibility Verification Method, Research on a New Signature Scheme on Blockchain and IOV Privacy Protection System Based on Double-Layered Chains. It also provides the reader with the insights of crypto-currencies and blockchain technologies in order to analyze the impact of blockchain technologies in the field of finance and its application to the Internet of things (IoT).