Защита от взлома: сокеты, эксплойты, shеll-код

Автор: kotmatros255 от 18-08-2020, 08:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Защита от взлома: сокеты, эксплойты, shеll-код
Автор: Джеймс Фостер, при участии Майка Прайса
Издательство: ДМК-Пресс
Год: 2006
ISBN: 5-9706-0019-9
Формат: pdf
Страниц: 783
Размер: 103 Mb
Язык: Русский

В своей новой книге Джеймс Фостер, автор ряда бестселлеров, впервые описывает методы, которыми пользуются хакеры для атак на операционные системы и прикладные программы. Он приводит примеры работающего кода на языках C/C++, Java, Perl и NASL, в которых иллюстрируются методы обнаружения и защиты от наиболее опасных атак.
 

Ethical Hacking: Learn Penetration Testing, Cybersecurity with Advanced Ethical Hacking Techniques and Methods

Автор: TRex от 17-08-2020, 07:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ethical Hacking: Learn Penetration Testing, Cybersecurity with Advanced Ethical Hacking Techniques and Methods
Автор: Joe Grant
Издательство: Amazon
Год: 2020
Формат: PDF, EPUB, AZW3
Страниц: 112
Размер: 10 Mb
Язык: English

Have you always been curious about hacking? Have you also had a misconception about the term Ethical Hacking? Would you like to learn more about ethical hacking using a powerful operating system called Kali Linux? Do you aspire to start an ethical hacking career someday? Then this is the right book to help you get started. This book will prove to be a valuable source of knowledge, especially when you want to learn a lot about ethical hacking in a short amount of time. This treasure trove of knowledge will teach you about the power of Kali Linux and how its tools can help you during every stage of the penetration testing lifecycle. If you want to launch yourself into the world of ethical hacking and want to use Kali Linux as the most used tool in your toolkit, this book will definitely serve as your launchpad.
 

Wireless Sensor Networks (Springer)

Автор: buratino от 15-08-2020, 19:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Wireless Sensor Networks
Автор: Senchun Chai, Zhaoyang Wang, Baihai Zhang, Lingguo Cui, Runqi Chai
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 290
Размер: 63.9 Mb
Язык: English

This book presents state-of-the-art research advances in the field of wireless sensor networks systems and approaches. It provides in-depth study on a number of major topics such as protocols, localization, coverage control, community detection, small world analysis, etc.
 

Practical VoIP Security

Автор: buratino от 15-08-2020, 13:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Practical VoIP Security
Автор: Thomas Porter and Jan Kanclirz Jr.
Издательство: Syngress
Год: 2006
Формат: EPUB
Размер: 8,9 Мб
Язык: английский / English

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques.
 

IT Disaster Response

Автор: buratino от 15-08-2020, 13:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: IT Disaster Response
Автор: Greg Moore
Издательство: Apress
Год: 2016
Формат: PDF, EPUB
Размер: 4,1 Мб
Язык: английский / English

IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.
 

CompTIA Cloud Essentials+ CLO-002 Certification Practice Exams

Автор: buratino от 15-08-2020, 12:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CompTIA Cloud Essentials+ CLO-002 Certification Practice Exams
Автор: Luciano Lima
Издательство: Amazon
Год: 2020
Формат: epub/pdf(conv.)
Страниц:
Размер: 4.7 Mb
Язык: English

CompTIA Cloud Essentials + CLO-002 Certification Practice Exams e-book aims to prepare candidates and reinforce their knowledge to take this certification exam. The e-book has been divided into four chapters based on the exam domains. Here, you will find a summary of all topics covered in the exam in order to make your studies easier. This e-book contains 120 practical questions covering 100% of the exam topics, and detailed explained answers. As a bonus, you will have mind maps, acronyms and access to flashcards, which will further assist you in preparing for this exam.
 

IoT Platforms, Use Cases, Privacy, and Business Models: With Hands-on Examples Based on the VICINITY Platform

Автор: buratino от 15-08-2020, 09:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: IoT Platforms, Use Cases, Privacy, and Business Models: With Hands-on Examples Based on the VICINITY Platform
Автор: Carna Zivkovic (Editor), Yajuan Guan (Editor), Christoph Grimm (Editor)
Издательство: Springer
Год: 2021
Формат: true pdf/rtf
Страниц: 231
Размер: 11 Mb
Язык: English

This book provides a comprehensive and consistent introduction to the Internet of Things. Hot topics, including the European privacy legislation GDPR, and homomorphic encryption are explained. For each topic, the reader gets a theoretical introduction and an overview, backed by programming examples. For demonstration, the authors use the IoT platform VICINITY, which is open-source, free, and offers leading standards for privacy.
 

Кибербезопасность: стратегия атак и обороны

Автор: TRex от 15-08-2020, 09:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Кибербезопасность: стратегия атак и обороны
Автор: Диогенес Ю., Озкайя Э.
Издательство: ДМК
Год: 2020
Формат: PDF
Страниц: 326
Размер: 18,6 Mb
Язык: Русский

Книга посвящена многим аспектам компьютерной безопасности - начиная от стратегии защиты до управления уязвимостями. В ней рассматриваются различные отраслевые стандарты и передовые методы реагирования, процессы взлома данных и политики безопасности, базовые средства контроля безопасности.
 

Text Segmentation and Recognition for Enhanced Image Spam Detection: An Integrated Approach

Автор: TRex от 15-08-2020, 08:16, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Text Segmentation and Recognition for Enhanced Image Spam Detection: An Integrated Approach
Автор: Mallikka Rajalingam
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 123
Размер: 10 Mb
Язык: English

This book discusses email spam detection and its challenges such as text classification and categorization. The book proposes an efficient spam detection technique that is a combination of Character Segmentation and Recognition and Classification (CSRC). The author describes how this can detect whether an email (text and image based) is a spam mail or not. The book presents four solutions: first, to extract the text character from the image by segmentation process which includes a combination of Discrete Wavelet Transform (DWT) and skew detection.
 

Nonlinear Control and Filtering for Stochastic Networked Systems

Автор: alex66 от 14-08-2020, 14:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Nonlinear Control and Filtering for Stochastic Networked Systems
Автор: Lifeng Ma, Zidong Wang, Yuming Bo
Издательство: CRC Press
Год: 2019
Формат: PDF
Страниц: 243
Размер: 10,46 МБ
Язык: English

In this book, control and filtering problems for several classes of stochastic networked systems are discussed. In each chapter, the stability, robustness, reliability, consensus performance, and/or disturbance attenuation levels are investigated within a unified theoretical framework. The aim is to derive the sufficient conditions such that the resulting systems achieve the prescribed design requirements despite all the network-induced phenomena.