Манифест криптоанархиста

Автор: Max148 от 4-06-2020, 21:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Манифест криптоанархиста
Автор: Ян Хеглер
Издательство: Страта
Год: 2018
Формат: FB2/RTF
Размер: 10.1 Мб
Язык: русский

Криптоанархизм – философия, суть которой в том, чтобы использовать сильную криптографию для защиты приватности и личной свободы. Криптоанархисты – люди, которые поддерживают философию криптоанархизма. Они считают, что криптография защищает людей от слежки в Интернете и уверены, что законы математики сильнее человеческих законов и что без шифрования сообщений и информации личная жизнь людей пострадает. Их глобальная цель – Интернет доверия.
Это явление можно отнести к сфере социально-политической идеологии, направленной на борьбу за свободу слова, тайну личности и частной переписки. Только в качестве основного инструмента этой борьбы криптоанархисты видят не стачки, митинги и уличные протесты, а математические алгоритмы и глубокое шифрование.
Возможно ли реализовать в киберпространстве социально-технологические модели, которые многие современные эксперты считают утопиями? Книга знакомит с мнениями авторитетных специалистов в различных областях современной науки.
 

Cybersecurity Explained: With security tools and techniques (Volume Book 1)

Автор: literator от 4-06-2020, 19:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cybersecurity Explained: With security tools and techniques (Volume Book 1)Название: Cybersecurity Explained: With security tools and techniques (Volume Book 1)
Автор: J.A. Poppen
Издательство: Amazon.com Services LLC
Год: 2020
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.1 MB

Cybersecurity has become progressively important to the average user of the cyberspace. The increased opportunities allowed by today's technology also bring about new security worries that must be checked. Organizations need to be conscious of the complication in using today's Cyber technology, where an increasing number of average items in use is being connected to the Internet. Safeguarding information has become one of the biggest challenges in the present day where Cyberattacks and crimes are growing immensely day by day.
 

Dive Into the 5th Domain: Threat Intelligence

Автор: buratino от 4-06-2020, 14:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Dive Into the 5th Domain: Threat Intelligence (Cyber Intelligence Report Book 201)
Автор: Jeremy Martin, Nitin Sharma,, Richard Medlin, Justin Casey
Издательство: Information Warfare Center
Год: 2020
Формат: epub/pdf(conv.)
Страниц: 202
Размер: 59 Mb
Язык: English

The content includes: Cyber Attacks Can Kill, Dark Web News and Dark Market Exit Scams, OSINT & Online Investigation Tips, Online and Dark Web Investigations: CSI Linux, CSI Linux Forensic Challenge, Chain of Custody Template, Data destruction & recoverability, Anonymity on the Web (Tor and Privoxy), OSINT Reconnaissance (Recon-ng walkthrough), Autopsy Installation in Linux,Elastic Stack with Zeek (Bro) IDS Integration, Configuring Zeek (Bro) IDS Signatures, and more...The Cyber Intelligence Report (CIR) is an Open Source Intelligence (AKA OSINT) resource centering around an array of subjects ranging from Exploits, Advanced Persistent Threat, National Infrastructure, Dark Web, Digital Forensics & Incident Response (DIFR), and the gambit of digital dangers.This publication focuses on OSINT investigations, CSI Linux, reconnaissance, Dark Web,Tor, and Threat Intelligence,

 

Dark Web Demystified: Into the Power of Anonymity

Автор: TRex от 4-06-2020, 14:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Dark Web Demystified: Into the Power of Anonymity
Автор: Adarsh Nair, Greeshma M R
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, EPUB
Страниц: 77
Размер: 24,4 Mb
Язык: English

Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just encrypting/decrypting data, where, the identities are also hidden. Dark Web is that part of the Internet, which achieves anonymity and security to the highest level. Requiring specialized access methodologies unlike the normal web, Dark Web is most popularly known as "Evil twin of the Internet,” as more than 57% of this space is filled with illegal content. Onion Routing is the protocol used for anonymous and secret communications over the Internet.
 

Teach Yourself Visually Quickbooks 2015

Автор: harun54 от 3-06-2020, 20:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Teach Yourself Visually Quickbooks 2015
Автор: Elaine Marmel
Издательство: Visual
Год: 2014
Формат: EPUB
Размер: 32 Мб
Язык: английский / English

The visual way to master QuickBooks 2015. If you learn better by seeing rather than wading through confusing text, then this visual guide is for you! Teach Yourself VISUALLY QuickBooks 2015 gives you hundreds of succinctly captioned, step-by-step screenshots that reveal how to master QuickBooks 2015 and get your business finances in working order.
 

Guide to Computer Network Security 5th edition

Автор: buratino от 3-06-2020, 17:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Guide to Computer Network Security (Texts in Computer Science) Fifth edition
Автор: Joseph Migga Kizza
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 599
Размер: 11 Mb
Язык: English

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.
 

Web and Network Data Science: Modeling Techniques in Predictive Analytics

Автор: admin от 2-06-2020, 20:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web and Network Data Science: Modeling Techniques in Predictive Analytics
Автор: Thomas W. Miller
Издательство: Pearson
Год: 2014
Формат: EPUB
Размер: 39 Мб
Язык: английский / English

Master modern web and network data modeling: both theory and applications. In Web and Network Data Science, a top faculty member of Northwestern University’s prestigious analytics program presents the first fully-integrated treatment of both the business and academic elements of web and network modeling for predictive analytics.
 

Statistical Analysis of Network Data with R, Second Edition

Автор: literator от 2-06-2020, 15:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Statistical Analysis of Network Data with R, Second EditionНазвание: Statistical Analysis of Network Data with R, Second Edition
Автор: Eric D. Kolaczyk, Gabor Csardi
Издательство: Springer
Серия: Use R!
Год: 2020
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks.
 

Security from Zero

Автор: buratino от 2-06-2020, 00:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security from ZeroНазвание: Security from Zero: A Practical Guide to Security for Busy People (Revision 7)
Автор: Eric Higgins
Издательство: Fullstack.io
Год: 2020-04-17
Формат: true pdf/epub/mobi
Страниц: 131
Размер: 10 Mb
Язык: English

Security from Zero is the busy person's guide to running a security program.
 

Metasploit: The Penetration Tester's Guide

Автор: harun54 от 1-06-2020, 08:39, Коментариев: 1

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Metasploit: The Penetration Tester's Guide
Автор: David Kennedy, Jim O'gorman, Devon Kearns, Mati Aharoni
Издательство: No Starch Press
Год: 2011
Формат: PDF
Страниц: 328
Для сайта: litgu.ru
Размер: 4.1 Mb
Язык: English

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.