Network Theory Engineering Handbook

Автор: buratino от 7-05-2020, 13:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Network Theory Engineering Handbook
Автор: P.K. Ghosh
Издательство: Engineering Handbook
Год: 2019
Формат: True PDF
Страниц: 326
Размер: 12.8 mb
Язык: English

Network Theory Engineering Handbook
 

Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in General

Автор: literator от 5-05-2020, 19:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in GeneralНазвание: Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in General
Автор: Raymond Deep
Издательство: Amazon.com Services LLC
Год: 2019
Язык: английский
Формат: pdf, azw
Размер: 11.1 MB

If you want to learn about Kali Linux but aren’t sure where to start then keep reading… Does the world of cybersecurity seem exciting, but a little overwhelming to grasp? Do you want to learn about ethical hacking?
IF YES, then this is the perfect book for you. Our dependence on technology is increasing by the day. Gone are the days when a crime was restricted to the physical realm alone! These days, crime has seeped into the virtual world too! Cybercrimes have become rampant, and with it, the need for cybersecurity is ever increasing. A single attack on an organization’s network can cause irreparable harm to the company’s assets as well as reputation. Learning about cybersecurity, along with ethical hacking using Kali Linux gives you all the practical information you require for developing your skills as a professional in the industry of information security.
 

Fog Computing: Theory and Practice

Автор: literator от 4-05-2020, 07:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Fog Computing: Theory and PracticeНазвание: Fog Computing: Theory and Practice
Автор: Assad Abbas, Samee U. Khan
Издательство: Wiley
Год: 2020
Страниц: 582
Язык: английский
Формат: pdf (true)
Размер: 12.2 MB

Summarizes the current state and upcoming trends within the area of fog computing. Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industrial process control and improvement, smart cities, and virtual learning environments. In addition, the Machine-to-Machine (M2M) communication methods for fog computing environments are covered in depth.
 

Cybersecurity Fundamentals: A Real-World Perspective

Автор: buratino от 3-05-2020, 20:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity Fundamentals: A Real-World Perspective
Автор: Kutub Thakur, Al-Sakib Khan Pathan
Издательство: CRC Press
Год: 2020
Формат: True PDF
Страниц: 304
Размер: 24.5 Mb
Язык: English

Cybersecurity Fundamentals: A Real-World Perspective explains detailed concepts within computer networks and computer security in an easy-to-understand way, making it the perfect introduction to the topic. This book covers fundamental issues using practical examples and real-world applications to give readers a rounded understanding of the subject and how it is applied. The first three chapters provide a deeper perspective on computer networks, cybersecurity, and different types of cyberattacks that hackers choose to unleash on cyber environments. It then goes on to cover the types of major computer malware and cybersecurity attacks that shook the cyber world in the recent years, detailing the attacks and analyzing their impact on the global economy. The details of the malware codes that help the hacker initiate the hacking attacks on networks are fully described. It then covers high-tech cybersecurity programs, devices, and mechanisms that are extensively adopted in modern security systems.
 

Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux

Автор: TRex от 3-05-2020, 17:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ethical Hacking Bible: Cybersecurity, Cryptography, Network Security, Wireless Technology and Wireless Hacking with Kali Linux
Автор: Hugo Hoffman
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, AZW3
Страниц: 728
Размер: 16,9 Mb
Язык: English

This Book Bundle Includes 7 Books:
Book 1 - 25 Most Common Security Threats & How To Avoid Them
Book 2 - 21 Steps For Implementing The Nist Cybersecurity Framework
Book 3 - Cryptography Fundamentals & Network Security
Book 4 - How to Get Into Cybersecurity Without Technical Background
Book 5 - Wireless Technology Fundamentals
Book 6 - Learn Fast How To Hack Any Wireless Networks
Book 7 - Learn Fast How To Hack Like A Pro
 

Azure:Microsoft Azure: Build, manage, and scale cloud applications using the Azure Infrastructure

Автор: TRex от 3-05-2020, 11:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Azure:Microsoft Azure: Build, manage, and scale cloud applications using the Azure Infrastructure
Автор: Mikey Lindsey
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF
Страниц: 269
Размер: 29 Mb
Язык: English

Microsoft Azure is a cloud computing platform that provides a wide variety of services that we can use without purchasing and arranging our hardware. It enables the fast development of solutions and provides the resources to complete tasks that may not be achievable in an on-premises environment. Azure Services like compute, storage, network, and application services allow us to put our effort into building great solutions without worrying about the assembly of physical infrastructure.
 

Атака на Internet

Автор: kotmatros255 от 2-05-2020, 15:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Атака на Internet
Автор: Илья Медведовский, Павел Семьянов, Дмитрий Леонов
Издательство: ДМК
Год: 1999
ISBN: 5-89818-036-2
Формат: fb2, mobi, epub
Страниц: 342
Размер: 12,6 Mb
Язык: Русский

Эта книга является одним из первых специализированных изданий, написанных отечественными авторами, которое посвящено обстоятельному анализу безопасности сети Internet. В книге предлагаются и подробно описываются механизмы реализации основных видов удаленных атак как на протоколы TCP/IP и инфраструктуру Сети, так и на многие популярные сетевые операционные системы и приложения. Особое внимание авторы уделили причинам возникновения и успеха удаленных атак, а также их классификации.
 

Darknet Master: Tor and Deep Web Secrets

Автор: TRex от 2-05-2020, 10:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Darknet Master: Tor and Deep Web Secrets
Автор: Procolo Scotto
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, AZW3
Страниц: 127
Размер: 10 Mb
Язык: English

The vast Internet includes 3 layers. The initial layer (surface web) is public, comprising websites we use regularly like Facebook, Twitter, Amazon and LinkedIn. This coating makes up just 4% of the full Internet.
 

CCIE/CCNP Security SNCF 300-710: Todd Lammle Authorized Vol.q

Автор: buratino от 1-05-2020, 19:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CCIE/CCNP Security SNCF 300-710: Todd Lammle Authorized Volume 1
Автор: Todd Lammle
Издательство: Amazon
Год: 2020
Формат: pdf(conv.)
Страниц: 635
Размер: 20.3 Mb
Язык: English

Best Selling Cisco Author Todd Lammle has just completed his newest study guide: CCNP Security Securing Networks with Cisco Firepower (SNCF) 300-710—the most popular CCNP Security elective!
This book, written by the preeminent Cisco Firepower expert, thoroughly covers the Cisco CCNP SNCF exam objectives in a step-by-step, user friendly manner that will help get you through the grueling Cisco exam the first time!
 

PCI DSS: An Integrated Data Security Standard Guide

Автор: buratino от 1-05-2020, 12:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: PCI DSS: An Integrated Data Security Standard Guide
Автор: Jim Seaman
Издательство: Apress
Год: 2020
Формат: true pdf/epub
Страниц: 558
Размер: 48.5 Mb
Язык: English

Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets.
Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data.

Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your business IT systems or operations that store, process, and/or transmit sensitive data. This book will help you develop a business cybersecurity and InfoSec strategy through the correct interpretation, implementation, and maintenance of PCI DSS.