Practical PowerShell Office 365 Exchange Online

Автор: buratino от 16-03-2020, 10:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Practical PowerShell Office 365 Exchange Online
Автор: Damian Scoles
Издательство: Practical PowerShell Press
Год: 2018
Формат: true pdf/epub
Страниц: 462
Размер: 146.2
Язык: English

PowerShell is an integral part of Exchange Online. This book was written with real world scenarios in mind. Authored and contributed to by a pair of MVPs, this book will provide you with practical advice on how to use PowerShell with Exchange Online.
 

AWS Certified SysOps Administrator Study Guide: Associate SOA-C01 Exam 2nd Edition

Автор: buratino от 15-03-2020, 11:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Certified SysOps Administrator Study Guide: Associate SOA-C01 Exam Second Edition
Автор: Brett McLaughlin, Sara Perrott
Издательство: Sybex
Год: 2020
Формат: epub
Страниц: 512
Размер: 15.5 Mb
Язык: English

Your #1 all-in-one reference and exam Study Guide for the UPDATED AWS SysOps Administrator certification!
This comprehensive book guides readers through the role of a SysOps Administrator and helps prepare candidates to take the updated AWS Certified SysOps Administrator―Associate (SOA-C01) Exam. The AWS Certified SysOps Administrator―Associate certification validates technical expertise in deployment, management, and operations on the AWS platform.
 

Secrets of a Cyber Security Architect

Автор: literator от 15-03-2020, 03:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Secrets of a Cyber Security Architect
Автор: Brook S. E. Schoenfield
Издательство: Auerbach Publications
Год: 2019
Страниц: 254
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered 'valuable'? By “system architectures” I meant to include any system that requires digital security, be it the architecture of a discrete application or program, a library or application programming interface (API), a global cloud, an organization’s digital assets, etc. Th ough my definition may have sufficed for the purposes of a book on threat modeling, it still feels a bit too opaque, and I fear that it excludes some important aspects.
 

Методы и средства защиты информации

Автор: umkaS от 13-03-2020, 18:51, Коментариев: 2

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Методы и средства защиты информации
Автор: Хорошко В.А., Чекатков А.А.
Издательство: Юниор
Год: 2003
Cтраниц: 476
Формат: pdf
Размер: 11 мб
Язык: русский

Книга предназначена широкому кругу читателей: от технического специалиста, связанного с использованием средств защиты информации, до рядового пользователя современных информационных технологий. Однако наиболее полезна книга будет специалистам в области технической защиты информации, защиты информации в автоматизированных системах, организации комплексной защиты информации, а также руководителям предприятий, учреждений и организаций, нуждающихся в защите своей информации.
 

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Автор: buratino от 13-03-2020, 11:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Securing Office 365: Masterminding MDM and Compliance in the Cloud
Автор: Matthew Katzer
Издательство: Apress
Год: 2019
Язык: английский
Формат: pdf (true), epub
Размер: 77.5 MB

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.
 

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

Автор: buratino от 12-03-2020, 05:21, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking
Автор: Jennifer Kurtz
Издательство: Syngress
Год: 2016
Формат: True PDF/ePub
Страниц: 172
Размер: 10.2 Mb
Язык: English

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

Изменил: buratino по причине: reuploaded

 

Web Scalability for Startup Engineers

Автор: buratino от 11-03-2020, 21:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web Scalability for Startup Engineers
Автор: Artur Ejsmont
Издательство: McGraw-Hill Education
Год: 2015
Формат: PDF
Размер: 16,2 Мб
Язык: английский / English

This is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment.
 

Hacking: Rooting & Jailbreaking

Автор: literator от 11-03-2020, 16:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking: Rooting & Jailbreaking
Автор: Alex Wagner
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 110
Язык: английский
Формат: pdf (conv), rtf, epub
Размер: 10.1 MB

If you are a complete beginner to Informational Technology or Information Security in the realm of Ethical Hacking, the contents in this book will deliver all the answers you have in mind on topics revolving around hacking mobile devices. Considering that you are preparing to become an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about mobile devices, you will find this book extremely useful.
 

Cryptocurrency: A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain!

Автор: TRex от 11-03-2020, 11:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cryptocurrency: A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain!
Автор: Mark Morgan
Издательство: Amazon.com Services LLC
Год: 2020
Формат: EPUB
Страниц: 83
Размер: 10 Mb
Язык: English

Cryptocurrencies like Bitcoin, Ethereum, and Litecoin are powerful technologies and money-making tools, and are quickly becoming the way of the future. Now, this book breaks down the fundamentals of cryptocurrency in a way that even the beginner can understand, uncovering the history of the blockchain, how crypto works, and how you can use it to start making money today!
 

Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel

Автор: TRex от 11-03-2020, 10:49, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel
Автор: Leonard Carli
Издательство: Amazon.com Services LLC
Год: 2020
Формат: EPUB
Страниц: 69
Размер: 10 Mb
Язык: English

Most people coming into this industry approach Internet marketing completely the wrong way and don’t have the right idea of what some of these core business concepts really are. This lack of knowledge will only lead to more failures and frustration. .