Методы и средства защиты информации

Автор: umkaS от 13-03-2020, 18:51, Коментариев: 2

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Методы и средства защиты информации
Автор: Хорошко В.А., Чекатков А.А.
Издательство: Юниор
Год: 2003
Cтраниц: 476
Формат: pdf
Размер: 11 мб
Язык: русский

Книга предназначена широкому кругу читателей: от технического специалиста, связанного с использованием средств защиты информации, до рядового пользователя современных информационных технологий. Однако наиболее полезна книга будет специалистам в области технической защиты информации, защиты информации в автоматизированных системах, организации комплексной защиты информации, а также руководителям предприятий, учреждений и организаций, нуждающихся в защите своей информации.
 

Securing Office 365: Masterminding MDM and Compliance in the Cloud

Автор: buratino от 13-03-2020, 11:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Securing Office 365: Masterminding MDM and Compliance in the Cloud
Автор: Matthew Katzer
Издательство: Apress
Год: 2019
Язык: английский
Формат: pdf (true), epub
Размер: 77.5 MB

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office. Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.
 

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

Автор: buratino от 12-03-2020, 05:21, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking
Автор: Jennifer Kurtz
Издательство: Syngress
Год: 2016
Формат: True PDF/ePub
Страниц: 172
Размер: 10.2 Mb
Язык: English

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

Изменил: buratino по причине: reuploaded

 

Web Scalability for Startup Engineers

Автор: buratino от 11-03-2020, 21:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web Scalability for Startup Engineers
Автор: Artur Ejsmont
Издательство: McGraw-Hill Education
Год: 2015
Формат: PDF
Размер: 16,2 Мб
Язык: английский / English

This is an invaluable roadmap for meeting the rapid demand to deliver scalable applications in a startup environment. With a focus on core concepts and best practices rather than on individual languages, platforms, or technologies, Web Scalability for Startup Engineers describes how infrastructure and software architecture work together to support a scalable environment.
 

Hacking: Rooting & Jailbreaking

Автор: literator от 11-03-2020, 16:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking: Rooting & Jailbreaking
Автор: Alex Wagner
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 110
Язык: английский
Формат: pdf (conv), rtf, epub
Размер: 10.1 MB

If you are a complete beginner to Informational Technology or Information Security in the realm of Ethical Hacking, the contents in this book will deliver all the answers you have in mind on topics revolving around hacking mobile devices. Considering that you are preparing to become an Ethical Hacker, IT Security Analyst, IT Security Engineer, or a Cybersecurity Specialist, yet still in doubt and want to know about mobile devices, you will find this book extremely useful.
 

Cryptocurrency: A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain!

Автор: TRex от 11-03-2020, 11:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cryptocurrency: A Complete Guide On How To Trade How To Trade Bitcoin, Ethereum and Blockchain!
Автор: Mark Morgan
Издательство: Amazon.com Services LLC
Год: 2020
Формат: EPUB
Страниц: 83
Размер: 10 Mb
Язык: English

Cryptocurrencies like Bitcoin, Ethereum, and Litecoin are powerful technologies and money-making tools, and are quickly becoming the way of the future. Now, this book breaks down the fundamentals of cryptocurrency in a way that even the beginner can understand, uncovering the history of the blockchain, how crypto works, and how you can use it to start making money today!
 

Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel

Автор: TRex от 11-03-2020, 10:49, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Youtube Algorithms: Hack the Youtube Algorithm | Pro Guide on How to Make Money Online Using your Youtube Channel
Автор: Leonard Carli
Издательство: Amazon.com Services LLC
Год: 2020
Формат: EPUB
Страниц: 69
Размер: 10 Mb
Язык: English

Most people coming into this industry approach Internet marketing completely the wrong way and don’t have the right idea of what some of these core business concepts really are. This lack of knowledge will only lead to more failures and frustration. .
 

SAP API Management

Автор: buratino от 11-03-2020, 01:26, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: SAP API Management (SAP PRESS)
Автор: Harsh Jegadeesan, Divya Mary, Shilpa Vij Carsten Bönnen
Издательство: Rheinwerk Publishing, Inc.
Год: 2020
Формат: True PDF
Страниц: 365
Размер: 12.3 Mb
Язык: English

Unpack your API toolkit with this guide to SAP API Management. Learn how to use the API Designer to create enterprise APIs and discover how to manage their lifecycle. Walk through key processes that optimize your APIs and keep them running smoothly: traffic management, mediation, security, and monetization. Get expert guidance on building applications, generating integration flows, and running analytics. Master API management from end to end!
 

HTTP/2 in Action

Автор: literator от 10-03-2020, 14:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: HTTP/2 in Action
Автор: Barry Pollard
Издательство: Manning Publications
Год: 2019
Страниц: 410
Язык: английский
Формат: pdf (true), epub (true), mobi (true)
Размер: 19.7 MB, 14.4 MB

HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites.
 

CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide

Автор: buratino от 9-03-2020, 15:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
Автор: Omar Santos
Издательство: Cisco Press
Год: 2020
Формат: epub
Страниц: 904
Размер: 61.9 Mb
Язык: English

The CCNP Security Core SCOR 350-701 Official Cert Guide serves as a comprehensive guide for individuals who are pursuing the Cisco CCNP Security certification. This book helps all network professionals who want to learn the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats.