Cybersecurity Law 2nd Edition

Автор: TRex от 19-12-2019, 05:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Cybersecurity Law 2nd Edition
Автор: Jeff Kosseff
Издательство: Wiley
Год: 2019
Формат: EPUB, PDF, FB2
Страниц: 768
Размер: 11,1 Mb
Язык: English

The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments
The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation.
 

Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts

Автор: literator от 18-12-2019, 06:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts
Автор: Ethem Mining
Издательство: Amazon Digital Services LLC
Год: 2019
Страниц: 238
Язык: английский
Формат: epub, mobi, pdf (conv)
Размер: 10.1 MB

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? Have you scoured the internet looking for the perfect resource to help you get started with hacking, but became overwhelmed by the amount of disjointed information available on the topic of hacking and cybersecurity?
 

Migrating to AWS, A Manager’s Guide: How to Foster Agility, Cost Savings and a Bring Competitive Edge to your Business (Early Release)

Автор: literator от 18-12-2019, 05:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Migrating to AWS, A Manager’s Guide: How to Foster Agility, Cost Savings and a Bring Competitive Edge to your Business (Early Release)
Автор: Jeff Armstrong
Издательство: O'Reilly Media
Год: 2019
Страниц: 123
Язык: английский
Формат: epub, rtf, pdf (conv)
Размер: 10.1 MB

Bring agility, cost savings, and a competitive edge to your business by migrating your IT infrastructure to AWS. Ideal for executive leadership, senior leadership, and engineering and IT managers, this practical book examines the advantages, disadvantages, and common pitfalls possible when moving your operations to the cloud. Author Jeff Armstrong brings years of practical hands-on experience helping dozens of enterprises make this corporate change. You’ll explore real-world examples of how organizations have made—or attempted to make—this wide-ranging transition. With this guide, you’ll be better prepared to objectively evaluate your migration before, during, and after the process so you can ensure success.
 

Управление сетевой средой Windows 2000. Учебный курс

Автор: Biber от 17-12-2019, 20:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Управление сетевой средой Windows 2000. Учебный курс
Автор: Коллектив авторов
Жанр: Учебное пособие
Издательство: Русская редакция
Год: 2003
Страниц: 896
Язык: Русский
Формат: pdf
Размер: 64,31 Mb

Эта книга представляет собой учебный курс для самостоятельной подготовки к экзамену №70-218 по программам сертификации специалистов Microsoft Certified Systems Administrator и Microsoft Certified Systems Engineer.
 

Все секреты Minecraft

Автор: umkaS от 17-12-2019, 16:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Все секреты Minecraft
Автор: Миллер М.
Издательство: М.: Эксмо
Год: 2015
Cтраниц: 176, цвет.ил.
Формат: fb2, rtf
Размер: 77 мб
Язык: русский

Minecraft – одна из самых популярных игр. Она уникальна и универсальна: вы можете строить удивительные здания, бороться с монстрами, изучать мир вокруг – в одиночку и с друзьями. Если вы хотите добиться максимальных результатов в Minecraft, вам необходимо применять нестандартные решения и использовать эффективные приемы игры. В этом гайде вы их найдете!
 

Cyber Security Essentials For Beginners

Автор: literator от 15-12-2019, 20:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Security Essentials For Beginners
Автор: QG Cable
Издательство: Amazon Digital Services LLC
Год: 2019
Язык: английский
Формат: epub, rtf, pdf (conv)
Размер: 10.1 MB

People are the primary target and reason for Cybersecurity disappointments in light of the fact that the vast majority of them are confiding in nature and are willing to help or contribute as a feature of their human instinct and their jobs. Hackers and scammers exploit that trust by seeming to make genuine business demands from managers or sharing social products of a progressively customized nature. They depend on individuals' interest and eagerness to cooperate to get them to click on the links in a business or individual email. The issues and difficulties related to cybersecurity, the measures are taken to ensure computer safety against unapproved access or attack, come up practically every day in your work and home lives nowadays.
 

IoT Security: Advances in Authentication

Автор: literator от 15-12-2019, 06:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: IoT Security: Advances in Authentication
Автор: Madhusanka Liyanage, An Braeken
Издательство: Wiley
Год: 2020
Страниц: 300
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

An up-to-date guide to an overview of authentication in the Internet of Things (IoT). The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
 

Internet of Things- Architecture, Implementation, and Security

Автор: literator от 15-12-2019, 05:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things- Architecture, Implementation, and Security
Автор: Mayur Ramgir
Издательство: Pearson
Год: 2019
Страниц: 408
Язык: английский
Формат: epub
Размер: 27.7 MB

Today we live in an era of internet where there are more connected devices than humans. The ecosystem of these interrelated computing devices, over the internet, for data sharing, communication and automation is called Internet of Things (IoT). Internet of Things not only exposes the learners to the world of IoT but also takes them deep into implementation, security and testing. The text is supplemented with case studies and real-world examples to enable the learners efficiently to implement the concepts discussed.
 

LISP Network Deployment and Troubleshooting: The Complete Guide to LISP Implementation on IOS-XE, IOS-XR, and NX-OS

Автор: buratino от 14-12-2019, 15:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: LISP Network Deployment and Troubleshooting: The Complete Guide to LISP Implementation on IOS-XE, IOS-XR, and NX-OS (Networking Technology)
Автор: Tarique Shakil, Vinit Jain, Yves Louis
Издательство: Cisco Press
Год: 2019
Формат: epub
Страниц: 624
Размер: 70.9 Mb
Язык: English

Implement flexible, efficient LISP-based overlays for cloud, data center, and enterprise
The LISP overlay network helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility.
LISP Network Deployment and Troubleshooting is the definitive resource for all network engineers who want to understand, configure, and troubleshoot LISP on Cisco IOS-XE, IOS-XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to address key issues such as scalability and convergence.
Focusing on design and deployment in real production environments, three leading Cisco LISP engineers present authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it.
 

Transforming Campus Networks to Intent-Based Networking

Автор: buratino от 14-12-2019, 03:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Transforming Campus Networks to Intent-Based Networking
Автор: Pieter-Jan Nefkens
Издательство: Cisco Press
Год: 2020
Формат: epub
Страниц: 368
Размер: 11.1 Mb
Язык: English

Migrate to Intent-Based Networking–and improve network manageability, cost, agility, security, and simplicity
With Intent-Based Networking (IBN), you can create networks that capture and automatically activate business intent, assure that your network responds properly, proactively detect and contain security threats, and remedy network issues before users even notice.
Intent-Based Networking makes networks far more valuable, but few organizations have the luxury of building them from the ground up. In this book, leading expert Pieter-Jans Nefkens presents a unique four-phase approach to preparing and transforming campus network infrastructures, architectures, and organization–helping you gain maximum value from IBN with minimum disruption and cost.