Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations

Автор: literator от 18-07-2019, 17:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations
Автор: John Bair
Издательство: Academic Press
Год: 2018
Страниц: 526
Язык: английский
Формат: True PDF
Размер: 13.1 MB

Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. This book is intended for any professional that is interested in pursuing work that involves mobile forensics, and is designed around the outcomes of criminal investigations that involve mobile digital evidence. Author John Bair brings to life the techniques and concepts that can assist those in the private or corporate sector.
 

CISM Certified Information Security Manager Practice Exams

Автор: literator от 17-07-2019, 22:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CISM Certified Information Security Manager Practice Exams
Автор: Peter H. Gregory
Издательство: McGraw-Hill Education
Год: 2019
Страниц: 240
Язык: английский
Формат: epub, pdf (conv)
Размер: 10.1 MB

Don’t Let the Real Test Be Your First Test! Take the current version of the challenging CISM exam with complete confidence using relevant practice questions contained in this effective self-study guide. Each chapter of the book contains a battery of questions that closely match those on the live test in content, format, tone, and feel. To reinforce salient points and facilitate retention, in-depth explanations are provided for both the correct and incorrect answer choices. Written by an InfoSec expert and experienced author, CISM Certified Information Security Manager Practice Exams thoroughly covers every subject on the exam. Designed to help you pass the test with greater ease, this book is also an ideal companion to the CISM Certified Information Security Manager All-in-One Exam Guide.
 

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition

Автор: literator от 17-07-2019, 21:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition
Автор: Ric Messier
Издательство: McGraw-Hill Education
Год: 2019
Страниц: 608
Язык: английский
Формат: epub
Размер: 76.9 MB

Fully updated coverage of every topic on the current version of the GSEC exam. Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.
 

Internet of Things Security: Challenges, Advances, and Analytics

Автор: literator от 17-07-2019, 13:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things Security: Challenges, Advances, and Analytics
Автор: Chintan Patel, Nishant Doshi
Издательство: Auerbach Publications
ISBN: 1138318639
Год: 2018
Страниц: 261
Язык: английский
Формат: pdf (true)
Размер: 40.4 MB

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
 

Система электронной почты на основе Linux

Автор: alex66 от 17-07-2019, 09:34, Коментариев: 2

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Система электронной почты на основе Linux
Автор: Блам, Ричард
Издательство: М.: Издательский дом “Вильямс”
Год: 2001
Формат: PDF
Страниц: 448
Размер: 35,5 MB
Язык: русский

Основной целью создания этой книги является оказание помощи сетевым администраторам небольших учреждений в организации высокопроизводительной и качественной системы электронной почты, которая бы не уступала коммерческим аналогам. Кроме того, если предполагается подключение вашей системы электронной почты к сети Internet, то здесь вы найдете подробные материалы по этой теме. Вся информация, представленная в книге, может использоваться либо в учебных целях, либо в качестве справочника (или и в том, и другом качестве).
 

Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations

Автор: buratino от 16-07-2019, 20:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Автор: Niranjan Reddy
Издательство: Apress
Год: 2019
Формат: True PDF, ePub
Страниц: 507
Размер: 26.7 Mb, 61.2 Mb
Язык: English

Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career.
 

Multimedia Networking Technologies, Protocols, & Architectures

Автор: literator от 16-07-2019, 19:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Multimedia Networking Technologies, Protocols, & Architectures
Автор: Ivan Vidal, Ignacio Soto, Albert Banchs
Издательство: Artech House
ISBN: 1630813788
Год: 2019
Страниц: 352
Язык: английский
Формат: pdf (true)
Размер: 10.15 MB

This practical resource provides a survey on the technologies, protocols, and architectures that are widely used in practice to implement networked multimedia services. The book presents the background and basic concepts behind multimedia networking, and provides a detailed analysis of how multimedia services work, reviewing the diverse network protocols that are of common use to implement them. To guide the explanation of concepts, the book focuses on a representative set of networked multimedia services with proven success and high penetration in the telecommunication market, namely Internet telephony (VoIP), Video-on-Demand (VoD), and live IP television (IPTV). Contents are presented following a stepwise approach, describing each network protocol in the context of a networked multimedia service and making appropriate references to the protocol as needed in the description of other multimedia services.
 

CompTIA PenTest+ Practice Tests: Exam PT0-001

Автор: buratino от 14-07-2019, 11:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CompTIA PenTest+ Practice Tests: Exam PT0-001
Автор: Crystal Panek, Robb Tracy
Издательство: Sybex
Год: 2019
Формат: True PDF
Страниц: 418
Размер: 10 Mb
Язык: English

The must-have test prep for the new CompTIA PenTest+ certification
CompTIA PenTest+ is an intermediate-level cybersecurity certification that assesses second-generation penetration testing, vulnerability assessment, and vulnerability-management skills. These cognitive and hands-on skills are required worldwide to responsibly perform assessments of IT systems, identify weaknesses, manage the vulnerabilities, and determine if existing cybersecurity practices deviate from accepted practices, configurations and policies.
 

Cybersecurity of Industrial Systems

Автор: buratino от 14-07-2019, 11:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity of Industrial Systems
Автор: Jean-Marie Flaus
Издательство: Wiley-ISTE
Год: 2019
Формат: True PDF
Страниц: 404
Размер: 15.5 Mb
Язык: English

How to manage the cybersecurity of industrial systems is a crucial question.
To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the methods used by attackers, of the standards and regulations involved and of the available security solutions.
 

CEH v10 Certified Ethical Hacker Study Guide

Автор: literator от 14-07-2019, 01:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CEH v10 Certified Ethical Hacker Study Guide
Автор: Ric Messier
Издательство: Sybex
Год: 2019
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more.