Chained Exploits: Advanced Hacking Attacks from Start to Finish

Автор: daromir от 29-01-2018, 13:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Автор: Andrew Whitaker, Keatron Evans, Jack Voth
Название: Chained Exploits: Advanced Hacking Attacks from Start to Finish
Издательство: Addison-Wesley Professional
Год: 2009
ISBN: 9780321498816
Язык: English
Формат: pdf
Размер: 12,9 mb
Страниц: 312

The complete guide to today's hard-to-defend chained attacks.
 

Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true

Автор: daromir от 29-01-2018, 12:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Автор: Mark Osborne
Название: Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true
Издательство: CreateSpace Independent Publishing Platform
Год: 2014
ISBN: 9781493581283
Язык: English
Формат: pdf
Размер: 21,3 mb
Страниц: 306

“Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency” is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation.
 

Earth Observation Open Science and Innovation

Автор: admin от 28-01-2018, 22:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Earth Observation Open Science and Innovation (ISSI Scientific Report Series)
Автор: Pierre-Philippe Mathieu and Christoph Aubrecht
Издательство: Springer
Год: 2018
Формат: PDF
Размер: 14 Мб
Язык: английский / English

Over the past decades, rapid developments in digital and sensing technologies, such as the Cloud, Web and Internet of Things, have dramatically changed the way we live and work. The digital transformation is revolutionizing our ability to monitor our planet and transforming the way we access, process and exploit Earth Observation data from satellites.
 

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Автор: daromir от 27-01-2018, 14:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Автор: Kevin Mitnick, Robert Vamosi
Название: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Издательство: Little, Brown and Company
Год: 2017
ISBN: 9780316380508; 9780316380492
Язык: English
Формат: pdf, azw3
Размер: 11,3 mb
Страниц: 370

Be online without leaving a trace.
 

SEO 2018 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies

Автор: daromir от 27-01-2018, 10:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Автор: Adam Clarke
Название: SEO 2018 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies
Издательство: CreateSpace Independent Publishing Platform
Год: 2017
ISBN: 9781979286978
Язык: English
Формат: azw3
Размер: 1,1 mb
Страниц: 224

Learn SEO strategies to rank at the top of Google with SEO 2018.
 

Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX, 2nd Edition

Автор: literator от 23-01-2018, 20:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX, 2nd EditionНазвание: Juniper MX Series: A Comprehensive Guide to Trio Technologies on the MX, 2nd Edition
Автор: Douglas Richard Hanks, Jr., Harry Reynolds, David Roy
Издательство: O'Reilly Media
ISBN: 1491932724
Год: 2016
Страниц: 1140
Язык: английский
Формат: epub
Размер: 41.8 MB

Discover why routers in the Juniper MX Series—with their advanced feature sets and record-breaking scale—are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using advanced firewall filters, redundant inline services, powerful CoS tool sets, and many other Juniper MX features.
This second edition was written by a Senior NOC Engineer, whose vast experience with the MX Series is well documented. Each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you’ve learned. This edition includes new chapters on load balancing and vMX—Juniper MX’s virtual instance.
 

Design And Validation Of Computer Protocols

Автор: daromir от 22-01-2018, 16:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Автор: Gerard J. Holzmann
Название: Design And Validation Of Computer Protocols
Издательство: Prentice Hall
Год: 1991
ISBN: 0135399254
Серия: Prentice Hall Software Series
Язык: English
Формат: pdf
Размер: 1,3 mb
Страниц: 512

This text is intended as a comprehensive guide to the design and analysis of computer communications protocols. It introduces a sound discipline for the design of complete and consistent protocol systems, independent of where they are used.
 

Cisco Intelligent WAN (IWAN)

Автор: bhaer от 18-01-2018, 22:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Cisco Intelligent WAN (IWAN)
Автор: Brad Edgeworth
Издательство: Cisco Press
Год: 2017
Страниц: 880
Формат: True PDF
Размер: 10 Mb
Язык: English

The complete guide to Cisco® IWAN: features, benefits, planning, and deployment
Using Cisco Intelligent WAN (IWAN), businesses can deliver an uncompromised experience, security, and reliability to branch offices over any connection. Cisco IWAN simplifies WAN design, improves network responsiveness, and accelerates deployment of new services.
 

Информационные операции в сети Интернет

Автор: АлександрШе от 15-01-2018, 12:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Информационные операции в сети Интернет
Автор: Расторгуев С.П., Литвиненко М.В.
Издательство: АНО ЦСОиП
Год: 2014
Страниц: 133
Формат: pdf
Размер: 10 mb
Качество: хорошее

В работе предложен и обоснован подход к построению систем выявления информационных угроз.
Книга предназначена для военных экспертов, специалистов, работающих в сфере информационно-психологического воздействия. Также будет интересна широкому кругу читателей, интересующихся вопросами развития кибернетических систем и сетевых технологий.
 

Enterprise Cloud Security and Governance

Автор: bhaer от 14-01-2018, 20:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Enterprise Cloud Security and Governance
Автор: Zeal Vora
Издательство: Packt Publishing
Год: 2017
Страниц: 410
Формат: EPUB
Размер: 18 Mb
Язык: English

Build a resilient cloud architecture to tackle data disasters with ease
Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data.