Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 22-02-2021, 20:01
  • Комментариев: 0
Ethical Hacking: A Basic Ethical Hacking Guide For Absolute BeginnersНазвание: Ethical Hacking: A Basic Ethical Hacking Guide For Absolute Beginners
Автор: Kendra White
Издательство: Amazon.com Services LLC
Год: 2021
Язык: английский
Формат: pdf, mobi, epub
Размер: 10.1 MB

The Ethical Hacking serves being an introduction towards the actions needed to complete a penetration test or perform an hack that is ethical beginning to end. The guide shows students how to precisely utilize and interpret the outcomes associated with hacking that is modern-day needed to finish a penetration test. It supplies a simple and clean explanation of how exactly to effortlessly utilize these tools, plus a methodology that is four-step conducting a penetration test or hack, thus equipping students utilizing the know-how necessary to jump start their careers and gain a much better understanding of offensive security.
  • Добавил: umkaS
  • Дата: 21-02-2021, 18:33
  • Комментариев: 0
Название: Программные и аппаратные трояны – способы внедрения и методы противодействия: Первая техническая энциклопедия (в 2-х книгах)
Автор: Белоус А.И., Солодуха В.А., Шведов С.В. под редакцией А. И. Белоуса
Издательство: Техносфера
Год: 2019
Cтраниц: 688+630
Формат: pdf
Размер: 239 мб
Язык: русский

Впервые в мировой научно-технической литературе в объеме одного комплексного издания последовательно и детально исследован феномен программных и аппаратных троянов, которые фактически являются технологической платформой современного и перспективного информационно-технического оружия (кибероружия).
  • Добавил: literator
  • Дата: 21-02-2021, 17:16
  • Комментариев: 0
Privacy, Regulations, and Cybersecurity: The Essential Business GuideНазвание: Privacy, Regulations, and Cybersecurity: The Essential Business Guide
Автор: Chris Moschovitis
Издательство: Wiley
Год: 2021
Страниц: 419
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to. Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.
  • Добавил: buratino
  • Дата: 20-02-2021, 11:16
  • Комментариев: 0
Название: Cybersecurity for SCADA Systems, Second Edition
Автор: William T. Shaw
Издательство: PennWell Books, LLC
Год: 2020
Формат: True PDF
Страниц: 523
Размер: 53.4 Mb
Язык: English

The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors.
  • Добавил: literator
  • Дата: 19-02-2021, 17:31
  • Комментариев: 0
Blockchain Success Stories: Case Studies from the Leading Edge of BusinessНазвание: Blockchain Success Stories: Case Studies from the Leading Edge of Business
Автор: Sir John Hargrave, Evan Karnoupakis
Издательство: O'Reilly Media
Год: 2020
Страниц: 279
Язык: английский
Формат: pdf (true), epub
Размер: 26.3 MB, 23.4 MB

Accessible and fun to read, this practical book contains a collection of stories of organizations using blockchain technology in practice. Through deep research and firsthand interviews, authors Sir John Hargrave and Evan Karnoupakis show you how leading-edge organizations have worked to integrate blockchain into their businesses. You'll start by exploring the origins of blockchain, with plain-English descriptions of industry terminology like bitcoin, cryptocurrencies, and smart contracts. Then you'll dive into 10 story-driven case studies that will teach you easy-to-understand blockchain best practices.
  • Добавил: buratino
  • Дата: 19-02-2021, 13:37
  • Комментариев: 0
Название: Security without Obscurity: Frequently Asked Questions (FAQ)
Автор: Jeff Stapleton
Издательство: CRC Press
Год: 2021
Формат: true pdf/
Страниц: 252
Размер: 10 Mb
Язык: English

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues.
  • Добавил: buratino
  • Дата: 19-02-2021, 13:05
  • Комментариев: 0
Название: Cloud Reliability Engineering: Technologies and Tools
Автор: Rathnakar Achary (Editor), Pethuru Raj (Editor)
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 352
Размер: 11.4 Mb
Язык: English

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers.
  • Добавил: rabinio
  • Дата: 17-02-2021, 12:43
  • Комментариев: 1
Название: A Web-Based Introduction to Programming: Essential Algorithms, Syntax...
Автор: Mike O’kane
Язык: english
Издательство: Carolina Academic Press
Год: 2018
Формат: pdf
Кол-во страниц: 688
Размер: 10 мб

A Web-Based Introduction to Programming is designed for courses that teach introductory programming, or programming logic and design, and may also be of interest to anyone seeking a painless way to learn the basics of programming. The book keeps the focus on essential syntax and control structures with minimal complexity and consistent examples. Topics include: the nature of instructions; algorithm design; basic HTML and input forms; assignment statements; arithmetic expressions; string-processing operations; text file I/O; logical expressions; selection structures; loop structures; numerically indexed and associative arrays; Web sessions; functions; include files; database querying; and an introduction to object oriented programming. The final chapter and appendices provide additional topics and references to assist with ongoing development. A number of later chapters can be omitted to meet course requirements without effecting the overall course of study.
  • Добавил: buratino
  • Дата: 17-02-2021, 10:45
  • Комментариев: 0
Название: Fundamentals of Multimedia (Texts in Computer Science) Third edition
Автор: Ze-Nian Li, Mark S. Drew, Jiangchuan Liu
Издательство: Springer
Год: 2021
Формат: True PDF
Страниц: 383
Размер: 17.8 Mb
Язык: English

Fully revised and updated, this new edition now includes coverage of such topics as 3D TV, social networks, high-efficiency video compression and conferencing, wireless and mobile networks, and their attendant technologies.
  • Добавил: buratino
  • Дата: 17-02-2021, 01:15
  • Комментариев: 0
Название: Security and Privacy Issues in IoT Devices and Sensor Networks
Автор: Sudhir Kumar Sharma (Editor), Bharat Bhushan (Editor), Narayan C. Debnath (Editor)
Издательство: Academic Press
Год: 2021
Формат: True PDF
Страниц: 316
Размер: 11.4 Mb
Язык: English

Security and Privacy Issues in IoT Devices and Sensor Networks investigates security breach issues in IoT and sensor networks, exploring various solutions. The book follows a two-fold approach, first focusing on the fundamentals and theory surrounding sensor networks and IoT security. It then explores practical solutions that can be implemented to develop security for these elements, providing case studies to enhance understanding. Machine learning techniques are covered, as well as other security paradigms, such as cloud security and cryptocurrency technologies.