Vtome.ru - электронная библиотека

  • Добавил: TRex
  • Дата: 9-10-2020, 15:09
  • Комментариев: 0
Название: Cybercrime: An Encyclopedia of Digital Crime
Автор: Nancy E. Marion, Jason Twede
Издательство: ABC-CLIO
Год: 2020
Формат: PDF, EPUB
Страниц: 485
Размер: 10 Mb
Язык: English

This important reference work is an extensive, up-to-date resource for students wanting to immerse themselves in the world of cybercrime, or for those seeking further knowledge of specific attacks both domestically and internationally.
Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace.
  • Добавил: buratino
  • Дата: 9-10-2020, 07:46
  • Комментариев: 0
Название: Google Cloud Certified Associate Cloud Engineer All-in-One Exam Guide
Автор: Jack Hyman
Издательство: McGraw-Hill Education
Год: 2020
Формат: epub
Страниц: 368
Размер: 28.5 Mb
Язык: English

This study guide offers 100% coverage of every objective for the Google Cloud Certified Associate Cloud Engineer exam
Take the challenging Google Cloud Certified Associate Cloud Engineer exam with confidence using the comprehensive information contained in this effective self-study guide. The book serves as an introduction to Google Cloud Platform (GCP) and shows you how to pass the test. Beyond exam preparation, the guide also serves as a valuable on-the-job reference.
  • Добавил: Igor1977
  • Дата: 7-10-2020, 17:24
  • Комментариев: 0

Название: Официальное руководство (ISC) по обеспечению безопасности информационных систем CISSP-ISSMP CBK
Автор: Стейнберг Джозеф (ред.)
Издательство: Астана: Холдинг «Кəсіпқор»
Год: 2017
Формат: pdf
Страниц: 479
Размер: 14 mb
Язык: Русский

Домен лидерства и управления в сфере безопасности затрагивает фундаментальные требования по программе безопасности. Он охватывает концепции безопасности на предприятии в широком плане, определяет её роль, поясняет о необходимости учреждения эффективной системы безопасности.
Это издание наиболее полный сборник отраслевых знаний составленный выдающимися экспертами по информационной безопасности и включает в себя необходимое пособие для получения сертификата по обеспечению безопасности информационных систем.
  • Добавил: alex66
  • Дата: 7-10-2020, 15:26
  • Комментариев: 0

Название: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, Seventh Edition
Автор: Michael Bazzell
Издательство: CreateSpace Independent Publishing Platform
Год: 2019
Формат: PDF
Страниц: 574
Размер: 62,19 МБ
Язык: English

It is time to look at OSINT in a different way. For many years, and within the previous six editions of this book, we have relied on external resources to supply our search tools, virtual environments, and investigation techniques. We have seen this protocol fail us when services shut down, websites disappear, and custom resources are dismantled due to outside pressures. This book aims to correct our dilemma. We will take control of our investigative resources and become self-reliant.
  • Добавил: literator
  • Дата: 7-10-2020, 14:40
  • Комментариев: 0
CCNA: Simple and Effective Strategies for Mastering CCNA (Cisco Certified Network Associate) Routing And Switching Certification From A-ZНазвание: CCNA: Simple and Effective Strategies for Mastering CCNA (Cisco Certified Network Associate) Routing And Switching Certification From A-Z
Автор: Walker Schmidt
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 108
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.2 MB

One thing is for sure, CCNA (Cisco Certified Network Associate) is a must have certification. Anywhere in the world, this certification can offer a great career option and allow you to obtain high-end jobs. Now is the time to learn the simple and effective strategies for mastering CCNA mentioned in this book and become CCNA certified. We have covered all the major points you need to know about CCNA certification including the preparation strategy, study materials, practice tests, objectives of the exam, scope of CCNA, CCNA security, and more.
  • Добавил: TRex
  • Дата: 7-10-2020, 06:42
  • Комментариев: 0
Название: Network Security, Firewalls, and VPNs, 3rd Edition
Автор: J. Michael Stewart, Denise Kinsey
Издательство: Jones & Bartlett Learning
Год: 2020
Формат: EPUB
Страниц: 400
Размер: 24 Mb
Язык: English

Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
  • Добавил: gol8425
  • Дата: 6-10-2020, 12:01
  • Комментариев: 0
Название: Профессиональный поиск в Интернете
Автор: Кутовенко Алексей
Издательство: Питер
Год: 2011
Страниц: 256
Формат: fb2
Размер: 10 мб
Качество: хорошее
Язык: русский

Найти нужную и актуальную информацию в Интернете порой очень непросто. Количество информационного мусора в Сети растет как снежный ком, и добраться до данных, которые вам действительно необходимы, используя традиционные Яндекс и Google, иногда просто невозможно. Книга, которую вы держите в руках, позволит увеличить эффективность вашего поиска информации в Интернете во много раз. Здесь описаны приемы, поисковые сайты и программы для специализированного поиска информации. Рассмотрены современные разновидности интернет-поиска: универсальный поиск, вертикальный поиск, метапоисковые системы, построение персональных поисковиков, поиск аудиовизуального контента, поиск по скрытому Интернету. Для всех рассмотренных систем приведены их характеристика и советы по максимально эффективному использованию.
  • Добавил: literator
  • Дата: 5-10-2020, 18:28
  • Комментариев: 0
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google CloudНазвание: Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Автор: Miguel A. Calles
Издательство: Apress
Год: 2020
Страниц: 352
Язык: английский
Формат: pdf (true), epub
Размер: 14.2 MB

Apply the basics of security in serverless computing to new or existing projects. This hands-on guide provides practical examples and fundamentals. You will apply these fundamentals in all aspects of serverless computing: improving the code, securing the application, and protecting the infrastructure. You will come away having security knowledge that enables you to secure a project you are supporting and have technical conversations with cybersecurity personnel.
  • Добавил: buratino
  • Дата: 5-10-2020, 09:43
  • Комментариев: 0
Название: Information Security and Optimization
Автор: Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 224
Размер: 23 Mb
Язык: English

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.
  • Добавил: TRex
  • Дата: 4-10-2020, 04:47
  • Комментариев: 0
Название: Hacking Multifactor Authentication
Автор: Roger A. Grimes
Издательство: Wiley
Год: 2021
Формат: PDF
Страниц: 576
Размер: 20 Mb
Язык: English

Protect your organization from scandalously easy-to-hack MFA security “solutions”
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised.