Vtome.ru - электронная библиотека

  • Добавил: TRex
  • Дата: 20-12-2019, 15:32
  • Комментариев: 0

Название: Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Автор: Occupytheweb
Издательство: Independently published
Год: 2019
Формат: EPUB
Страниц: 353
Размер: 36,6 Mb
Язык: English

This tutorial-style book follows upon Occupytheweb's Best Selling "Linux Basics for Hackers" and takes the reader along the next step to becoming a Master Hacker. Occupytheweb offers his unique style to guide the reader through the various professions where hackers are in high demand (cyber intelligence, pentesting, bug bounty, cyber warfare, and many others) and offers the perspective of the history of hacking and the legal framework. This book then guides the reader through the essential skills and tools before offering step-by-step tutorials of the essential tools and techniques of the hacker including reconnaissance, password cracking, vulnerability scanning, Metasploit 5, antivirus evasion, covering your tracks, Python, and social engineering.
  • Добавил: TRex
  • Дата: 20-12-2019, 10:43
  • Комментариев: 0

Название: Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks
Автор: Dylan Mach
Издательство: Amazon Digital Services LLC
Год: 2019
Формат: EPUB, PDF
Страниц: 134
Размер: 11,7 Mb
Язык: English

Are you looking for a big career change and would like to learn more about computer programming and hacking in general? Would you like to be able to hack like the hackers and learn the best ways to find vulnerabilities of a system? Then this guidebook is the right one for your needs!
This guidebook is going to spend some time and attention to the different options that you need to know when it is time to get started with hacking and protecting your own network.
  • Добавил: literator
  • Дата: 19-12-2019, 20:09
  • Комментариев: 0
Название: Machine Learning for Future Wireless Communications
Автор: Fa‐Long Luo
Издательство: Wiley-IEEE Press
Год: 2020
Страниц: 475
Язык: английский
Формат: pdf (true)
Размер: 20.9 MB

A comprehensive review to the theory, application and research of Machine Learning for future wireless communications. In one single volume, Machine Learning for Future Wireless Communications provides a comprehensive and highly accessible treatment to the theory, applications and current research developments to the technology aspects related to Machine Learning (ML) for wireless communications and networks. The technology development of Machine Learning for wireless communications has grown explosively and is one of the biggest trends in related academic, research and industry communities.
  • Добавил: TRex
  • Дата: 19-12-2019, 05:25
  • Комментариев: 0

Название: Cybersecurity Law 2nd Edition
Автор: Jeff Kosseff
Издательство: Wiley
Год: 2019
Формат: EPUB, PDF, FB2
Страниц: 768
Размер: 11,1 Mb
Язык: English

The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments
The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation.
  • Добавил: literator
  • Дата: 18-12-2019, 06:34
  • Комментариев: 0
Название: Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts
Автор: Ethem Mining
Издательство: Amazon Digital Services LLC
Год: 2019
Страниц: 238
Язык: английский
Формат: epub, mobi, pdf (conv)
Размер: 10.1 MB

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? Have you scoured the internet looking for the perfect resource to help you get started with hacking, but became overwhelmed by the amount of disjointed information available on the topic of hacking and cybersecurity?
  • Добавил: literator
  • Дата: 18-12-2019, 05:34
  • Комментариев: 0
Название: Migrating to AWS, A Manager’s Guide: How to Foster Agility, Cost Savings and a Bring Competitive Edge to your Business (Early Release)
Автор: Jeff Armstrong
Издательство: O'Reilly Media
Год: 2019
Страниц: 123
Язык: английский
Формат: epub, rtf, pdf (conv)
Размер: 10.1 MB

Bring agility, cost savings, and a competitive edge to your business by migrating your IT infrastructure to AWS. Ideal for executive leadership, senior leadership, and engineering and IT managers, this practical book examines the advantages, disadvantages, and common pitfalls possible when moving your operations to the cloud. Author Jeff Armstrong brings years of practical hands-on experience helping dozens of enterprises make this corporate change. You’ll explore real-world examples of how organizations have made—or attempted to make—this wide-ranging transition. With this guide, you’ll be better prepared to objectively evaluate your migration before, during, and after the process so you can ensure success.
  • Добавил: Biber
  • Дата: 17-12-2019, 20:08
  • Комментариев: 0
Название: Управление сетевой средой Windows 2000. Учебный курс
Автор: Коллектив авторов
Жанр: Учебное пособие
Издательство: Русская редакция
Год: 2003
Страниц: 896
Язык: Русский
Формат: pdf
Размер: 64,31 Mb

Эта книга представляет собой учебный курс для самостоятельной подготовки к экзамену №70-218 по программам сертификации специалистов Microsoft Certified Systems Administrator и Microsoft Certified Systems Engineer.
  • Добавил: umkaS
  • Дата: 17-12-2019, 16:01
  • Комментариев: 0
Название: Все секреты Minecraft
Автор: Миллер М.
Издательство: М.: Эксмо
Год: 2015
Cтраниц: 176, цвет.ил.
Формат: fb2, rtf
Размер: 77 мб
Язык: русский

Minecraft – одна из самых популярных игр. Она уникальна и универсальна: вы можете строить удивительные здания, бороться с монстрами, изучать мир вокруг – в одиночку и с друзьями. Если вы хотите добиться максимальных результатов в Minecraft, вам необходимо применять нестандартные решения и использовать эффективные приемы игры. В этом гайде вы их найдете!
  • Добавил: literator
  • Дата: 15-12-2019, 20:07
  • Комментариев: 0
Название: Cyber Security Essentials For Beginners
Автор: QG Cable
Издательство: Amazon Digital Services LLC
Год: 2019
Язык: английский
Формат: epub, rtf, pdf (conv)
Размер: 10.1 MB

People are the primary target and reason for Cybersecurity disappointments in light of the fact that the vast majority of them are confiding in nature and are willing to help or contribute as a feature of their human instinct and their jobs. Hackers and scammers exploit that trust by seeming to make genuine business demands from managers or sharing social products of a progressively customized nature. They depend on individuals' interest and eagerness to cooperate to get them to click on the links in a business or individual email. The issues and difficulties related to cybersecurity, the measures are taken to ensure computer safety against unapproved access or attack, come up practically every day in your work and home lives nowadays.
  • Добавил: literator
  • Дата: 15-12-2019, 06:43
  • Комментариев: 0
Название: IoT Security: Advances in Authentication
Автор: Madhusanka Liyanage, An Braeken
Издательство: Wiley
Год: 2020
Страниц: 300
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

An up-to-date guide to an overview of authentication in the Internet of Things (IoT). The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.