Vtome.ru - электронная библиотека

  • Добавил: buratino
  • Дата: 15-10-2019, 18:56
  • Комментариев: 0
Название: Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
Автор: Murdoch, GSE #99, Don
Издательство: Independently published
Год: 2019
Формат: PDF
Страниц: 258
Размер: 39.8 Mb
Язык: English

Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases is having an amazing impact on Security Operations worldwide. BTHb:SOCTH is the go to guiding book for new staff at a top 10 MSSP, integrated into University curriculum, and cited in top ten courses from a major information security training company. This listing is for V1.02.BTHb:SOCTH provides the security practitioner with numerous field notes on building a security operations team, managing SIEM, and mining data sources to get the maximum amount of information out of them with a threat hunting approach.
  • Добавил: literator
  • Дата: 14-10-2019, 16:46
  • Комментариев: 0
Название: Security Designs for the Cloud, IoT, and Social Networking
Автор: Dac-Nhuong Le, Chintan Bhatt
Издательство: Wiley-Scrivener
Год: 2019
Страниц: 300
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.
  • Добавил: literator
  • Дата: 14-10-2019, 12:59
  • Комментариев: 0
Название: Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions
Автор: John Savill
Издательство: Sybex;
Год: 2019
Страниц: 448
Язык: английский
Формат: pdf (true)
Размер: 33.4 MB

An expert guide for IT administrators needing to create and manage a public cloud and virtual network using Microsoft Azure. With Microsoft Azure challenging Amazon Web Services (AWS) for market share, there has been no better time for IT professionals to broaden and expand their knowledge of Microsoft’s flagship virtualization and cloud computing service. Microsoft Azure Infrastructure Services for Architects: Designing Cloud Solutions helps readers develop the skills required to understand the capabilities of Microsoft Azure for Infrastructure Services and implement a public cloud to achieve full virtualization of data, both on and off premise. Microsoft Azure provides granular control in choosing core infrastructure components, enabling IT administrators to deploy new Windows Server
  • Добавил: umkaS
  • Дата: 13-10-2019, 22:54
  • Комментариев: 0
Название: Галактика Интернет: размышления об Интернете, бизнесе и обществе
Автор: Кастельс М.
Издательство: У-Фактория
Год: 2004
Cтраниц: 328
Формат: pdf
Размер: 11 мб
Язык: русский

Интернет стал обычной частью нашей жизни и привычным рабочим инструментом. Как он появился? Кто его создал? Как сказался Интернет на сфере коммуникаций и экономике? К каким изменениям в культуре приводит распространение Интернета? Как меняются под его влиянием отношения между людьми?
  • Добавил: buratino
  • Дата: 13-10-2019, 11:37
  • Комментариев: 0
Название: A Leader's Guide to Cybersecurity: Why Boards Need to Lead--and How to Do It
Автор: Thomas J. Parenty, Jack J. Domet
Издательство: Harvard Business Review Press
Год: 2019
Формат: epub/pdf(conv.)
Страниц: 240
Размер: 1 Mb
Язык: English

Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe.
Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide.
Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable net that covers everything an organization does--from its business operations, models, and strategies to its products and intellectual property. And boards are in the best position to oversee the needed changes to strategy and hold their companies accountable. Not surprisingly, many boards aren't prepared to assume this responsibility.
  • Добавил: buratino
  • Дата: 13-10-2019, 10:56
  • Комментариев: 0
Название: AWS Certified Solutions Architect - Associate (SAA-C01) Cert Guide (Certification Guide) First Edition
Автор: Anthony Sequeira
Издательство: Pearson IT Certification
Год: 2019
Формат: epub/azw3/pdf(conv.)
Страниц: 320
Размер: 10.1 Mb
Язык: English

Learn, prepare, and practice for AWS Certified Solutions Architect - Associate (SAA-C01) exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning.
Master AWS Certified Solutions Architect - Associate (SAA-C01) exam topics
Assess your knowledge with chapter-ending quizzes
Review key concepts with exam preparation tasks
Practice with realistic exam questions
  • Добавил: umkaS
  • Дата: 12-10-2019, 17:40
  • Комментариев: 0
Название: Аутентификация. Теория и практика обеспечения безопасного доступа к информационным ресурсам
Автор: Афанасьев А.А., Веденьев Л.Т., Воронцов А.А. и др.
Издательство: Горячая линия-Телеком
Год: 2012
Cтраниц: 552
Формат: pdf
Размер: 11 мб
Язык: русский

Книга посвящена одному из аспектов проблемы управления доступом к информации в компьютерных системах — аутентификации. Фактически защита информации начинается с аутентификации пользователей. Каждый пользователь современных компьютерных систем сталкивается с процедурами аутентификации неоднократно в течение рабочего дня.
  • Добавил: literator
  • Дата: 10-10-2019, 20:15
  • Комментариев: 0
Название: 5G Explained: Security and Deployment of Advanced Mobile Communications
Автор: Jyrki T.J. Penttinen
Издательство: Wiley
Год: 2019
Страниц: 326
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Practical Guide Provides Students and Industry Professionals with Latest Information on 5G Mobile Networks. Continuing the tradition established in his previous publications, Jyrki Penttinen offers 5G Explained as a thorough yet concise introduction to recent advancements and growing trends in mobile telecommunications. In this case, Penttinen focuses on the development and employment of 5G mobile networks and, more specifically, the challenges inherent in adjusting to new global standardization requirements and in maintaining a high level of security even as mobile technology expands to new horizons. The text discusses, for example, the Internet of Things (IoT) and how to keep networks reliable and secure
  • Добавил: koticvvik
  • Дата: 10-10-2019, 19:52
  • Комментариев: 0

Название: Skype For Dummies
Автор: Loren Abdulezer, Susan Abdulezer, Howard Dammond, Niklas Zennstrom
Издательство: Wiley Pub
Год: 2007
Формат: pdf
Страниц: 361
Размер: 10,8 МБ
Язык: English

See how to use Skype for secure chats and connect SkypeOut and SkypeIN. Here's the fun and easy way (r) to understand all the hype about Skype and make this cool alternative communication system work for you! You'll get great advice about hardware, directions for downloading and installing Skype, ideas for using Skype in your business, and the lowdown on making Skype calls to people with old-fashioned phones.
  • Добавил: literator
  • Дата: 10-10-2019, 14:27
  • Комментариев: 0
Название: Modeling and Simulation of Complex Communication Networks
Автор: Muaz A. Niazi
Издательство: The Institution of Engineering and Technology
Год: 2019
Страниц: 442
Язык: английский
Формат: True PDF
Размер: 46.5 MB

Modern network systems such as Internet of Things, Smart Grid, VoIP traffic, Peer-to-Peer protocol, and social networks, are inherently complex. They require powerful and realistic models and tools not only for analysis and simulation but also for prediction. This book covers important topics and approaches related to the modeling and simulation of complex communication networks from a complex adaptive systems perspective. The authors present different modeling paradigms and approaches as well as surveys and case studies.