Компьютеры: прочее - скачать книги или читать онлайн. Страница 24

Купить книгу ИТ-архитектура. Практическое руководство от А до Я. Первое издание, автора Вадима Алджанова
Электр. книга
ИТ-архитектура. Практическое руководство от А до Я. Первое издание
В книге собраны и обобщены теоретические знания и примеры реализации в таких областях ИТ, как построение архитектуры предприятия, информационной безопасности, управление ИТ-сервисами, управление проектами, качеством и рисками, бизнес-процессами. Даются системное описание ИТ, модели и подходы по формированию ИТ-стратегии, требования к системам обеспечения, выбор компонентов ИТ-инфраструктуры, расчет стоимости владения и организационные аспекты управления ИТ.
Купить книгу Мануал по заработку на текстах, автора Алексея Номейна
Электр. книга
Мануал по заработку на текстах
Здравствуйте, дорогие читатели. Наша сегодняшняя тема – это заработок на текстах. Первое и основное – это желание и стремление. Конечно, без этого сейчас вообще никуда. Мы, как и в остальных экспериментах, запасаемся тонной терпения и стремления – и в путь!
Купить книгу Основы проектирования приложений интернета вещей. Конспект курса лекций, автора Алексея Корнилова
Электр. книга
Основы проектирования приложений интернета вещей. Конспект курса лекций
Третий закон Кларка гласит, что «любая достаточно развитая технология неотличима от магии». В этом смысле интернет вещей и технологии «цифровых двойников» напоминают магию Вуду: чтобы управлять объектом, надо создать его модель («двойника»), и пусть все, что происходит с двойником, происходит и в реальности… Современные платформы позволяют создавать приложения интернета вещей просто и быстро, как это делается – предмет данного курса лекций.
Купить книгу Сила бренда Биткоина. Или Эпоха Форков, автора Руслана Акста
Аудиокнига
Сила бренда Биткоина. Или Эпоха Форков
В своей очередной книге из серии «Популярно о криптовалютах» автор приоткрывает секреты силы бренда биткоина. Прочитав книгу,
Купить книгу Как зарабатывать на биткоинах. Инструкция. Быстрый заработок криптовалюты без вложений, автора Алекса Марона
Электр. книга
Как зарабатывать на биткоинах. Инструкция. Быстрый заработок криптовалюты без вложений
Первые цифровые деньги появились в 2008 году. Крах биткоина безрезультатно прочат с 2011 года, однако он все растет из года в год. Один из активных исследователей феномена этой виртуальной валюты Хоэль Лопес Барата математически рассчитал возможную стоимость биткоина на конец 2018 года. Расхождения в оценке его предсказаний смущают – цена криптовалюты, возможно, составит от 13,200 $ до 271,277 $.
Купить книгу Network Security Foundations. Technology Fundamentals for IT Success, автора Matthew  Strebe
Pdf-книга
Network Security Foundations. Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Why and how hackers do what they do How encryption and authentication work How firewalls work Understanding Virtual Private Networks (VPNs) Risks posed by remote access Setting up protection against viruses, worms, and spyware Securing Windows computers Securing UNIX and Linux computers Securing Web and email servers Detecting attempts by hackers
Купить книгу Unauthorised Access. Physical Penetration Testing For IT Security Teams, автора Wil  Allsopp
Pdf-книга
Unauthorised Access. Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security. Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data. Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
Купить книгу The SSCP Prep Guide. Mastering the Seven Key Areas of System Security, автора
Pdf-книга
The SSCP Prep Guide. Mastering the Seven Key Areas of System Security
SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create Organized exactly like the bestselling The CISSP Prep Guide (0-471-41356-9) by Ronald L. Krutz and Russell Dean Vines, who serve as consulting editors for this book This study guide greatly enhances the reader's understanding of how to implement security policies, standards, and procedures in order to breeze through the SSCP security certification test CD-ROM contains a complete interactive self-test using all the questions and answers from the book, powered by the Boson test engine
Купить книгу Hack Attacks Testing. How to Conduct Your Own Security Audit, автора John  Chirillo
Pdf-книга
Hack Attacks Testing. How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
Купить книгу Malicious Cryptography. Exposing Cryptovirology, автора Adam  Young
Pdf-книга
Malicious Cryptography. Exposing Cryptovirology
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside the brilliant and devious mind of a hacker—as much an addict as the vacant-eyed denizen of the crackhouse—so you can feel the rush and recognize your opponent’s power. Then, they will arm you for the counterattack. This book reads like a futuristic fantasy, but be assured, the threat is ominously real. Vigilance is essential, now. Understand the mechanics of computationally secure information stealing Learn how non-zero sum Game Theory is used to develop survivable malware Discover how hackers use public key cryptography to mount extortion attacks Recognize and combat the danger of kleptographic attacks on smart-card devices Build a strong arsenal against a cryptovirology attack
Купить книгу Phishing. Cutting the Identity Theft Line, автора
Pdf-книга
Phishing. Cutting the Identity Theft Line
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 percent of people who receive the e-mail go on to surrender their information-to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone. If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits. Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened. In Phishing, Rachael Lininger: Offers case studies that reveal the technical ins and outs of impressive phishing attacks. Presents a step-by-step model for phishing prevention. Explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft. Delivers in-depth incident response techniques that can quickly shutdown phishing sites.
Купить книгу Network Security JumpStart. Computer and Network Security Basics, автора Matthew  Strebe
Pdf-книга
Network Security JumpStart. Computer and Network Security Basics
Build Your Network Security Career on a Solid Foundation Whether you're setting out to earn a security certification or just want to know more about the security issues faced by all network administrators, Network Security JumpStart is the place to begin. Inside, a networking expert demystifies every aspect of the growing security imperative, giving you a firm footing from which you can realize your goals and develop a better understanding of computer and network security. Coverage Includes: Understanding security principles Understanding hacking Using encryption and authentication Managing security Securing Internet connections Using Virtual Private Networks Securing remote and home users Implementing virus protection Creating fault tolerance Securing Windows servers Securing UNIX servers Securing public web servers Securing public e-mail servers Detecting intrusion