СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 129
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
/ Комментариев: 0/

Cybersecurity and Third-Party Risk: Third Party Threat HuntingНазвание: Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Автор: Gregory C. Rasner
Издательство: Wiley
Год: 2021
Страниц: 483
Язык: английский
Формат: pdf (true) + pdf (conv), epub
Размер: 10.16 MB, 10.1 MB

Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ethical Hacking: A Hands-on Introduction to Breaking In
/ Комментариев: 0/

Название: Ethical Hacking: A Hands-on Introduction to Breaking In
Автор: Daniel G. Graham.
Издательство: No Starch Press
Год: 2021
Формат: ePUB
Страниц: 376
Размер: 11 Mb
Язык: English

A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
XSS Attacks
/ Комментариев: 0/

Название: XSS Attacks
Автор: Jeremiah Grossman, Robert "RSnake" Hansen, Petko "pdp" D. Petkov, Anton Rager
Издательство: Syngress
Год: 2007
Формат: ePUB
Страниц: 1082
Размер: 87,2 Mb
Язык: English

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.
XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and jаvascript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Automated City: Internet of Things and Ubiquitous Artificial Intelligence
/ Комментариев: 0/

Название: The Automated City: Internet of Things and Ubiquitous Artificial Intelligence
Автор: Seng W. Loke, Andry Rakotonirainy
Издательство: Springer
Год: 2021
Страниц: 176
Язык: английский
Формат: pdf (true), epub
Размер: 10.6 MB

The book outlines the concept of the Automated City, in the context of smart city research and development. While there have been many other perspectives on the smart city such as the participatory city and the data-centric city, this book focuses on automation for the smart city based on current and emerging technologies such as the Internet of Things, Artificial Intelligence (AI) and Robotics. The book attempts to provide a balanced view, outlining the promises and potential of the Automated City as well as the perils and challenges of widespread automation in the city. The book discusses, at some depth, automated vehicles, urban robots and urban drones as emerging technologies that will automate many aspects of city life and operation, drawing on current work and research literature. The book also considers broader perspectives of the future city, in the context of automation in the smart city, including aspirational visions of cities, transportation, new business models, and socio-technological challenges, from urban edge computing, ethics of the Automated City and smart devices, to large scale cooperating autonomous systems in the city.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Wireless Coexistence: Standards, Challenges, and Intelligent Solutions
/ Комментариев: 0/

Название: Wireless Coexistence: Standards, Challenges, and Intelligent Solutions
Автор: Daniel Chew, Andrew L. Adams
Издательство: Wiley/IEEE Press
Год: 2021
Страниц: 338
Язык: английский
Формат: pdf (true), epub
Размер: 41.3 MB

Explore a comprehensive review of the motivation for wireless coexistence and the standards and technology used to achieve it. Wireless Coexistence: Standards, Challenges, and Intelligent Solutions delivers a thorough exploration of wireless ecosystems sharing the spectrum, including the multiple standards and key requirements driving the current state of wireless technology. The book surveys several standards, including IEEE 802.22, 802.15.2, and 802.19.1 and expands upon recent advances in machine learning and artificial intelligence to demonstrate how these technologies might be used to meet or exceed the challenges of wireless coexistence. The text discusses cognitive radio in the context of spectrum coexistence and provides a comparison and assessment of using Artificial Intelligence in place of, or in addition to, current techniques. It also considers applications to communication theory, learning algorithms for passive wireless coexistence strategies, spectrum situational awareness, and active wireless coexistence strategies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
/ Комментариев: 0/

Название: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Автор: Chris Peiris, Binil Pillai, Abbas Kudrati
Издательство: Wiley
Год: 2021
Формат: PDF
Страниц: 547
Размер: 29 Mb
Язык: English

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros
In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Teach Yourself VISUALLY Zoom
/ Комментариев: 0/

Название: Teach Yourself VISUALLY Zoom
Автор: Paul McFedries
Издательство: Wiley
Год: 2021
Формат: EPUB
Размер: 48 Мб
Язык: английский / English

For anyone looking for a fast and easy way to learn the most popular videoconferencing software on the market today, Teach Yourself VISUALLY Zoom is your secret weapon. This hands-on guide skips the long-winded explanations and actually shows you how to do what you need to do in Zoom with full-size, color pictures and screenshots. Whether you’re a total newbie to Zoom or you just need to brush up on some of the finer points of this practical software, you’ll be up and running in no time at all. From joining and hosting Zoom meetings to protecting your privacy and security while you’re online, Teach Yourself VISUALLY Zoom hits all the key features that make online meetings a breeze.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IAPP CIPP / US Certified Information Privacy Professional Study Guide
/ Комментариев: 0/

Название: IAPP CIPP / US Certified Information Privacy Professional Study Guide
Автор: Mike Chapple, Joe Shelley
Издательство: Sybex
Год: 2021
Страниц: 307
Язык: английский
Формат: pdf (true), epub
Размер: 14.9 MB

Your ultimate guide to preparing for the CIPP/US exam. The IAPP CIPP / US Certified Information Privacy Professional Study Guide is your one-stop resource for complete coverage of the challenging CIPP/US exam. This Study Guide covers 100% of the CIPP/US domain competencies. You'll prepare for the exam smarter and faster with Sybex thanks to authoritative and accurate content including practice tests that validate and measure exam readiness. Including an assessment exam, end of chapter review questions, and the two complete practice exams, you get more than 350 questions to hone your test taking skills. You'll be ready to tackle the rigorous demands of work in the privacy field as you reinforce and retain what you've learned with the Sybex online learning environment and test bank, accessible across multiple devices. Get prepared for the CIPP/US exam, and a job in the privacy sector.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Шпионский гайд 2.0
/ Комментариев: 0/


Название: Шпионский гайд 2.0
Автор: Коллектив
Издательство: Интернет-издание
Год: 2021
Формат: PDF
Страниц: 41
Размер: 8 Mb
Язык: Русский

Проверить, ГДЕ он был. Узнать, С КЕМ общался. Восстановить удалённые чаты. Пробить по фото и номеру телефона. Узнать о незнакомце ВСЕ. И многое другое.



Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cryptography and Network Security: Principles and Practice, 8th Edition
/ Комментариев: 0/

Название: Cryptography and Network Security: Principles and Practice, 8th Edition
Автор: William Stallings
Издательство: Pearson Education
Год: 2020
Формат: ePUB
Страниц: 1513
Размер: 24,7 Mb
Язык: English

Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology.