СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 162
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Google Cloud Certified Professional Cloud Architect All-in-One Exam Guide
/ Комментариев: 0/

Название: Google Cloud Certified Professional Cloud Architect All-in-One Exam Guide
Автор: Iman Ghanizada
Издательство: McGraw-Hill Education
Год: 2021
Формат: epub/pdf(conv.)
Страниц: 320
Размер: 10 Mb
Язык: English

Everything you need to succeed on the Google Cloud Certified Professional Cloud Architect exam in one accessible study guide


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
/ Комментариев: 0/

Название: AWS Certified Security Specialty All-in-One Exam Guide (Exam SCS-C01)
Автор: Tracy Pierce, Aravind Kodandaramaiah, Alex Rosa, Rafael Koike
Издательство: McGraw Hill
Год: 2021
Формат: epub
Страниц: 672
Размер: 45 Mb
Язык: English

This self-study resource offers complete coverage of every topic on the AWS Certified Security Specialty exam
Take the AWS Certified Security – Specialty exam with confidence using the detailed information contained in this effective self-study resource.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ethical Hacking: A Basic Ethical Hacking Guide For Absolute Beginners
/ Комментариев: 0/

Ethical Hacking: A Basic Ethical Hacking Guide For Absolute BeginnersНазвание: Ethical Hacking: A Basic Ethical Hacking Guide For Absolute Beginners
Автор: Kendra White
Издательство: Amazon.com Services LLC
Год: 2021
Язык: английский
Формат: pdf, mobi, epub
Размер: 10.1 MB

The Ethical Hacking serves being an introduction towards the actions needed to complete a penetration test or perform an hack that is ethical beginning to end. The guide shows students how to precisely utilize and interpret the outcomes associated with hacking that is modern-day needed to finish a penetration test. It supplies a simple and clean explanation of how exactly to effortlessly utilize these tools, plus a methodology that is four-step conducting a penetration test or hack, thus equipping students utilizing the know-how necessary to jump start their careers and gain a much better understanding of offensive security.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Программные и аппаратные трояны – способы внедрения и методы противодействия: Первая техническая энциклопедия (в 2-х книгах)
/ Комментариев: 0/

Название: Программные и аппаратные трояны – способы внедрения и методы противодействия: Первая техническая энциклопедия (в 2-х книгах)
Автор: Белоус А.И., Солодуха В.А., Шведов С.В. под редакцией А. И. Белоуса
Издательство: Техносфера
Год: 2019
Cтраниц: 688+630
Формат: pdf
Размер: 239 мб
Язык: русский

Впервые в мировой научно-технической литературе в объеме одного комплексного издания последовательно и детально исследован феномен программных и аппаратных троянов, которые фактически являются технологической платформой современного и перспективного информационно-технического оружия (кибероружия).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Privacy, Regulations, and Cybersecurity: The Essential Business Guide
/ Комментариев: 0/

Privacy, Regulations, and Cybersecurity: The Essential Business GuideНазвание: Privacy, Regulations, and Cybersecurity: The Essential Business Guide
Автор: Chris Moschovitis
Издательство: Wiley
Год: 2021
Страниц: 419
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to. Privacy, Regulations, and Cybersecurity: The Essential Business Guide is your guide to understanding what “privacy” really means in a corporate environment: how privacy is different from cybersecurity, why privacy is essential for your business, and how to build privacy protections into your overall cybersecurity plan.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity for SCADA Systems 2nd Edition
/ Комментариев: 0/

Название: Cybersecurity for SCADA Systems, Second Edition
Автор: William T. Shaw
Издательство: PennWell Books, LLC
Год: 2020
Формат: True PDF
Страниц: 523
Размер: 53.4 Mb
Язык: English

The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Success Stories: Case Studies from the Leading Edge of Business
/ Комментариев: 0/

Blockchain Success Stories: Case Studies from the Leading Edge of BusinessНазвание: Blockchain Success Stories: Case Studies from the Leading Edge of Business
Автор: Sir John Hargrave, Evan Karnoupakis
Издательство: O'Reilly Media
Год: 2020
Страниц: 279
Язык: английский
Формат: pdf (true), epub
Размер: 26.3 MB, 23.4 MB

Accessible and fun to read, this practical book contains a collection of stories of organizations using blockchain technology in practice. Through deep research and firsthand interviews, authors Sir John Hargrave and Evan Karnoupakis show you how leading-edge organizations have worked to integrate blockchain into their businesses. You'll start by exploring the origins of blockchain, with plain-English descriptions of industry terminology like bitcoin, cryptocurrencies, and smart contracts. Then you'll dive into 10 story-driven case studies that will teach you easy-to-understand blockchain best practices.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security without Obscurity: Frequently Asked Questions (FAQ)
/ Комментариев: 0/

Название: Security without Obscurity: Frequently Asked Questions (FAQ)
Автор: Jeff Stapleton
Издательство: CRC Press
Год: 2021
Формат: true pdf/
Страниц: 252
Размер: 10 Mb
Язык: English

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cloud Reliability Engineering: Technologies and Tools
/ Комментариев: 0/

Название: Cloud Reliability Engineering: Technologies and Tools
Автор: Rathnakar Achary (Editor), Pethuru Raj (Editor)
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 352
Размер: 11.4 Mb
Язык: English

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
A Web-Based Introduction to Programming
/ Комментариев: 1/

Название: A Web-Based Introduction to Programming: Essential Algorithms, Syntax...
Автор: Mike O’kane
Язык: english
Издательство: Carolina Academic Press
Год: 2018
Формат: pdf
Кол-во страниц: 688
Размер: 10 мб

A Web-Based Introduction to Programming is designed for courses that teach introductory programming, or programming logic and design, and may also be of interest to anyone seeking a painless way to learn the basics of programming. The book keeps the focus on essential syntax and control structures with minimal complexity and consistent examples. Topics include: the nature of instructions; algorithm design; basic HTML and input forms; assignment statements; arithmetic expressions; string-processing operations; text file I/O; logical expressions; selection structures; loop structures; numerically indexed and associative arrays; Web sessions; functions; include files; database querying; and an introduction to object oriented programming. The final chapter and appendices provide additional topics and references to assist with ongoing development. A number of later chapters can be omitted to meet course requirements without effecting the overall course of study.