СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 215
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Dark Web Demystified: Into the Power of Anonymity
/ Комментариев: 0/

Название: Dark Web Demystified: Into the Power of Anonymity
Автор: Adarsh Nair, Greeshma M R
Издательство: Amazon.com Services LLC
Год: 2020
Формат: PDF, EPUB
Страниц: 77
Размер: 24,4 Mb
Язык: English

Online Anonymity is the concept where the identities of communicators are kept secret. Online privacy is more than just encrypting/decrypting data, where, the identities are also hidden. Dark Web is that part of the Internet, which achieves anonymity and security to the highest level. Requiring specialized access methodologies unlike the normal web, Dark Web is most popularly known as "Evil twin of the Internet,” as more than 57% of this space is filled with illegal content. Onion Routing is the protocol used for anonymous and secret communications over the Internet.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Teach Yourself Visually Quickbooks 2015
/ Комментариев: 0/

Название: Teach Yourself Visually Quickbooks 2015
Автор: Elaine Marmel
Издательство: Visual
Год: 2014
Формат: EPUB
Размер: 32 Мб
Язык: английский / English

The visual way to master QuickBooks 2015. If you learn better by seeing rather than wading through confusing text, then this visual guide is for you! Teach Yourself VISUALLY QuickBooks 2015 gives you hundreds of succinctly captioned, step-by-step screenshots that reveal how to master QuickBooks 2015 and get your business finances in working order.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Guide to Computer Network Security 5th edition
/ Комментариев: 0/

Название: Guide to Computer Network Security (Texts in Computer Science) Fifth edition
Автор: Joseph Migga Kizza
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 599
Размер: 11 Mb
Язык: English

This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Web and Network Data Science: Modeling Techniques in Predictive Analytics
/ Комментариев: 0/

Название: Web and Network Data Science: Modeling Techniques in Predictive Analytics
Автор: Thomas W. Miller
Издательство: Pearson
Год: 2014
Формат: EPUB
Размер: 39 Мб
Язык: английский / English

Master modern web and network data modeling: both theory and applications. In Web and Network Data Science, a top faculty member of Northwestern University’s prestigious analytics program presents the first fully-integrated treatment of both the business and academic elements of web and network modeling for predictive analytics.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Statistical Analysis of Network Data with R, Second Edition
/ Комментариев: 0/

Statistical Analysis of Network Data with R, Second EditionНазвание: Statistical Analysis of Network Data with R, Second Edition
Автор: Eric D. Kolaczyk, Gabor Csardi
Издательство: Springer
Серия: Use R!
Год: 2020
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security from Zero
/ Комментариев: 0/

Security from ZeroНазвание: Security from Zero: A Practical Guide to Security for Busy People (Revision 7)
Автор: Eric Higgins
Издательство: Fullstack.io
Год: 2020-04-17
Формат: true pdf/epub/mobi
Страниц: 131
Размер: 10 Mb
Язык: English

Security from Zero is the busy person's guide to running a security program.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Metasploit: The Penetration Tester's Guide
/ Комментариев: 1/

Название: Metasploit: The Penetration Tester's Guide
Автор: David Kennedy, Jim O'gorman, Devon Kearns, Mati Aharoni
Издательство: No Starch Press
Год: 2011
Формат: PDF
Страниц: 328
Для сайта: mirlib.ru
Размер: 4.1 Mb
Язык: English

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
/ Комментариев: 0/

Название: A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
Автор: Richard Medlin
Издательство: Information Warfare Center
Год: 2020
Формат: PDF
Страниц: 202
Размер: 22,6 Mb
Язык: English

Have you ever found yourself questioning whether your network is in good hands? Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you’re new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you don’t know where to start. If you have ever asked yourself any of these questions


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Big Data and Networks Technologies
/ Комментариев: 0/

Название: Big Data and Networks Technologies (Lecture Notes in Networks and Systems 81)
Автор: Farhaoui, Yousef (Editor)
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 380
Размер: 21 Mb
Язык: English

This book reviews the state of the art in big data analysis and networks technologies. It addresses a range of issues that pertain to: signal processing, probability models, machine learning, data mining, databases, data engineering, pattern recognition, visualization, predictive analytics, data warehousing, data compression, computer programming, smart cities, networks technologies, etc.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cyber Threat Intelligence for the Internet of Things
/ Комментариев: 0/

Cyber Threat Intelligence for the Internet of ThingsНазвание: Cyber Threat Intelligence for the Internet of Things
Автор: Elias Bou-Harb, Nataliia Neshenko
Издательство: Springer
Год: 2020
Страниц: 99
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security.