СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 352
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Encyclopedia of multimedia technology and networking
/ Комментариев: 0/


Название: Encyclopedia of multimedia technology and networking
Автор: Margherita Pagani, editor
Издательство: Idea Group Inc.
Год: 2005
Формат: PDF
Страниц: 1167
Размер: 20,45 МБ
Язык: English

The Encyclopedia of Multimedia Technology and Networking captures a vast array of the components and dimensions of this dynamic sector of the world economy. Professor Margherita Pagani and her editorial board have done a remarkable job at compiling such a rich collection of perspectives on this fast moving domain. The encyclopaedia’s scope and content will provide scholars, researchers and professionals with much current information about concepts, issues, trends and technologies in this rapid evolving industrial sector.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Многоканальные телекоммуникационные системы (2013)
/ Комментариев: 0/


Название: Многоканальные телекоммуникационные системы
Автор: Гордиенко В.Н., Тверецкий М.С.
Издательство: Горячая линия-Телеком
Год: 2013
Страниц: 396
ISBN: 978-5-9912-0251-0
Формат: PDF
Размер: 101 Мб
Язык: русский

Изложены базовые принципы построения цифровых многоканальных телекоммуникационных систем, рассмотрены особенности работы оборудования цифровых систем передачи плезиохронной и синхронной цифровой иерархий. Рассмотрены вопросы нормирования качества передачи информации по цифровым каналам и трактам, а также особенности применения цифровых систем передачи на современных и перспективных телекоммуникационных сетях, ориентированных на использование волоконно-оптических линий связи.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Practical Intrusion Analysis: prevention and detection for the twenty-first century
/ Комментариев: 0/


Название: Practical Intrusion Analysis: prevention and detection for the twenty-first century
Автор: Ryan Trost
Издательство: Pearson Education, Inc.
Год: 2010
Формат: PDF
Страниц: 480
Размер: 13,93 МБ
Язык: English

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Metasploit Penetration Testing Cookbook, Third Edition
/ Комментариев: 0/

Название: Metasploit Penetration Testing Cookbook, Third Edition
Автор: Daniel Teixeira
Издательство: Packt Publishing
ISBN: 1788623177
Год: 2018
Страниц: 426
Язык: английский
Формат: epub
Размер: 12.0 MB

Over 100 recipes for penetration testing using Metasploit and virtual machines. Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ansible 2 Cloud Automation Cookbook
/ Комментариев: 0/

Название: Ansible 2 Cloud Automation Cookbook
Автор: Aditya Patawari and Vikas Aggarwal
Издательство: Packt Publishing
Год: 2018
Формат: EPUB
Размер: 1 Мб
Язык: английский / English

Ansible has a large collection of inbuilt modules to manage various cloud resources. The book begins with the concepts needed to safeguard your credentials and explain how you interact with cloud providers to manage resources. Each chapter begins with an introduction and prerequisites to use the right modules to manage a given cloud provider. Learn about Amazon Web Services, Google Cloud, Microsoft Azure, and other providers. Each chapter shows you how to create basic computing resources, which you can then use to deploy an application. Finally, you will be able to deploy a sample application to demonstrate various usage patterns and utilities of resources.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Implementing Azure Cloud Design Patterns
/ Комментариев: 0/

Название: Implementing Azure Cloud Design Patterns
Автор: Oliver Michalski, Stefano Demiliani
Издательство: Packt Publishing
ISBN: 1788393368
Год: 2018
Страниц: 300
Язык: английский
Формат: epub, pdf (conv)
Размер: 12.56 MB

A hands-on guide to mastering Azure cloud design patterns and best practices. A well designed cloud infrastructure covers factors such as consistency, maintenance, simplified administration and development, and reusability. Hence it is important to choose the right architectural pattern as it has a huge impact on the quality of cloud-hosted services. This book covers all Azure design patterns and functionalities to help you build your cloud infrastructure so it fits your system requirements.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Extending OpenStack: Leverage extended OpenStack projects to implement containerization, deployment, and architecting robust cloud solutions
/ Комментариев: 0/

Название: Extending OpenStack: Leverage extended OpenStack projects to implement containerization, deployment, and architecting robust cloud solutions
Автор: Omar Khedher
Издательство: Packt Publishing
ISBN: 1786465531
Год: 2018
Страниц: 300
Язык: английский
Формат: epub, pdf (conv)
Размер: 12.4 MB

Discover new opportunities to empower your private cloud by making the most of the OpenStack universe.
OpenStack is a very popular cloud computing platform that has enabled several organizations during the last few years to successfully implement their Infrastructure as a Service (IaaS) platforms. This book will guide you through new features of the latest OpenStack releases and how to bring them into production straightaway in an agile way.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition
/ Комментариев: 0/


Название: Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition
Автор: Joel Scambray, Vincent Liu, Caleb Sima
Издательство: McGraw Hill Professional
Год: 2011
Формат: PDF
Страниц: 481
Размер: 11,83 МБ
Язык: English

The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacking Exposed Wireless, Second Edition
/ Комментариев: 0/


Название: Hacking Exposed Wireless
Автор: Johnny Cache, Joshua Wright, Vincent Liu
Издательство: McGraw Hill
Год: 2010
Формат: PDF
Страниц: 513
Размер: 11,24 МБ
Язык: English

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacking Exposed 6: Network Security Secrets & Solutions, 10th Annyversary Edition
/ Комментариев: 0/


Название: Hacking Exposed 6: Network Security Secrets & Solutions
Автор: Stuart McClure, Joel Scambray, George Kurtz
Издательство: McGraw-Hill
Год: 2009
Формат: PDF
Страниц: 720
Размер: 15,8 МБ
Язык: English

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.