СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 355
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Data Protection and Privacy: The Age of Intelligent Machines
/ Комментариев: 0/


Название: Data Protection and Privacy: The Age of Intelligent Machines
Автор: Edited by Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth & Paul De Hert
Издательство: Hart Publishing
Год: 2017
ISBN: 978-1-50991-935-2
Формат: PDF
Страниц: 255
Размер: 12,72 МБ
Язык: English

The subjects of Privacy and Data Protection are more relevant than ever with the European General Data Protection Regulation (GDPR) becoming enforceable in May 2018.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Pro Salesforce Analytics Cloud: A Guide to Wave Platform, Builder, and Explorer
/ Комментариев: 0/


Название: Pro Salesforce Analytics Cloud: A Guide to Wave Platform, Builder, and Explorer
Автор: William Smith, Helen Sun
Издательство: Apress
Год: 2016
Формат: PDF
Страниц: 168
Размер: 17,9 МБ
Язык: English

In this age of data economy, data analytics is recognized as a key differentiator for companies trying to gain a sustainable competitive advantage and outperform their peers. However, the complexity of establishing an analytical architecture due to a wide array of disparate technical capabilities offered by a plethora of vendors makes the deployment of an on-premise solution a daunting task. For this reason, the Salesforce Analytics Cloud has captured the imagination from of both IT and business communities.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Основы информационной безопасности при работе на компьютере
/ Комментариев: 0/


Название: Основы информационной безопасности при работе на компьютере
Автор: Фаронов А.Е.
Издательство: М.: НОУ "Интуит"
Год: 2016
Страниц: 154
Формат: PDF
Размер: 15 Мб
Язык: русский

Курс является первой ступенькой в обучении правильного обеспечения безопасности персональных данных. Благодаря курсу читатель узнает общие понятия в области защиты персональных данных, а также познакомится с самими методами защиты. После прохождения курса читатель сможет защитить свои персональные данные от злоумышленников.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Public Health Intelligence and the Internet
/ Комментариев: 0/


Автор: Arash Shaban-Nejad, John S. Brownstein, David L. Buckeridge
Название: Public Health Intelligence and the Internet
Издательство: Springer
Год: 2017
Серия: Lecture Notes in Social Networks
ISBN: 331968602X
Язык: English
Формат: pdf
Размер: 11,1 mb
Страниц: 148

This book aims to highlight the latest achievements in epidemiological surveillance and internet interventions based on monitoring online communications and interactions on the web.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CCNP ISCW Official Exam Certification Guide
/ Комментариев: 0/

Название: CCNP ISCW Official Exam Certification Guide
Автор: Brian Morgan, Neil Lovering
Издательство: Cisco Press
Год: 2007
ISBN: 9781587201509
Формат: pdf
Страниц: 696
Размер: 18,5 mb
Язык: English

CCNP ISCW Official Exam Certification Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the Implementing Secure Converged Wide Area Networks exam (642-825 ISCW). Successfully passing the ISCW 642-825 exam certifies that you have the knowledge and skills necessary to secure and expand the reach of an enterprise network to teleworkers and remote sites with focus on securing remote access and VPN client configuration.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Containers in OpenStack: Leverage OpenStack services to make the most of Docker, Kubernetes and Mesos
/ Комментариев: 0/

Название: Containers in OpenStack: Leverage OpenStack services to make the most of Docker, Kubernetes and Mesos
Автор: Pradeep Kumar Singh, Madhuri Kumari
Издательство: Packt Publishing
ISBN: 1788394380
Год: 2017
Страниц: 176
Язык: английский
Формат: epub, mobi, azw3, pdf (conv)
Размер: 10.1 MB

A practical book which will help the readers understand how the container ecosystem and OpenStack work together. Containers are one of the most talked about technologies of recent times. They have become increasingly popular as they are changing the way we develop, deploy, and run software applications. OpenStack gets tremendous traction as it is used by many organizations across the globe and as containers gain in popularity and become complex, it's necessary for OpenStack to provide various infrastructure resources for containers, such as compute, network, and storage.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Kali Linux Wireless Penetration Testing Cookbook
/ Комментариев: 0/

Название: Kali Linux Wireless Penetration Testing Cookbook
Автор: Sean-Philip Oriyano
Издательство: Packt Publishing
ISBN: 1783554088
Год: 2017
Страниц: 216
Язык: английский
Формат: epub, pdf (conv)
Размер: 10.17 MB

Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes. More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Mastering Proxmox: Build virtualized environments using the Proxmox VE hypervisor, Third Edition
/ Комментариев: 0/

Название: Mastering Proxmox: Build virtualized environments using the Proxmox VE hypervisor, Third Edition
Автор: Wasim Ahmed
Издательство: Packt Publishing
ISBN: 1788397606
Год: 2017
Страниц: 494
Язык: английский
Формат: epub
Размер: 11.9 MB

Discover real world scenarios for Proxmox troubleshooting and become an expert cloud builder. Proxmox is an open source server virtualization solution that has enterprise-class features for managing virtual machines, for storage, and to virtualize both Linux and Windows application workloads.
You'll begin with a refresher on the advanced installation features and the Proxmox GUI to familiarize yourself with the Proxmox VE hypervisor. Then, you'll move on to explore Proxmox under the hood, focusing on storage systems, such as Ceph, used with Proxmox. Moving on, you'll learn to manage KVM virtual machines, deploy Linux containers fast, and see how networking is handled in Proxmox.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition
/ Комментариев: 0/

Название: Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition
Автор: Cameron Buchanan, Vivek Ramachandran
Издательство: Packt Publishing
ISBN: 1788831926
Год: 2017
Страниц: 210
Язык: английский
Формат: epub
Размер: 11.8 MB

Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Wireshark Revealed: Essential Skills for IT Professionals
/ Комментариев: 0/

Название: Wireshark Revealed: Essential Skills for IT Professionals
Автор: James H Baxter, Yoram Orzach
Издательство: Packt Publishing
ISBN: 1788833228
Год: 2017
Страниц: 912
Язык: английский
Формат: epub
Размер: 47.8 MB

Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to troubleshoot network problems. This Learning Path starts off installing Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. You will then discover different ways to create and use capture and display filters. By halfway through the book, you'll be mastering Wireshark features, analyzing different layers of the network protocol, and looking for any anomalies.We then start Ethernet and LAN switching, through IP, and then move on to TCP/UDP with a focus on TCP performance problems.