СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 412
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Тестирование на проникновение с помощью Kali Linux 2.0
/ Комментариев: 0/


Название: Тестирование на проникновение с помощью Kali Linux 2.0
Автор: Милосердов А.В., Гриднев Д.А.
Издательство: WebWare
Год: 2015
Страниц: 348
ISBN: 5-00-005462-8
Формат: PDF
Размер: 25 Мб
Язык: русский

Kali Linux является передовым Linux дистрибутивом для проведения тестирования на проникновение и аудита безопасности. Информация в данной книге предназначена для ознакомления или тестирования на проникновение собственных сетей. Для тестирования сетей третьих лиц, получите письменное разрешение.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Metasploit Revealed: Secrets of the Expert Pentester
/ Комментариев: 0/

Metasploit Revealed: Secrets of the Expert PentesterНазвание: Metasploit Revealed: Secrets of the Expert Pentester
Автор: Sagar Rahalkar, Nipun Jaswal
Издательство: Packt Publishing
ISBN: 9781788624596
Год: 2017
Страниц: 860
Язык: английский
Формат: True PDF
Размер: 51.95 MB

Exploit the secrets of Metasploit to master the art of penetration testing. Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities. This learning path will begin by introducing you to Metasploit and its functionalities. You will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components and get hands-on experience with carrying out client-side attacks. In the next part of this learning path, you’ll develop the ability to perform testing on various services such as SCADA, databases, IoT, mobile, tablets, and many more services.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Internet. Путешествие по всемирной компьютерной сети
/ Комментариев: 0/


Название: Internet. Путешествие по всемирной компьютерной сети
Автор: Х.Хафкемейер
Издательство: Слово
Год: 2001
Формат: pdf
Страниц: 65
Размер: 18 Mb
Язык: Русский

Эта книга из серии: Что есть что расскажет вам о том, как устроена всемирная компьютерная сеть, как она зародилась и развивалась и каковы ее возможности в настоящий момент. Читая эту книгу, вы сможете заглянуть и в будущее. Несколько лет назад мы и не представляли себе, что интернет ворвется в нашу действительность и станет неотъемлемой ее частью.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Information Security Handbook
/ Комментариев: 0/

Information Security HandbookНазвание: Information Security Handbook
Автор: Darren Death
Издательство: Packt Publishing
ISBN: 1788478835
Год: 2017
Страниц: 421
Язык: английский
Формат: epub, pdf
Размер: 10.8 MB

Implement information security effectively as per your organization’s needs. Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Business Data Communications and Networking 12th Edition
/ Комментариев: 0/


Название: Business Data Communications and Networking 12th Edition
Автор: Jerry FitzGerald,? Alan Dennis,? Alexandra Durcikova
Издательство: Wiley
Год: 2014
Страниц: 416
Формат: True PDF
Размер: 38 Mb
Язык: English

Updated with the latest advances in the field, Jerry FitzGerald, Alan Dennis, and Alexandra Durcikova's 12th Edition of Business Data Communications and Networking, continues to provide the fundamental concepts and cutting-edge coverage of applications that students need to succeed in their careers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Communication Networks: A Concise Introduction, 2nd Edition
/ Комментариев: 0/


Название: Communication Networks: A Concise Introduction, 2nd Edition
Автор: Jean Walrand, Shyam Parekh
Издательство: Morgan & Claypool Publishers
Год: 2017
Страниц: 242
Формат: True PDF
Размер: 10 Mb
Язык: English

This book results from many years of teaching an upper division course on communication networks in the EECS department at the University of California, Berkeley. It is motivated by the perceived need for an easily accessible textbook that puts emphasis on the core concepts behind current and next generation networks. After an overview of how today's Internet works and a discussion of the main principles behind its architecture, we discuss the key ideas behind Ethernet, WiFi networks, routing, internetworking, and TCP.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks
/ Комментариев: 0/


Название: Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks
Автор: Russ White, Ethan Banks
Издательство: Addison-Wesley Professional
Год: 2018
Страниц: 500
Формат: True PDF
Размер: 10 Mb
Язык: English

Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. This guide’s problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions to those problems, and providing examples of these solutions as they’ve been implemented in protocols both old and new.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Film and Video Production in the Cloud: Concepts, Workflows, and Best Practices
/ Комментариев: 0/

Название: Film and Video Production in the Cloud: Concepts, Workflows, and Best Practices
Автор: Jack James
Издательство: Focal Press
Год: 2016
Формат: AZW3, EPUB, PDF
Размер: 5 Мб
Язык: английский / English

With cloud applications and services now widely available, film and video professionals have all the tools they need to work together on centralized platforms and effectively collaborate across separate desktop, web, and mobile devices. In Film and Video Production in the Cloud, veteran video production consultant Jack James provides a practical guide to cloud processes, concepts, and workflows as they relate to the most widely used cloud applications in the industry.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Network Function Virtualization: Concepts and Applicability in 5G Networks
/ Комментариев: 0/

Network Function Virtualization: Concepts and Applicability in 5G NetworksНазвание: Network Function Virtualization: Concepts and Applicability in 5G Networks
Автор: Ying Zhang
Издательство: Wiley-IEEE Press
ISBN: 1119390605
Год: 2017
Страниц: 192
Язык: английский
Формат: pdf, djvu
Размер: 10.56 MB

A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality
This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
/ Комментариев: 0/


Название: Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Автор: Morey J. Haber,? Brad Hibbert
Издательство: Apress
Год: 2018
Страниц: 247
Формат: PDF, EPUB
Размер: 10 Mb
Язык: English

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.