Компьютеры: прочее - скачать книги или читать онлайн. Страница 34

Купить книгу DOOM - возвращение Кибердемона, автора Дмитрия Пучкова
Аудиокнига
DOOM - возвращение Кибердемона
Купить книгу Студия Remedy и разработка Quantum Break, автора Дмитрия Пучкова
Аудиокнига
Студия Remedy и разработка Quantum Break
Купить книгу PlayStation VR, Paris Games Week, Just Cause 3 и атака титанов-дебилов, автора Дмитрия Пучкова
Аудиокнига
PlayStation VR, Paris Games Week, Just Cause 3 и атака титанов-дебилов
Купить книгу Ведьмак 3: Каменные сердца, автора Дмитрия Пучкова
Аудиокнига
Ведьмак 3: Каменные сердца
Купить книгу Российский игропром, CryEngine 3 и Panzar, автора Дмитрия Пучкова
Аудиокнига
Российский игропром, CryEngine 3 и Panzar
Купить книгу The Last of Us 2, командировка в Лондон, тест PS4 PRO и Gran Turismo Sport в 4k, автора Дмитрия Пучкова
Аудиокнига
The Last of Us 2, командировка в Лондон, тест PS4 PRO и Gran Turismo Sport в 4k
Купить книгу Сила бренда Биткоина. Или Эпоха Форков, автора Руслана Акста
Аудиокнига
Сила бренда Биткоина. Или Эпоха Форков
В своей очередной книге из серии «Популярно о криптовалютах» автор приоткрывает секреты силы бренда биткоина. Прочитав книгу,
Купить книгу Как зарабатывать на биткоинах. Инструкция. Быстрый заработок криптовалюты без вложений, автора Алекса Марона
Электр. книга
Как зарабатывать на биткоинах. Инструкция. Быстрый заработок криптовалюты без вложений
Первые цифровые деньги появились в 2008 году. Крах биткоина безрезультатно прочат с 2011 года, однако он все растет из года в год. Один из активных исследователей феномена этой виртуальной валюты Хоэль Лопес Барата математически рассчитал возможную стоимость биткоина на конец 2018 года. Расхождения в оценке его предсказаний смущают – цена криптовалюты, возможно, составит от 13,200 $ до 271,277 $.
Купить книгу Network Security Foundations. Technology Fundamentals for IT Success, автора Matthew  Strebe
Pdf-книга
Network Security Foundations. Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Why and how hackers do what they do How encryption and authentication work How firewalls work Understanding Virtual Private Networks (VPNs) Risks posed by remote access Setting up protection against viruses, worms, and spyware Securing Windows computers Securing UNIX and Linux computers Securing Web and email servers Detecting attempts by hackers
Купить книгу Unauthorised Access. Physical Penetration Testing For IT Security Teams, автора Wil  Allsopp
Pdf-книга
Unauthorised Access. Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security. Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data. Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
Купить книгу The SSCP Prep Guide. Mastering the Seven Key Areas of System Security, автора
Pdf-книга
The SSCP Prep Guide. Mastering the Seven Key Areas of System Security
SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create Organized exactly like the bestselling The CISSP Prep Guide (0-471-41356-9) by Ronald L. Krutz and Russell Dean Vines, who serve as consulting editors for this book This study guide greatly enhances the reader's understanding of how to implement security policies, standards, and procedures in order to breeze through the SSCP security certification test CD-ROM contains a complete interactive self-test using all the questions and answers from the book, powered by the Boson test engine
Купить книгу Hack Attacks Testing. How to Conduct Your Own Security Audit, автора John  Chirillo
Pdf-книга
Hack Attacks Testing. How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits. Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as: Building a multisystem Tiger Box Basic Windows 2000 Server installation and configuration for auditing Basic Linux and Solaris installation and configuration Basic Mac OS X installation and configuration for auditing ISS, CyberCop, Nessus, SAINT, and STAT scanners Using security analysis tools for Mac OS X Vulnerability assessment Bonus CD! The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.