TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Информационная безопасность

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Chevrolet Tahoe / GMC Yukon с 2022 года, руководство по ремонту и эксплуатации в электронном виде (на английском языке)
Chevrolet Tahoe / GMC Yukon с 2022 года, руководство по ремонту и эксплуатации в электронном виде (на английском языке)
 
 
 Информационная безопасность
    Наименование 
 The Death of the Internet
242954
 The Death of the Internet

 Автор: Markus Jakobsson

  Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and relat
...
 Information Security. Principles and Practice
241725
 Information Security. Principles and Practice

 Автор: Mark Stamp

  Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information S
...
 IP Address Management Principles and Practice
241604
 IP Address Management Principles and Practice

 Автор: Timothy Rooney

  This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS config
...


 Public Key Cryptography. Applications and Attacks
240570
 Public Key Cryptography. Applications and Attacks

 Автор: Lynn Batten Margaret

  Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mat
...
 Информационная безопасность
231358
 Информационная безопасность

 Автор: Т. Ю. Васильева
 Год: 2017

  Представлены основные положения, понятия и определения обеспечения информационной безопасности (ИБ) деятельности общества, его различных структурных образований, организационно-правового, технического, методического, программно-аппаратного сопровождения. Особое внимание уделено проблемам методологического обеспечения деятельности как общества, так и конкретных систем (ОС, СУБД, вычислительных сетей), функционирующих в организациях и фирмах. На
...
 Network Security Foundations. Technology Fundamentals for IT Success
227510
 Network Security Foundations. Technology Fundamentals for IT Success

 Автор: Matthew Strebe

  The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about th
...
 Unauthorised Access. Physical Penetration Testing For IT Security Teams
227474
 Unauthorised Access. Physical Penetration Testing For IT Security Teams

 Автор: Wil Allsopp

  The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly
...
 Hack Attacks Testing. How to Conduct Your Own Security Audit
227424
 Hack Attacks Testing. How to Conduct Your Own Security Audit

 Автор: John Chirillo

  Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security exper
...
 Malicious Cryptography. Exposing Cryptovirology
227402
 Malicious Cryptography. Exposing Cryptovirology

 Автор: Adam Young

  Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will take you inside
...
Показано 172 - 180 (всего 423 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
11 12 13 14 15 16 17 18 19 20
Вход 
Если Вы забыли пароль, щелкните здесь





Вы новый клиент?
Зарегистрируйтесь
 
Отзывы 
Транзисторный радиоприемник «Минск-62»
Классно, когда можно найти такие старые книги!!! там все нап ..
5 из 5 звёзд!
 Информация 
Свяжитесь с нами
Как скачать и чем читать
  Quiero dinero © 2007