Зарегистрироваться
Восстановить пароль
FAQ по входу

Кибербезопасность и киберпреступления

Требуется помощь в преобразовании раздела Информатика и вычислительная техника

Если Вы компетентны в тематике этого раздела, то Вас, возможно, заинтересует обсуждение планируемых преобразований.

Сборники и серии

Учебно-методические материалы

Доверенные пользователи и модераторы раздела

Активные пользователи раздела

Packt Publishing, 2017. — 456 p. — ISBN 1788395158. With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security...
  • №1
  • 13,67 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 412 p. — ISBN 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods...
  • №2
  • 11,60 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 412 p. — ISBN 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods...
  • №3
  • 5,01 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 412 p. — ISBN 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and methods...
  • №4
  • 17,37 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 412 p. — ISBN 978-1-78646-448-4. Master powerful strategies to acquire and analyze evidence from real-life scenarios. Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you’ll learn strategies and...
  • №5
  • 26,33 МБ
  • добавлен
  • изменен
Elsevier Inc., 2014. — 327 p. — ISBN 0128007435. Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security...
  • №6
  • 3,56 МБ
  • добавлен
  • изменен
Syngress Publishing, Inc., 2005. — 450 p. It is a third part in the Stealing the Network series. This book and the Stealing the Network series provide great insight into the cyber criminal’s world.The book offers a snapshot of what goes on in the minds of cyber criminals who commit these types of crimes. It also offers an opportunity to understand the methodology behind hacking....
  • №7
  • 12,06 МБ
  • добавлен
  • изменен
CRC Press, 2015. — 426 p. — ISBN: 9781498700986 Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and...
  • №8
  • 19,41 МБ
  • добавлен
  • изменен
Springer, 2017. — 379 p. In spite of the increasing efforts in designing preventive security measures, new attack types arise on a regular basis. The reasons for these include: programming errors, design flaws, insider threats, and the inadequate security tools being used by organizations. Additionally, attackers keep evolving attack strategies, resulting in new attack...
  • №9
  • 4,36 МБ
  • добавлен
  • изменен
Syngress, 2011 — 288 p. Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are...
  • №10
  • 4,38 МБ
  • добавлен
  • изменен
Independently published, 2017. — 94 p. — ISBN 10 1522074945, ISBN 13 978-1522074946. Preview ebook Most introductory books on cyber security are either too technical for popular readers, or too casual for professional ones. This book, in contrast, is intended to reside somewhere in the middle. That is, while concepts are explained in a friendly manner for any educated adult, the...
  • №11
  • 1,71 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 155 p. — ASIN B07GWSK35V. This book is totally about cybersecurity and hacking and this is mainly for Entrepreneurs and normal citizens. You can learn to become a hacker and also things about cybersecurity. In today's date hacking cases and cyber threats are increasing rapidly but people don't know how to save themselves from cyber crimes and...
  • №12
  • 5,46 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 310 p. — ASIN B07GWSK35V. This book is totally about cybersecurity and hacking and this is mainly for Entrepreneurs and normal citizens. You can learn to become a hacker and also things about cybersecurity. In today's date hacking cases and cyber threats are increasing rapidly but people don't know how to save themselves from cyber crimes and...
  • №13
  • 8,72 МБ
  • добавлен
  • изменен
Wrox Press, 2006, 546 p. There is no such thing as perfect security when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you’ll learn how to become an effective penetrator (i.e. , a white hat or ethical hacker) in order...
  • №14
  • 20,06 МБ
  • дата добавления неизвестна
  • изменен
Second edition. — Wiley, 2007. — 744 p. The definitive guide to unlocking the hidden potential of the Windows 7 OS This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that...
  • №15
  • 8,74 МБ
  • добавлен
  • изменен
Packt Publishing, 2015. — 292 p. — ISBN-13 978-1783988525. Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be...
  • №16
  • 12,94 МБ
  • добавлен
  • изменен
Lambert Academic Publishing, 2012. — 152 р. — ISBN 978-3659235559. This book explains about all the hacking tips regarding to online bank account hacking, stealing cookies and other online hacking features. It takes you to second level in hacking. Methods regarding to send fake emails and IP stealing and redirection are also given. To control others computer with the help of port...
  • №17
  • 7,61 МБ
  • добавлен
  • изменен
2e édition mise à jour. — Presses Universitaires de France, 2015. — 128 p. — (Collection « Que sais-je ? ») Les technologies de l’information, et Internet en particulier, sont devenues des armes. Les États, les entreprises, les forces armées, les activistes et même les particuliers puisent désormais dans cet arsenal pour capter des informations ou de l’argent, diffuser des rumeurs...
  • №18
  • 43,10 МБ
  • добавлен
  • изменен
Forefront Books, 2019. — 192 p. — ISBN 1948677083. Cybercrimes are a threat and as dangerous as an armed intruder—yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It's 2 a.m.—do you know who your child is online with? According to author...
  • №19
  • 1,19 МБ
  • добавлен
  • изменен
Apress, 2016. — 177 p. — ISBN-10 1484220641, ISBN-13 978-1-4842-2064-1. This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the...
  • №20
  • 7,68 МБ
  • добавлен
  • изменен
Apress, 2016. — 147 p. — ISBN1484221540. — ISBN 978-1484221549. This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. A cyber-physical attack on building equipment pales in...
  • №21
  • 8,09 МБ
  • добавлен
  • изменен
Apress, 2016. — 192 p. — ISBN-10: 1484220676. — ISBN-13: 978-1484220672 This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building...
  • №22
  • 1,34 МБ
  • добавлен
  • изменен
The Institution of Engineering and Technology, 2016. — 279 p. — (IET Security Series 2). — ISBN 978-1-78561-053-0. The Internet of Things (IoT) - the emerging global interconnection of billions of 'smart' devices - will be collecting increasing amounts of private and sensitive data about our lives, and will require increasing degrees of reliability and trustworthiness in terms of...
  • №23
  • 13,77 МБ
  • добавлен
  • изменен
Springer Science & Business Media, 2011. — 157 p. This book contains a selection of thoroughly refereed and revised papers from the Second International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2010, held October 4-6, 2010 in Abu Dhabi, United Arab Emirates. The field of digital forensics is becoming increasingly important for law enforcement, network security,...
  • №24
  • 4,59 МБ
  • добавлен
  • изменен
Que Publishing, 2011. - 312 pages ISBN: 0789748975 Join today’s new revolution in creativity and community: hackerspaces. Stop letting other people build everything for you: Do it yourself. Explore, grab the tools, get hands-on, get dirty…and create things you never imagined you could. Hack This is your glorious, full-color passport to the world of hackerspaces: your...
  • №25
  • 33,35 МБ
  • добавлен
  • изменен
Taylor & Francis Group, LLC: CRC Press, 2015. — 523 p. Ethical hacking strikes all of us as a subject that requires a great deal of prerequisite knowledge about things like heavy duty software, languages that includes hordes of syntaxes, algorithms that could be generated by maestros only. Well that’s not the case, to some extent. This book introduces the steps required to...
  • №26
  • 22,44 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2013., - 248 p., ISBN: 1597499501 Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to...
  • №27
  • 19,67 МБ
  • добавлен
  • изменен
Wiley, 2012. — 315 p. — ISBN 1118027809, 9781118027806, 9781118241530, 9781118241325. Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current...
  • №28
  • 10,10 МБ
  • добавлен
  • изменен
Hoboken: Wiley, 2017. - 380 p. Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any...
  • №29
  • 8,06 МБ
  • добавлен
  • изменен
Wiley, 2010. — 74 p. A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them! It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even...
  • №30
  • 1,26 МБ
  • добавлен
  • изменен
Wiley Publishing, Inc., 2005. — 362 p. — ISBN: 978-0-7645-9730-5. Hacking Wireless Networks For Dummies is inspired by the original Hacking For Dummies book that Kevin authored and Peter performed the technical editing. Hacking For Dummies covered a broad range of security testing topics, but this book focuses specifically on 802.11-based wireless networks. The techniques we...
  • №31
  • 10,97 МБ
  • добавлен
  • изменен
Wiley, 2018. — 416 p. Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical...
  • №32
  • 4,18 МБ
  • добавлен
  • изменен
6th Ed. — John Wiley & Sons, Inc., 2018. — 640 p. — (For Dummies). — ISBN 978-1119485476. Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing,...
  • №33
  • 8,89 МБ
  • добавлен
  • изменен
Wiley, 2018. — 416 p. Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical...
  • №34
  • 11,26 МБ
  • добавлен
  • изменен
Wiley Publishing, Inc., 2013, 411 pp., ISBN: 9781118380932, Eng., PDF 4th Edition: Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide...
  • №35
  • 32,60 МБ
  • добавлен
  • изменен
This book outlines —in plain English — computer hacker tricks and techniques that you can use to assess the security of your information systems, find the security vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious users take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I call...
  • №36
  • 8,51 МБ
  • дата добавления неизвестна
  • изменен
2nd Edition. — Packt Publishing, 2016. — 337 p. — ISBN 978-1-78712-613-8 We will be leveraging the latest credit-card sized Raspberry Pi 3 and teach you how to create a portable, low cost hacking tool using Kali Linux 2. ook will start with installing and tuning Kali Linux 2 on Raspberry Pi 3 so that you can get started with penetration testing. You will be exposed to various...
  • №37
  • 28,01 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 258 p. — ISBN-13 9781787288744. Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to...
  • №38
  • 105,92 КБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 258 p. — ISBN-13 9781787288744. Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to...
  • №39
  • 50,45 КБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 253 p. — ISBN 10 1787288749, ISBN 13 978-1787288744. Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will...
  • №40
  • 22,81 МБ
  • добавлен
  • изменен
Apress, 2017. — 105 p. — ISBN 978-1-4842-2606-3. Make your PCs as secure as possible. Limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. Whatever version of Windows you’re using, the threat of virus and malware infection is always a common danger. From key loggers and Trojans, intent on stealing passwords...
  • №41
  • 4,06 МБ
  • добавлен
  • изменен
Sybex, 2016 - 192p. - ISBN: 978-1119252153. CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These tests...
  • №42
  • 3,27 МБ
  • добавлен
  • изменен
Sybex, 2016. — 192 p. — ISBN: 978-1119252153. TRUE PDF CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence—and skills—you need to pass. These...
  • №43
  • 24,73 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 372 p. — ISBN 978-1-78588-710-9. Get started with the art and science of digital forensics with this practical, hands-on guide! Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing...
  • №44
  • 13,18 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2017. — 522 p. — (Hacking Exposed). — ISBN 978-1-25-958971-3 This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step,...
  • №45
  • 38,28 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2016. — 744 p. — (Hacking Exposed). — ISBN 10 1259589714. — ISBN 13 978-1259589713. This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and...
  • №46
  • 19,05 МБ
  • добавлен
  • изменен
McGraw-Hill Education, 2016. — 455 p. — (Hacking Exposed). — ISBN 10 1259589714. — ISBN 13 978-1259589713. This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and...
  • №47
  • 19,12 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2011., - 304 pages, ISBN: 1597496235 Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the...
  • №48
  • 21,07 МБ
  • добавлен
  • изменен
University of Georgia Press, 2016. — 241 p. — ISBN-10: 0820349208. — ISBN-13: 978-0820349206. — Studies in Security and International Affairs Ser Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic...
  • №49
  • 3,63 МБ
  • добавлен
  • изменен
University of Georgia Press, 2016. — 240 p. — ISBN-10: 0820349208. — ISBN-13: 978-0820349206. — Studies in Security and International Affairs Ser Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic...
  • №50
  • 3,39 МБ
  • добавлен
  • изменен
University of Georgia Press, 2016. — 218 p. — ISBN-10: 0820349208. — ISBN-13: 978-0820349206. — Studies in Security and International Affairs Ser Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic...
  • №51
  • 5,45 МБ
  • добавлен
  • изменен
Bright Peter. How security flaws work: SQL injection. Arstechnica.com, 2016. — 9 p. Простое объяснение сущности SQL-инъекции (компьютерной сетевой атаки на веб-приложение с помощью специально сконструированных SQL-выражений) и способов защиты от этого типа атаки. Разработка сопровождается видеороликом на английском языке. This easily avoidable mistake continues to put our...
  • №52
  • 51,02 МБ
  • добавлен
  • изменен
Arstechnica.com, 2015. — 22 p. Доступное объяснение сущности переполнения буфера (одной из наиболее широко распространённых уязвимостей программного обеспечения) и способов защиты от этой проблемы. Разработка сопровождается видеороликом на английском языке. Starting with the 1988 Morris Worm, this flaw has bitten everyone from Linux to Windows. The buffer overflow has long...
  • №53
  • 133,92 МБ
  • добавлен
  • изменен
Wiley - Extreme Tech., 2006, - 401 pages. This book is aimed at both amateur and professional programmers who want to make use of either Google Maps or Google Earth in their own applications. To get the best out of this book, you should have some basic programming experience and ideally be familiar with HTML and JavaScript. It would also be beneficial to have experience with...
  • №54
  • 11,28 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 57 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature in...
  • №55
  • 155,16 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 57 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature in...
  • №56
  • 400,44 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 45 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature in...
  • №57
  • 151,42 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 30 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature in...
  • №58
  • 145,66 КБ
  • добавлен
  • изменен
Massachusetts, Press Cambridge, 2015. — 107 p. — ISBN: 0262029731, 978-0-262-33132-6 With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance. C the collection of our data by governments, corporations, advertisers, and hackers....
  • №59
  • 159,09 КБ
  • добавлен
  • изменен
Auerbach Publications, 2011. — 502 p. Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network...
  • №60
  • 17,97 МБ
  • добавлен
  • изменен
Packt Publishing - ebooks Account, 2014. — 115 p. — ISBN-10: 1783559020. — ISBN-13: 978-1783559022 Receive step-by-step guidance on conducting computer investigations Explore the functionality of FTK Imager and learn to use its features effectively Conduct increasingly challenging and more applicable digital investigations for generating effective evidence using the FTK...
  • №61
  • 15,14 МБ
  • добавлен
  • изменен
Addison-Wesley, 2005. — 632 p. The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques. Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has...
  • №62
  • 26,99 МБ
  • добавлен
  • изменен
Sold by: Amazon Digital Services LLC, 2016. — 9 p. — ASIN: B01CWG04L4 This article really outlines issues of security that have cost even lives as well as the loss of security because of vulnerabilities of the Internet. There are simple cost effective solutions that stop the hacks and the attacks. This article outlines the constant problems of Internet security that even the...
  • №63
  • 108,97 КБ
  • добавлен
  • изменен
Sold by: Amazon Digital Services LLC, 2016. — 8 p. — ASIN: B01CWG04L4 This article really outlines issues of security that have cost even lives as well as the loss of security because of vulnerabilities of the Internet. There are simple cost effective solutions that stop the hacks and the attacks. This article outlines the constant problems of Internet security that even the...
  • №64
  • 47,21 КБ
  • добавлен
  • изменен
Sold by: Amazon Digital Services LLC, 2016. — 10 p. — ASIN: B01CWG04L4 This article really outlines issues of security that have cost even lives as well as the loss of security because of vulnerabilities of the Internet. There are simple cost effective solutions that stop the hacks and the attacks. This article outlines the constant problems of Internet security that even the...
  • №65
  • 344,35 КБ
  • добавлен
  • изменен
U.S. Army War College Press, 2016. — 62 p. — ASIN: B01HUE9SHY The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were...
  • №66
  • 542,39 КБ
  • добавлен
  • изменен
U.S. Army War College Press, 2016. — 69 p. — ASIN: B01HUE9SHY The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were...
  • №67
  • 305,86 КБ
  • добавлен
  • изменен
U.S. Army War College Press, 2016. — 68 p. — ASIN: B01HUE9SHY The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were...
  • №68
  • 790,61 КБ
  • добавлен
  • изменен
Atlantic Monthly Press, 2018. — 164 p. — ISBN 10 0802127932, 13 978-0802127938. The most dangerous threat we-individually and as a society and country-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events...
  • №69
  • 2,20 МБ
  • добавлен
  • изменен
Издательство John Wiley, 2001, -837 pp. As the world becomes increasingly networked through the Internet, competitors, spies, disgruntled employees, bored teens, and hackers more frequently invade others’ computers to steal information, sabotage careers, and just to make trouble. Together, the Internet and the World Wide Web have opened a new backdoor through which a remote...
  • №70
  • 7,93 МБ
  • добавлен
  • изменен
Palgrave Macmillan, 2016. — 236 p. — ISBN 978-1-137-40052-9. Securing cyberspace has become one of the most pressing security challenges of the twenty-first century through its importance to everyday life for government, business and citizens alike. The cyber world and its associated technologies have, on the one hand, created many social, cultural, economic and political...
  • №71
  • 1,01 МБ
  • добавлен
  • изменен
Cambridge University Press, 2010. — 505 p. We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually...
  • №72
  • 1,92 МБ
  • добавлен
  • изменен
Princeton University Press, 2012. - 264 pages ISBN: 0691144613 , 0691144605 Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software-and to hacking as a technical, aesthetic, and moral project-reveal about the values of contemporary liberalism? Exploring the rise and political...
  • №73
  • 1,87 МБ
  • добавлен
  • изменен
2nd Edition. — CreateSpace Independent Publishing Platform, 2016. — 68 p. — (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security). — ISBN 978-1539860723 If you are aspiring to be a hacker, then you came to the right page! However, this book is for those who have good intentions, and who wants to learn the in’s and out of hacking....
  • №74
  • 1,21 МБ
  • добавлен
  • изменен
2nd Edition. — CreateSpace Independent Publishing Platform, 2016. — 68 p. — (Cyber Crime, Computer Hacking, How to Hack, Hacker, Computer Crime, Network Security, Software Security). — ISBN 978-1539860723 If you are aspiring to be a hacker, then you came to the right page! However, this book is for those who have good intentions, and who wants to learn the in’s and out of hacking....
  • №75
  • 190,64 КБ
  • добавлен
  • изменен
Syngress, 2005. — 356 p. — ISBN 1932266984. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the...
  • №76
  • 6,23 МБ
  • добавлен
  • изменен
Выходные данные неизвестны. Автор: Cybermaniac, 2011. — 39 с. За пять лет более или менее активного занятия крэкингом (а именно столько времени прошло с того знаменательного момента, как мне удалось впервые в жизни взломать программу) мне удалось выработать набор методов, позволяющих сравнительно быстро найти подход к большинству программ. Возьму на себя смелость утверждать,...
  • №77
  • 676,45 КБ
  • добавлен
  • изменен
Cyberpunk University, 2017. — 94 p. — ISBN 154279367X. What if you could learn how to stop attackers from hacking into your website or personal accounts. Imagine finding leaks inside large corporate companies and you can help them protecting their data (and make money). What if you had access to everything on the internet by leveraging your superior hacking skills? Sounds good?...
  • №78
  • 587,30 КБ
  • добавлен
  • изменен
Book 2011, Indianapolis, IN 46256, 878 p. Second Edition Contents Web Application security Core Defense Mechanisms Web Application Technologies Mapping the Application Bypassing Client-Side Controls Attacking Authentication Attacking Session Management Attacking Access Controls Attacking Data Stores Attacking Back-End Components Attacking Application Logic...
  • №79
  • 13,52 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 274 p. We live in a highly networked world. Every digital device—phone, tablet, or computer is connected to each other, in one way or another. In this new age of connected networks, there is network crime. Network forensics is the brave new frontier of digital investigation and information security professionals to extend their abilities to catch...
  • №80
  • 9,64 МБ
  • добавлен
  • изменен
Prentice Hall, 2012. - 545 p. On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking...
  • №81
  • 20,00 МБ
  • добавлен
  • изменен
2010 by The McGraw-Hill Companies. 378 p. ISBN: 978-0-07-159119-5 Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today’s hackers use readily available tools to infiltrate and hijack systems. Step-by-step countermeasures provide proven prevention techniques. Find out how to detect...
  • №82
  • 10,41 МБ
  • дата добавления неизвестна
  • изменен
Packt Publishing, 2018. — 384 p. — ISBN 1788475291. True PDF Enhance your organization’s secure posture by improving your attack and defense strategies The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will...
  • №83
  • 22,76 МБ
  • добавлен
  • изменен
Wiley-IEEE Press, 2017. — 309 p. — (IEEE Press Series on Networks and Services Management). — ISBN 10 1119328276, ISBN 13 978-1119328278. Preview ebook An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security...
  • №84
  • 5,82 МБ
  • добавлен
  • изменен
IGI Global, 2018. — 509 p. — ISBN 9781522528456. Cyber-physical systems play a crucial role in connecting aspects of online life to physical life. By studying emerging trends in these systems, programming techniques can be optimized and strengthened to create a higher level of effectiveness. Solutions for Cyber-Physical Systems Ubiquity is a critical reference source that...
  • №85
  • 24,89 МБ
  • добавлен
  • изменен
Exam 312-50 Certified Ethical Hacker. Manual. — EC-Council, 2013. — 22 files. (Здесь размещено учебное пособие). (Автор и количество страниц не указаны). The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal...
  • №86
  • 125,43 МБ
  • добавлен
  • изменен
Exam 312-50 Certified Ethical Hacker. Lab Manual. — EC-Council, 2013. — 18 files. (Здесь размещено учебное пособие по лабораторным работам). (Автор и количество страниц не указаны). The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way...
  • №87
  • 190,00 МБ
  • добавлен
  • изменен
Exam 312-50 Certified Ethical Hacker. Lab Manual. — EC-Council, 2013. — 18 files. (Здесь размещено учебное пособие по лабораторным работам). (Автор и количество страниц не указаны). The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way...
  • №88
  • 190,00 МБ
  • добавлен
  • изменен
Exam 312-50 Certified Ethical Hacker. Lab Manual. — EC-Council, 2013. — 18 files. (Здесь размещено учебное пособие по лабораторным работам). (Автор и количество страниц не указаны). The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way...
  • №89
  • 19,48 МБ
  • добавлен
  • изменен
McGraw-Hill, 2012. — 432 p. — ISBN: 0071792066, ISBN-13: 978-0-07-179205-9. Security Smarts for the Self-Guided IT Professional. Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks...
  • №90
  • 44,65 МБ
  • добавлен
  • изменен
2007 McGraw-Hill/Osborne. 574 p. ISBN: 9780072263640 Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered...
  • №91
  • 16,35 МБ
  • дата добавления неизвестна
  • изменен
Second Edition. — Syngress, 2013. — 225 p. — ISBN: 0124116442. The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools,...
  • №92
  • 5,98 МБ
  • добавлен
  • изменен
Syngress, 2011. - 160 p. The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois,...
  • №93
  • 3,74 МБ
  • дата добавления неизвестна
  • изменен
Second Edition. — Syngress, 2013. — ISBN: 0124116442. На англ. языке. The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day...
  • №94
  • 4,51 МБ
  • добавлен
  • изменен
Auerbach Publications, 2017. — 305 p. — ISBN 10 1138052809, ISBN 13 978-1138052802. Preview ebook There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not...
  • №95
  • 9,14 МБ
  • добавлен
  • изменен
No Starch Press, 2008. - 488 pages. 2nd Edition. На англ. языке. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing...
  • №96
  • 3,15 МБ
  • добавлен
  • изменен
2nd Edition. — No Starch Press, 2008. — 488 p. — ISBN-10 1-59327-144-1; ISBN-13 978-1-59327-144-2. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the...
  • №97
  • 4,02 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2012., - 252 p., ISBN: 1597499625 Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is...
  • №98
  • 30,71 МБ
  • добавлен
  • изменен
Wiley-ISTE, 2019. — 404 p. — (Systems and Industrial Engineering Series). — ISBN 978-1-78630-421-6. How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, the industrial manager must have a clear understanding of IT systems, of communication networks and of control-command systems. They must also have some knowledge of the...
  • №99
  • 15,53 МБ
  • добавлен
  • изменен
Syngress Publishing, Inc.,2007. - 482 pages. ISBN: 978- 1597491549. На англ. языке. XSS Vulnerabilities exist in 8 out of 10 Web sites. Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and...
  • №100
  • 7,34 МБ
  • добавлен
  • изменен
Getting that skill, on the other hand, has one major roadblock: most people think that they can learn it. Many knacks in the IT world can be learned. Once you realize them, they’re yours to keep. But writing a buffer overflow is not like that. It’s more like weight lifting, or judo.You can learn the basics from a book, or perhaps a short class, but the landscape you work in...
  • №101
  • 5,38 МБ
  • дата добавления неизвестна
  • изменен
Syngress, 2016. — 254 p. — ISBN 0128034513. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the...
  • №102
  • 26,50 МБ
  • добавлен
  • изменен
2002 - spring chm Путешествуя по Интернету, мы очень часто наталкивались на мольбы пользователей дать им халявного интернета. Цель данного хелпа – показать как «хакеры» используют различные бреши в продукции компании Майкрософт с целью получения «бесплатного» интеренета, а также научиться защищаться от данного вида атак.
  • №103
  • 512,82 КБ
  • дата добавления неизвестна
  • изменен
NATO Cooperative Cyber Defence Centre of Excellence, 2011. 169 p. This book argues that computer security has evolved from a technical discipline to a strategic concept. The world’s growing dependence on a powerful but vulnerable Internet – combined with the disruptive capabilities of cyber attackers – now threatens national and international security. Strategic challenges...
  • №104
  • 2,65 МБ
  • добавлен
  • изменен
Издательство Artech House, 2004. - 222 p. The simple wireless connectivity Bluetooth technology offers is attractive. Therefore, Bluetooth-equipped devices have found their way into quite different environments and are used for a wide range of applications. However, the security aspects must be carefully analyzed in order to decide whether Bluetooth technology indeed provides...
  • №105
  • 1,47 МБ
  • добавлен
  • изменен
We Cant Be Beat LLC, 2015. - 348 p. - ISBN: 1515023478 Hacking:The Ultimate Guide for You to Learn the Hidden secrets of Hacking I assume there are a few inquiries that may be going through your mind as you consider perusing this book: Who is the target group for this book? How this book is not quite the same as hacking book (The Hackers Playbook)? Why would it be a good idea for...
  • №106
  • 872,86 КБ
  • добавлен
  • изменен
Cambridge University Press, 2006. — 320 p. Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of...
  • №107
  • 2,31 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2013., - 213 p., ISBN: 1597497401 Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cybersecurity in the inner circle of cybercrime is analyzed from the impact of multiple. Written by an exceptional author team, they...
  • №108
  • 6,36 МБ
  • добавлен
  • изменен
Routledge, 2015. — 196 р. — (Routledge Studies in Conflict, Security and Technology) This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of academic and professional backgrounds. Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations,...
  • №109
  • 1,42 МБ
  • добавлен
  • изменен
Wiley, 2017. — 320 p. — ISBN 978-1-119-39621-5. Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each...
  • №110
  • 2,27 МБ
  • добавлен
  • изменен
Apress, 2016. — 244 p. — ISBN 10 1484222288. — ISBN 13 978-1484222287. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems...
  • №111
  • 541,47 КБ
  • добавлен
  • изменен
Apress, 2016. — 214 p. — ISBN 10 1484222288. — ISBN 13 978-1484222287. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems...
  • №112
  • 5,38 МБ
  • добавлен
  • изменен
Wiley, 2016. — 120 р. This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to...
  • №113
  • 2,99 МБ
  • добавлен
  • изменен
Wiley, 2016. — 120 р. This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to...
  • №114
  • 19,66 МБ
  • добавлен
  • изменен
CRC Press, 2017. — 177 p. — ISBN 10 1498729118. — ISBN 13 978-1498729116. This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and...
  • №115
  • 6,53 МБ
  • добавлен
  • изменен
Oxford University Press, 2017. — 316 p. — ISBN 10 019069999X, 13 978-0190699994. Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching...
  • №116
  • 3,35 МБ
  • добавлен
  • изменен
Future Publishing Limited,- 2015.- 178 p. Hacking shouldn’t have the bad name it has. We do not all wear the black hat of the evil hacker;many of us can embrace the term wearing the white hat of the data defender, or even run with the original definition of the term, coined in the ’60s by MIT’s Tech Model Railroad Club and Artificial Intelligence Lab: someone using their wiles –...
  • №117
  • 67,19 МБ
  • добавлен
  • изменен
Marcel Dekker, 2003. - 258 pages. In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and other...
  • №118
  • 35,54 МБ
  • дата добавления неизвестна
  • изменен
Apress, 2018. — 247 p. See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the...
  • №119
  • 1,27 МБ
  • добавлен
  • изменен
Apress, 2018. — 247 p. See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the...
  • №120
  • 3,72 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 48 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
  • №121
  • 141,14 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 118 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
  • №122
  • 259,75 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 31 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
  • №123
  • 131,15 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 32 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
  • №124
  • 324,04 КБ
  • добавлен
  • изменен
Packt, 2018. — 330 p. Ransomware has turned out to be the most aggressive malware and has affected numerous organizations in the recent past. The current need is to have a defensive mechanism in place for workstations and servers under one organization. This book starts by explaining the basics of malware, specifically ransomware. The book provides some quick tips on malware...
  • №125
  • 11,01 МБ
  • добавлен
  • изменен
2016. — 602 p. Book in simple language, not only introduces the general method and steps of computer hackers, and the use of tools, and protection from hacker attack method is described in detail, can make the reader in understanding the basic knowledge and understanding of network security premise, easily and quickly grasp the basic knowledge, tools and repair skills, from black...
  • №126
  • 399,91 КБ
  • добавлен
  • изменен
Syngress, 2010. - 122 p. - ISBN: 1597495417 Seven Deadliest Wireless Technologies Attacks позволит вам идти в ногу с последними хакерскими нападениями, влияющими на беспроводные технологии. Эта книга выявляет наиболее опасные хаки и эксплоиты, специфичные для беспроводных технологий, выкладывая анатомии этих нападений, и рекомендации, как сделать вашу систему более безопасной....
  • №127
  • 35,65 МБ
  • дата добавления неизвестна
  • изменен
Amazon Digital Services LLC, 2017. — 23 p. — ASIN B071DZC8K7. In this short tome, the authors will give a brief synoptic of several approaches to profiling the hacker. The goal of this review is to offer individuals in Cognitive Science, Neuroscience, and Cyber Counter Intelligence different research ideas for studying and applying hacker profiling toward the identification of...
  • №128
  • 148,20 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 23 p. — ASIN B071DZC8K7. In this short tome, the authors will give a brief synoptic of several approaches to profiling the hacker. The goal of this review is to offer individuals in Cognitive Science, Neuroscience, and Cyber Counter Intelligence different research ideas for studying and applying hacker profiling toward the identification of...
  • №129
  • 423,23 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 18 p. — ASIN B071DZC8K7. In this short tome, the authors will give a brief synoptic of several approaches to profiling the hacker. The goal of this review is to offer individuals in Cognitive Science, Neuroscience, and Cyber Counter Intelligence different research ideas for studying and applying hacker profiling toward the identification of...
  • №130
  • 133,86 КБ
  • добавлен
  • изменен
Ben Hammersley. Hacking Gmail. Published by Wiley Publishing, Inc. , Indianapolis, Indiana. 2006 - 310 p. Books of this nature are tremendously difficult to write. Without support from Google (we didn’t ask, admittedly) and with Gmail being in perpetual Beta throughout the writing process, we often found ourselves with chapters being made obsolete overnight. Contents: Part I:...
  • №131
  • 5,29 МБ
  • дата добавления неизвестна
  • изменен
Article. Published in International Studies Quarterly, № 53. - International Studies Association, 2009. - p. 1155–1175. This article is devoted to an analysis of cyber security, a concept that arrived on the post-Cold War agenda in response to a mixture of technological innovations and changing geopolitical conditions. Adopting the framework of securitization theory, the...
  • №132
  • 147,63 КБ
  • добавлен
  • изменен
Springer, 2019. — 319 p. — (Advanced Sciences and Technologies for Security Applications). — ISBN 3030168360. This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial...
  • №133
  • 9,85 МБ
  • добавлен
  • изменен
Springer, 2017. — 414 p. Digital forensics is the process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events. However, the emergence of the cloud...
  • №134
  • 9,12 МБ
  • добавлен
  • изменен
World Scientific, 2016. — 222 p. — ISBN: 1786340747 В качестве недостаточно изученной области академических исследований анализ данных сетевого трафика все еще находится в зачаточном состоянии. Однако проблема выявления и смягчения злонамеренного или несанкционированного поведения становится все более заметной проблемой. Этом сборник работ ведущих исследователей и практиков...
  • №135
  • 12,92 МБ
  • добавлен
  • изменен
Syngress, 2011. - 275 p. - ISBN: 1597496049 Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Find out how an attacker would bypass different types of...
  • №136
  • 1,51 МБ
  • добавлен
  • изменен
Springer International Publishing,2016. — 266 p. — ISBN: 3319190865 От холодной войны до Кибер войны. This book follows the history of the international law of peace and armed conflict over the last 25 years. It highlights both the parameters that have remained the same over the years as well as the new challenges now facing international law. The articles analyze new developments...
  • №137
  • 2,74 МБ
  • добавлен
  • изменен
Monograph. — Washington: Carnegie Endowment for International Peace, 2017. — 51 [+ 7] p. The cyber revolution and ever-growing transfer of human activities into the virtual world are undermining the social contract between modern states and their citizens. Most governments are becoming unable and unwilling to protect citizens and private enterprises against numerous, sophisticated...
  • №138
  • 20,29 МБ
  • добавлен
  • изменен
В книге рассказывается об игровой индустрии, рассматриваются методы взлома игр и создания ботов (с множеством практических советов), обсуждаются проблемы безопасности игр и каким образом нарушается безопасность самого пользователя. Единственное, с чем нельзя связываться - это пакетные снифферы и DDoS-атаки, считает Гэри Макгроу (один из соавторов книги, специалист в области...
  • №139
  • 8,98 МБ
  • дата добавления неизвестна
  • изменен
512 страниц. ISBN-10: 0201786958 ISBN-13: 978-0201786958 Издательство: Addison-Wesley Professional; 1 edition (February 27, 2004) http://books.google.ru/ amazon.com Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer...
  • №140
  • 7,58 МБ
  • добавлен
  • изменен
Routledge, 2017. — 754 p. — ISBN 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a...
  • №141
  • 4,10 МБ
  • добавлен
  • изменен
Routledge, 2017. — 754 p. — ISBN 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a...
  • №142
  • 17,61 МБ
  • добавлен
  • изменен
Routledge, 2017. — 754 p. — ISBN 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a...
  • №143
  • 18,77 МБ
  • добавлен
  • изменен
Routledge, 2017. — 754 p. — ISBN 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a...
  • №144
  • 16,71 МБ
  • добавлен
  • изменен
Routledge, 2017. — 754 p. — ISBN 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as a...
  • №145
  • 8,45 МБ
  • добавлен
  • изменен
StationX Ltd, 2017. — 282 p. This book is primarily intended for people taking "The Complete Cyber Security Course Volume I Hacking Exposed". It was developed based on the transcripts of course itself and as such serves to help students through the course and as a handy reminder for future use. Volume 1: Learn how to stop hackers, prevent tracking, advanced anonymous browsing and...
  • №146
  • 40,09 МБ
  • добавлен
  • изменен
StationX Ltd, 2017. — 282 p. This book is primarily intended for people taking "The Complete Cyber Security Course Volume I Hacking Exposed". It was developed based on the transcripts of course itself and as such serves to help students through the course and as a handy reminder for future use.
  • №147
  • 9,17 МБ
  • добавлен
  • изменен
The McGraw-Hill Companies, 2010. — 394 p. — ISBN: 978-0-07-162676-7. Целевая аудитория: опытные веб-разработчики и системные администраторы. Чем больше приёмов взлома веб-приложений, тем больше методов защиты. Казалось бы, очевидная зависимость, однако проблем у создателей приложений и системных администраторов меньше не становится. Существует такая практика, когда особенно важные...
  • №148
  • 3,76 МБ
  • добавлен
  • изменен
2010 by The McGraw-Hill Companies. 394 p. ISBN: 978-0-07-162676-7 The authors have demonstrated once again why they’re the ‘who’s who’ of software security. The 24 Deadly Sins of Software Security is a tour de force for developers, security pros, project managers, and anyone who is a stakeholder in the development of quality, reliable, and thoughtfully-secured code. The...
  • №149
  • 2,76 МБ
  • дата добавления неизвестна
  • изменен
San Francisco: No Starch Press Inc, Unlimited Edition (March, 2013.,1-st 2003.),-291 p. ISBN-10/ASIN: 1593270291/B002YX0EN4 На практических примерах демонстрирует владельцам игровой приставки Xbox, сколь простыми способами можно существенно расширить эксплуатационные возможности их системы. Пошаговая инструкция по взлому и аппаратной модификации приставки может служить...
  • №150
  • 17,76 МБ
  • добавлен
  • изменен
Leaders Press, 2019. — 211 р. Even with over $100 billion spent each year on security, attackers break in. They stay hidden and steal data or disrupt with ransomware. Can anything be done to stop the hack? The answer is yes. Intensive reviews of the world’s largest hacks uncovered the secret: detect attackers’ signals early. This book reveals what those signals are and shows how...
  • №151
  • 2,89 МБ
  • добавлен
  • изменен
Springer, 2010. — 125 p. — e-ISBN 978-1-4419-5803-7. This book is a collection of revised and extended chapters based on papers presented at the Open Source Software for Computer and Network Forensics (OSSCoNF) workshop, held in Milan in September 2008 at the World Computing Congress, co-located with the 4th Open Source Software Conference, and some new work purposely commissioned...
  • №152
  • 3,97 МБ
  • добавлен
  • изменен
Year: 2016 Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be just WEEKS away from becoming a...
  • №153
  • 1,37 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2015. — 42 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN 10 1517599334. — ISBN 13 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
  • №154
  • 125,99 КБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2015. — 25 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN 10 1517599334. — ISBN 13 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
  • №155
  • 140,26 КБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2015. — 27 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN 10 1517599334. — ISBN 13 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
  • №156
  • 93,84 КБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2015. — 48 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN 10 1517599334. — ISBN 13 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
  • №157
  • 404,44 КБ
  • добавлен
  • изменен
Rowman & Littlefield Publishers, 2017. — 270 p. — ISBN 10 153810489X, ISBN 13 978-1538104897. According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution...
  • №158
  • 3,13 МБ
  • добавлен
  • изменен
CRC Press, Taylor & Francis Group, 2015. — 346 p. — ISBN/ASIN: 1482239221 The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt...
  • №159
  • 1,70 МБ
  • добавлен
  • изменен
Copyright Reserved to Jonathan Jones, 2015. - 222 p. - ASIN: B011ERQO70 All hacking tricks are applicable for both Windows 7 and Windows 8. The most fundamental meaning of hacking is gaining unauthorized access to data in a system or computer. However, the word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The...
  • №160
  • 4,03 МБ
  • добавлен
  • изменен
Springer, 2016. — 220 p. The first book to provide a thorough discussion on attribution in network forensics; Presents an exhaustive literature survey on theoretical models and implemented frameworks; Introduces a wide range of both proprietary and open source tools for network forensic analysis. This timely text/reference presents a detailed introduction to the essential aspects...
  • №161
  • 5,58 МБ
  • добавлен
  • изменен
Wiley, 2011 — 352 p. Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google search. But learning design isn't so simple. Many design books try to teach design through lists of "do's"...
  • №162
  • 34,22 МБ
  • добавлен
  • изменен
Wiley, 2015. — 256 p. — ISBN 10 1119026849. — ISBN 13 978-1119026846. Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based...
  • №163
  • 1,98 МБ
  • добавлен
  • изменен
River Publishers, 2017. — 240 p. — (River Publishers Series in Communications). — ISBN 10 8793519664, ISBN 13 978-8793519664. Preview ebook Cybersecurity and Privacy – Bridging the Gap addresses two very complex fields of the digital world: cybersecurity and privacy. These multifaceted and multidisciplinary issues are usually understood and valued differently by different...
  • №164
  • 16,12 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 182 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
  • №165
  • 737,33 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 210 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
  • №166
  • 757,35 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 100 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
  • №167
  • 782,20 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2016. — 212 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
  • №168
  • 1,70 МБ
  • добавлен
  • изменен
Auerbach Publications, 2017. — 337 p. — ISBN: 9781498785143 The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in...
  • №169
  • 4,07 МБ
  • добавлен
  • изменен
Wiley, 2017. — 509 p. — ISBN 10 1119231507. — ISBN 13 978-1119231509. A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
  • №170
  • 2,89 МБ
  • добавлен
  • изменен
Wiley, 2017. — 522 p. — ISBN 10 1119231507. — ISBN 13 978-1119231509. A definitive guide to cybersecurity law Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
  • №171
  • 814,12 КБ
  • добавлен
  • изменен
2nd Edition. – CRC Press, Taylor & Francis Group, LLC, 2018. — 316 p. — ISBN-10 1138057711. Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics...
  • №172
  • 16,21 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2004. — 644 p. Stop hackers from wreaking havoc on your software applications and operating systems. This innovative book provides tools to discover vulnerabilities in C-language-based software, exploit what you find, and prevent new security holes from occurring.
  • №173
  • 2,09 МБ
  • дата добавления неизвестна
  • изменен
Apress, 2012. — 268 р. — ISBN 978-1-4302-3868-3. Hacking the Kinect is the technogeek’s guide to developing software and creating projects involving the groundbreaking volumetric sensor known as the Microsoft Kinect. Microsoft’s release of the Kinect in the fall of 2010 startled the technology world by providing a low-cost sensor that can detect and track body movement in...
  • №174
  • 18,82 МБ
  • добавлен
  • изменен
Sourcebooks, 2014. — 465 p. — ISBN 9781402295614. Now a New York Times bestseller! There is a Threat Lurking Online with the Power to Destroy Your Finances, Steal Your Personal Data, and Endanger Your Life. In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting...
  • №175
  • 306,07 КБ
  • добавлен
  • изменен
Springer, 2019. — 116 p. — ISBN 9789811314568. This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting-edge innovations.
  • №176
  • 3,99 МБ
  • добавлен
  • изменен
IGI Global, USA, 2017. — 416 p. — (Advances in Information Security, Privacy, and Ethics). — ISBN 1522521542. Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and Mitigating Robotic...
  • №177
  • 23,05 МБ
  • добавлен
  • изменен
Wiley, 2018. — 53 p. — ISBN 978-1-119-43731-4 . You’ve probably picked up this book because you’re confident enough to admit that you don’t know as much about DNS security and are clever enough to look for more knowledge. We don’t think you’ll be disappointed. In this brief volume, we offer a primer of many of the common terms you’ll run into, high-level descriptions of the...
  • №178
  • 8,65 МБ
  • добавлен
  • изменен
Wiley, 2018. — 53 p. — ISBN 978-1-119-43731-4 . You’ve probably picked up this book because you’re confident enough to admit that you don’t know as much about DNS security and are clever enough to look for more knowledge. We don’t think you’ll be disappointed. In this brief volume, we offer a primer of many of the common terms you’ll run into, high-level descriptions of the...
  • №179
  • 998,77 КБ
  • добавлен
  • изменен
Packt Publishing, — 2015. 208 p. ISBN 978-1-78439-643-5. The focus of this book is to learn how to combine the power of Kali Linux with the portability and low cost of a Raspberry Pi. The result is an extremely flexible penetration testing platform for specific projects that don't require applications with high processing power needs. We have used this toolset to conduct...
  • №180
  • 14,98 МБ
  • добавлен
  • изменен
Yale University Press, 2017. — 240 p. — ISBN 0300227442. A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers. New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let...
  • №181
  • 2,25 МБ
  • добавлен
  • изменен
Yale University Press, 2017. — 240 p. — ISBN 0300227442. A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers. New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let...
  • №182
  • 1,75 МБ
  • добавлен
  • изменен
Yale University Press, 2017. — 240 p. — ISBN 0300227442. A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers. New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let...
  • №183
  • 3,00 МБ
  • добавлен
  • изменен
World Scientific, 2005. — 184 p. As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web...
  • №184
  • 2,81 МБ
  • добавлен
  • изменен
2015. - 58 p. - ASIN: B016LO5X3M Are you fascinated by hackers? Would you like to be one? Are you looking for a window into their world? If so, you must read Hacking: Tapping into the Matrix - Step-by-Step Guide on How to Hack This book offers many proven tips and strategies for successful hacking. You’ll discover the secrets of the trade, which steps to take, and even how...
  • №185
  • 897,59 КБ
  • добавлен
  • изменен
Hart Publishing, 2017. — 255 p. — (Computers, Privacy and Data Protection). — ASIN B078GGFDG4. This volume arises from the tenth annual International Conference on Computers, Privacy, and Data Protection (CPDP 2017) held in Brussels in January 2017, bringing together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy...
  • №186
  • 2,72 МБ
  • добавлен
  • изменен
Springer, 2015. — 269 p. — (Intelligent Systems, Control and Automation: Science and Engineering 78). — ISBN: 331918301X, 9783319183015, 9783319183022 Contains a unique codification of cyber security Excellent book for students, postgraduates and professionals Gives a profound overview of the most spoken phenomenon of this time The book, in addition to the cyber threats...
  • №187
  • 5,58 МБ
  • добавлен
  • изменен
John Wiley & Sons, Inc., - 2005, - 387 pages. This book takes you into the belly of the beast, showing you where and how to bend Windows to your way of working. Part I: The Nuts & Bolts of Hacks & Mods Part II: Controlling the Look and Feel of Windows XP Part III: Adjusting Everyday Activities Part IV: Modding to Monitor and Manage Part V: Protecting Yourself (And Your PC)...
  • №188
  • 8,10 МБ
  • добавлен
  • изменен
Penguin Group, 2001. — 370 p. If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of...
  • №189
  • 3,90 МБ
  • добавлен
  • изменен
O'Reilly Media, 2010. — 520 p. This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill...
  • №190
  • 12,56 МБ
  • добавлен
  • изменен
Springer, 2019. — 255 p. This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest...
  • №191
  • 13,36 МБ
  • добавлен
  • изменен
Springer, 2019. — 255 p. This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest...
  • №192
  • 5,35 МБ
  • добавлен
  • изменен
Fastpencil Publishing, 2017. - 269. - ISBN: 978-1499902297 Hackers are a global fascination with cybercrime representing our single biggest threat to national security. But putting their sinister motives aside, the dark underworld of hackers contains some of the most creative minds on the planet.
  • №193
  • 6,43 МБ
  • добавлен
  • изменен
Syngress, 2016. — 218 p. — ISBN: 978-0-12-803306-7 DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the...
  • №194
  • 6,47 МБ
  • добавлен
  • изменен
Syngress, 2009. — 1037 p. — ISBN 9781597492997. The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in...
  • №195
  • 10,83 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 297 p. — ASIN B073M87664. This book is geared for people that want to learn ethical hacking, penetration testing, and network security. As the title implies this book is for beginners, so there are no preconceived assumptions that you know network routing, firewall rules, Group policies, etc. This book is laid out with several simple tutorials...
  • №196
  • 4,66 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 161 p. — ASIN B073M87664. This book is geared for people that want to learn ethical hacking, penetration testing, and network security. As the title implies this book is for beginners, so there are no preconceived assumptions that you know network routing, firewall rules, Group policies, etc. This book is laid out with several simple tutorials...
  • №197
  • 2,99 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 163 p. — ASIN B073M87664. This book is geared for people that want to learn ethical hacking, penetration testing, and network security. As the title implies this book is for beginners, so there are no preconceived assumptions that you know network routing, firewall rules, Group policies, etc. This book is laid out with several simple tutorials...
  • №198
  • 4,59 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 412 p. — ISBN978-1-78646-420-0. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics and it delves into the concepts of mobile forensics and...
  • №199
  • 11,07 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 402 p. Investigate, analyze, and report iOS, Android, and Windows devices Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial...
  • №200
  • 15,89 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 402 p. Investigate, analyze, and report iOS, Android, and Windows devices Covering up-to-date mobile platforms, this book will focuses on teaching you the most recent techniques for investigating mobile devices. We delve mobile forensics techniques in iOS 9-11, Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial...
  • №201
  • 20,35 МБ
  • добавлен
  • изменен
The Didactic Intelligentsia, 2018. — 196 р. — ASIN B07MKH54S1. This is one of the best books available in cyber-security and ethical hacking for beginners. This books is written in a highly organized manner and involves rich use of text and graphics. This books covers all the basics that are taught in a standard ethical hacking course. In addition to that this book also shows the...
  • №202
  • 9,38 МБ
  • добавлен
  • изменен
IGI Global, 2018. — 465 p. — ISBN 1522557369. Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy in Smart Sensor Networks is a critical scholarly resource...
  • №203
  • 24,34 МБ
  • добавлен
  • изменен
7th Edition. — Future Publishing. — 172 р. — (Future’s Series). Featuring 171 pages of expert tips and advice from the makers of Linux Format magazine, Hacker's Manual 2019 is the perfect guide for anyone looking to take their Linux skills to the next level. Enhance security, protect data and hone your hacking skills.
  • №204
  • 83,28 МБ
  • добавлен
  • изменен
Palgrave Macmillan, 2014. — 101 p. Introduction Conceptualising Cryptomarkets Cryptomarket Operations Conventional vs. Online Drug Distribution Networks Cryptomarkets and Law Enforcement Conclusion and Future Directions
  • №205
  • 2,99 МБ
  • добавлен
  • изменен
San Francisco: No Starch Press, 2019. — 449 p. — ISBN 1593277164. Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time...
  • №206
  • 15,05 МБ
  • добавлен
  • изменен
No Starch Press, 2019. — 448 р. — ISBN 9781492071259. Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. With the aid of numerous case studies and professional research from three of the world’s leading security experts, you’ll trace malware development over time from rootkits...
  • №207
  • 26,00 МБ
  • добавлен
  • изменен
Springer, 2017. — 225 p. — ISBN 10 3319617168, 13 978-3319617169. This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical...
  • №208
  • 12,90 МБ
  • добавлен
  • изменен
McGraw-Hill Osborne Media, 2012. — 480 p. (Seventh Edition) Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually...
  • №209
  • 82,09 МБ
  • добавлен
  • изменен
Sixth Edition. 2009 by The McGraw-Hill Companies. 691 p. ISBN: 978-0-07-161375-0 Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in...
  • №210
  • 14,85 МБ
  • дата добавления неизвестна
  • изменен
MailGuard, 2017. — 134 p. — ASIN B06Y2DW4JT. This guide aims to provide a non-technical insight into cybersecurity for time-poor executives who are new to the threats emerging in this space... I aim to provide you with an understanding of cybersecurity and what it means for your organisation, to highlight some real-world examples, and to make you familiar with some industry jargon...
  • №211
  • 5,22 МБ
  • добавлен
  • изменен
Harvard University Press, 2004. — 209 p. — ISBN 9780674015432, ASIN 0674015436. A double is haunting the world-the double of abstraction, the virtual reality of information, programming or poetry, math or music, curves or colorings upon which the fortunes of states and armies, companies and communities now depend. The bold aim of this book is to make manifest the origins, purpose,...
  • №212
  • 519,05 КБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 248 p. — ISBN 978-1-78712-613-8. We will be leveraging the latest credit-card sized Raspberry Pi 3 and teach you how to create a portable, low cost hacking tool using Kali Linux 2. This book will start with installing and tuning Kali Linux 2 on Raspberry Pi 3 so that you can get started with penetration testing. You will be exposed to various network...
  • №213
  • 65,59 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 248 p. — ISBN 978-1-78712-613-8. We will be leveraging the latest credit-card sized Raspberry Pi 3 and teach you how to create a portable, low cost hacking tool using Kali Linux 2. This book will start with installing and tuning Kali Linux 2 on Raspberry Pi 3 so that you can get started with penetration testing. You will be exposed to various network...
  • №214
  • 16,77 МБ
  • добавлен
  • изменен
3rd Ed. — Cyber Simplicity Ltd, 2017. — conv. 69 p. — ISBN 10 191145210X, 13 978-1911452102. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? The speed of change in the...
  • №215
  • 650,32 КБ
  • добавлен
  • изменен
Lulu Publishing Services, 2016. — 45 p. — ISBN-10 1483446344. — ISBN-13 978-1483446349. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? This dictionary began life...
  • №216
  • 215,61 КБ
  • добавлен
  • изменен
Lulu Publishing Services, 2016. — 43 p. — ISBN-10 1483446344. — ISBN-13 978-1483446349. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? This dictionary began life...
  • №217
  • 153,80 КБ
  • добавлен
  • изменен
Lulu Publishing Services, 2016. — 48 p. — ISBN-10 1483446344. — ISBN-13 978-1483446349. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? This dictionary began life...
  • №218
  • 516,60 КБ
  • добавлен
  • изменен
Cutrain Ltd, 2015. — 190 p. — ISBN-10: 1483431231, ISBN-13: 978-1-4834-3123-9. This book provides an easy insight into the essentials of cybersecurity, even if you have a nontechnical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the...
  • №219
  • 840,02 КБ
  • добавлен
  • изменен
Cutrain Ltd, 2015. — 190 p. — ISBN-10: 1483431231, ISBN-13: 978-1-4834-3123-9. This book provides an easy insight into the essentials of cybersecurity, even if you have a nontechnical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the...
  • №220
  • 202,42 КБ
  • добавлен
  • изменен
Cutrain Ltd, 2015. — 190 p. — ISBN-10: 1483431231, ISBN-13: 978-1-4834-3123-9. This book provides an easy insight into the essentials of cybersecurity, even if you have a nontechnical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the...
  • №221
  • 264,89 КБ
  • добавлен
  • изменен
Sybex, 2019. — 585 p. — ISBN 978-1-119-53326-9. As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide...
  • №222
  • 9,33 МБ
  • добавлен
  • изменен
Sybex, 2019. — 585 p. — ISBN 978-1-119-53326-9. As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide...
  • №223
  • 7,64 МБ
  • добавлен
  • изменен
Wiley, 2017. — 344 p. — ISBN 978-1-119-32828-5. Intensively hands–on training for real–world network forensics. Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands–on all the way by dissecting packets, you gain fundamental knowledge that only comes from experience. Real...
  • №224
  • 16,76 МБ
  • добавлен
  • изменен
Wiley, 2017. — 344 p. — ISBN 978-1-119-32828-5. Intensively hands–on training for real–world network forensics. Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands–on all the way by dissecting packets, you gain fundamental knowledge that only comes from experience. Real...
  • №225
  • 20,74 МБ
  • добавлен
  • изменен
Auerbach Publications, CRC Press, 2017. — 254 p. — ISBN 10 1498785867, ISBN 13 978-1498785860. Preview ebook Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the...
  • №226
  • 6,20 МБ
  • добавлен
  • изменен
Springer International Publishing AG, 2017. — 351 p. — ISBN 978-3-319-49024-3. This book would not be possible without the contributions of many researchers and experts in the field of hardware security and trust.We anticipate over 50 billion devices to be deployed and mutually connected by 2020. Security and trust are paramount considerations while designing these systems....
  • №227
  • 9,69 МБ
  • добавлен
  • изменен
John Wiley & Sons 2003, 577 p. The world′s most infamous hacker offers an insider′s view of the low–tech threats to high–tech security Kevin Mitnick′s exploits as a cyber–desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick...
  • №228
  • 5,19 МБ
  • добавлен
  • изменен
Wiley Publishing, Inc., 2005. - 288 pages. Contents: Hacking the Casinos for a Million Bucks When Terrorists Come Calling The Texas Prison Hack Cops and Robbers The Robin Hood Hacker The Wisdom and Folly of Penetration Testing Of Course Your Bank Is Secure — Right? Your Intellectual Property Isn’t Safe On the Continent Social Engineers — How They Work and How to Stop...
  • №229
  • 3,09 МБ
  • добавлен
  • изменен
Little, Brown and Company, 2011. — ISBN 0316037702; ISBN13 9780316037709. Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies, and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through...
  • №230
  • 1,08 МБ
  • добавлен
  • изменен
Little, Brown and Company, 2017. — 320 p. — ISBN 0316380504. Новая книга от легендарного Кевина Митника! Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet...
  • №231
  • 655,48 КБ
  • добавлен
  • изменен
Little, Brown and Company, 2017. — 320 p. — ISBN 0316380504. Новая книга от легендарного Кевина Митника! Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet...
  • №232
  • 6,99 МБ
  • добавлен
  • изменен
Little, Brown and Company, 2017. — 320 p. — ISBN 0316380504. Новая книга от легендарного Кевина Митника! Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand. In this explosive yet...
  • №233
  • 617,42 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 17 p. — ASIN B07FLFRKYY. This book has the answer for you! With only 2 hours of daily dedication, you can become an ethical hacker. Inside you will found step-by-step practical information about how the hackers act, what are the hacking phases, what are the tools they use and how they exploit vulnerabilities. You will learn also how to write a...
  • №234
  • 200,06 КБ
  • добавлен
  • изменен
Wiley, 2014. — 362 p. — ISBN: 9781118697115 Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk...
  • №235
  • 8,03 МБ
  • добавлен
  • изменен
Packt Publishing, 2013. — 342 p. — ISBN-10 1782163166; ISBN-13 978-1782163169. Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web...
  • №236
  • 19,26 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 426 p. Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side...
  • №237
  • 15,85 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 426 p. Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side...
  • №238
  • 29,15 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 426 p. Web Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side...
  • №239
  • 81,99 КБ
  • добавлен
  • изменен
Fifth edition. — Cengage Learning, 2016. — 690 p. — ISBN 978-1-285-06003-3. Updated with the latest advances from the field, Guide to computer forensics and investigations, fifth edition combines all-encompassing topic coverage, authoritative information from seasoned experts, powerful instructor resources, and real-world student applications-delivering the most comprehensive...
  • №240
  • 25,11 МБ
  • добавлен
  • изменен
Springer, 2017. — 325 p. — (Advances in Intelligent Systems and Computing). — ISBN 10 3319605844, 13 978-3319605845. This book reports on the latest esearch and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security...
  • №241
  • 51,13 МБ
  • добавлен
  • изменен
Данный справочник будет полезен как для начинающих, так и для опытных "Хакеров". В нем можно найти некоторую информацию, которая касается хакерства МастДая (она же M$ Windows), взлому HTTP серверов, а также некоторую другую информацию. И напоследок я выложил сюда порты троянских программ, диапазоны IP адресов провайдеров и полный эксклюзив: Гостевые пароли некоторых Московских и...
  • №242
  • 145,11 КБ
  • дата добавления неизвестна
  • изменен
Inforge.net, 2018. — 176 p. Have you ever wished to become a hacker? If the answer is yes, this book is for you! Started as a crowdfunding project, Hacklog Volume 1: Anonymity is the first of a book collection dedicated to who wants to enter the world of Hacking and IT Security. You’ll learn how to use the tools real-life hackers leverage everyday to avoid controls, how to conceal...
  • №243
  • 1,07 МБ
  • добавлен
  • изменен
Wiley–IEEE Press, 2018. — 320 p. — ISBN 978-1-119-37777-1. The first book focusing on one of the hottest new topics in Internet of Things systems research and development Studies estimate that by 2020 we will have a vast Internet of Things (IoT) network comprising 26 billion connected devices, including everything from light bulbs to refrigerators, coffee makers to cars. From the...
  • №244
  • 10,32 МБ
  • добавлен
  • изменен
Apress, 2019. — 215 р. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces...
  • №245
  • 5,56 МБ
  • добавлен
  • изменен
Apress, 2019. — 215 р. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces...
  • №246
  • 24,81 МБ
  • добавлен
  • изменен
Sybex, 2016. — 648 p. — ISBN 1119252245. True PDF The ultimate preparation guide for the unique CEH exam.The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point...
  • №247
  • 30,71 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 226 р. No extra maths required! – but a keen sense of humour is mandatory. You don’t even have to be excessively keen, we keep it short. This book shows how artificial intelligence (AI), Machine Learning (ML), and Big data analysis can be used in cybersecurity. Designed for Cybersecurity workers, InfoSec indentured slaves and governance...
  • №248
  • 8,55 МБ
  • добавлен
  • изменен
Palgrave Macmillan, 2017. — 208 p. — (Palgrave Studies in Cybercrime and Cybersecurity). — ISBN 10 3319538551, 13 978-3319538556. This exciting and timely collection showcases recent work on Cybercrime by members of Uclan Cybercrime Research Unit [UCRU], directed by Dr Tim Owen at the University of Central Lancashire, UK. This book offers up-to-date perspectives on Cybercrime...
  • №249
  • 2,55 МБ
  • добавлен
  • изменен
amazon.com A thought-provoking study of the war against computer viruses reveals the world of hackers and other computer criminals, their potentially catastrophic impact, and the efforts of international police agencies to stop computer crime. 15,000 first printing. $15,000 ad/promo.
  • №250
  • 2,00 МБ
  • добавлен
  • изменен
Syngress, 2013. — 160 р. — ISBN 978-0124166004. The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for...
  • №251
  • 4,63 МБ
  • добавлен
  • изменен
Syngress, 2013. — 160 р. — ISBN 978-0124166004. The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for...
  • №252
  • 3,45 МБ
  • добавлен
  • изменен
Copernicus, 2015. — 209 p. Outlines the three major categories of cyber attack: personal attacks, such as malware installation or identity theft; attacks on company or community infrastructure; and attacks on a national government Experienced and highly regarded authors are uniquely qualified on the subject, having previously authored "The Safe City: Living Free in a Dangerous...
  • №253
  • 6,69 МБ
  • добавлен
  • изменен
Paper, 34 p. This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking markets work. The resulting framework is employed to evaluate current U.S. policy aimed at reducing the threat of computer hacking and shows that this policy is largely...
  • №254
  • 90,18 КБ
  • добавлен
  • изменен
McGraw-Hill, 2009, 2nd Edition - 544 pages; ISBN-13: 978-0071626774; на англ. языке. Book Description Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system...
  • №255
  • 12,25 МБ
  • добавлен
  • изменен
Palgrave Macmillan, 2017. — 323 p. — (Palgrave Studies in Cybercrime and Cybersecurity). — ISBN 10 1137580461, ISBN 13 978-1137580467. This book examines how digital communications technologies have transformed modern societies, with profound effects both for everyday life, and for everyday crimes. Sexual violence, which is recognized globally as a significant human rights...
  • №256
  • 5,58 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 51 p. — ASIN B0736HZRSC6. Cyber crime is the biggest threat that every organization on the planet faces today! And it's not just the organizations that are vulnerable. People too are at risk of being targeted by hackers. Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true...
  • №257
  • 165,41 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 51 p. — ASIN B0736HZRSC6. Cyber crime is the biggest threat that every organization on the planet faces today! And it's not just the organizations that are vulnerable. People too are at risk of being targeted by hackers. Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true...
  • №258
  • 169,50 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 63 p. — ASIN B0736HZRSC6. Cyber crime is the biggest threat that every organization on the planet faces today! And it's not just the organizations that are vulnerable. People too are at risk of being targeted by hackers. Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it is true...
  • №259
  • 541,77 КБ
  • добавлен
  • изменен
Packt Publishing, 2019. — 404 р. — ISBN 978-1788627962. Becoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete...
  • №260
  • 27,50 МБ
  • добавлен
  • изменен
Indianopolis: John Wiley & Sons, 2019. — 328 p. — ISBN 1119617367. Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges . Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of...
  • №261
  • 3,10 МБ
  • добавлен
  • изменен
ISTE Press - Elsevier, 2017. —216 p. — ISBN 978-1-78548-228-1. This book explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and...
  • №262
  • 3,58 МБ
  • добавлен
  • изменен
Apress, 2016. — 207 p. — ISBN 1484223241. Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide...
  • №263
  • 12,15 МБ
  • добавлен
  • изменен
Wiley - Extreme Tech., 2006, - 322 pages. Hacking is the action of effective (many times creative) solutions to solving difficult types of problems. Networking Hacks. This section of the book covers hacking the PSP to enable Web browsing, using instant messaging and RSS applications on your PSP, increasing the speed of your Internet surfing and wireless multiplayer gaming, and...
  • №264
  • 12,33 МБ
  • добавлен
  • изменен
Springer, 2017. — 283 p. — (Advanced Sciences and Technologies for Security Applications). — ISBN 10 331954974X, ISBN 13 978-3319549743. This book covers many aspects of cyberspace, emphasizing not only its possible 'negative' challenge as a threat to security, but also its positive influence as an efficient tool for defense as well as a welcome new factor for economic and...
  • №265
  • 3,61 МБ
  • добавлен
  • изменен
Elsevier, 2019. — 284 p. — ISBN 978-0-12-815032-0. This book examines the latest research developments and their outcomes for safe, secure, and trusting smart cities residents. Smart cities improve the quality of life of citizens in their energy and water usage, healthcare, environmental impact, transportation needs, and many other critical city services. Recent advances in...
  • №266
  • 20,99 МБ
  • добавлен
  • изменен
2000. - 125 pages. This document is a collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary; what we describe here is the language hackers use among themselves for fun, social communication, and technical debate.
  • №267
  • 1,55 МБ
  • добавлен
  • изменен
4th Edition. — McGraw-Hill Education, 2015. — 941 p. — ISBN: 978-0-07-183850-4. На англ. языке. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics...
  • №268
  • 32,18 МБ
  • добавлен
  • изменен
4th Edition. — McGraw-Hill Education, 2015. — 941 p. — ISBN: 978-0-07-183850-4. На англ. языке. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics...
  • №269
  • 15,95 МБ
  • добавлен
  • изменен
5th ed. — McGraw-Hill Education, 2018. — 640 p. — ISBN 1260108414. Cutting-edge techniques for finding and fixing critical security flaws. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's...
  • №270
  • 47,18 МБ
  • добавлен
  • изменен
5th ed. — McGraw-Hill Education, 2018. — 640 p. — ISBN 1260108414. Cutting-edge techniques for finding and fixing critical security flaws. Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's...
  • №271
  • 45,32 МБ
  • добавлен
  • изменен
Legend Times Group, 2018. — 250 p. — ISBN 9781787198913, 178719891X. The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses. The book was an important wake-up...
  • №272
  • 6,35 МБ
  • добавлен
  • изменен
Cambridge University Press, 2017. — 137 p. The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from...
  • №273
  • 10,66 МБ
  • добавлен
  • изменен
Pearson, 2018. — 704p. ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS, APPLICATIONS, AND DATA–IN ONE BOOK From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT professionals
  • №274
  • 37,48 МБ
  • добавлен
  • изменен
Pearson, 2018. — 704 p. All you need to know to secure linux systems, networks, applications, and data–in one book. From the basics to advanced techniques: no Linux security experience necessary. Realistic examples & step-by-step activities: practice hands-on without costly equipment. The perfect introduction to Linux-based security for all students and It professionals.
  • №275
  • 38,54 МБ
  • добавлен
  • изменен
Pearson, 2018. — 704 p. — ISBN: 0789759351. All You Need to Know to Secure Linux Systems, Networks, Applications, and Datain one Book From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT...
  • №276
  • 37,36 МБ
  • добавлен
  • изменен
Pearson, 2018. — 704 p. — ISBN: 0789759351. All You Need to Know to Secure Linux Systems, Networks, Applications, and Datain one Book From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT...
  • №277
  • 37,55 МБ
  • добавлен
  • изменен
Springer, 2016. — 339 p. — ISBN 10 3319411853. — ISBN 13 978-3319411859 This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It...
  • №278
  • 8,52 МБ
  • добавлен
  • изменен
Syber Risk LLC, 2018. — 111 p. — ASIN B07G3PVXZC. This book is a spin-off of our series on anticipated expansion and use of National Institute of Standards and Technology (NIST) based frameworks, and how they fit the terms of agile or lean development. In this book, we explore several approaches to making "agility" a reality. We discuss both the National Cybersecurity Framework...
  • №279
  • 1,70 МБ
  • добавлен
  • изменен
Syber Risk LLC, 2018. — 153 p. — ASIN B07G3PVXZC. This book is a spin-off of our series on anticipated expansion and use of National Institute of Standards and Technology (NIST) based frameworks, and how they fit the terms of agile or lean development. In this book, we explore several approaches to making "agility" a reality. We discuss both the National Cybersecurity Framework...
  • №280
  • 3,22 МБ
  • добавлен
  • изменен
Strategic Studies Institute, 2011, -324 pp. The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and our dependency upon their underlying infrastructure is ever-increasing. Unfortunately, as our dependency has grown, so have hostile attacks on the cyber infrastructure by network predators. The lack...
  • №281
  • 3,22 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. — 564 p. — ISBN 1788622057. Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical...
  • №282
  • 21,64 МБ
  • добавлен
  • изменен
Packt Publishing, 2018. - 564p. - ISBN: 1788622057 Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book Description This book starts with the basics of ethical...
  • №283
  • 41,14 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2015. — 106 р. This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people...
  • №284
  • 8,45 МБ
  • добавлен
  • изменен
2nd edition. — Springer, 2007. — 464 p. — e-ISBN 10 1-84628-732-4. A detailed technical understanding of where and how digital information can be stored is clearly of paramount importance, both from an investigative point of view in finding the information in the first place and from an evidential point of view in being able to explain in technically accurate but jury-friendly...
  • №285
  • 10,78 МБ
  • добавлен
  • изменен
Springer International Publishing AG, 2018. — 330 p. — ISBN 3319749617. Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both...
  • №286
  • 7,82 МБ
  • добавлен
  • изменен
Joel Scambray, Vincent Liu, Caleb Sima. Hacking Exposed. Web applications: Web application security secrets and solutions (Third Edition). Graw-Hill, 2011. - 478 p. Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web...
  • №287
  • 6,95 МБ
  • дата добавления неизвестна
  • изменен
McGraw-Hill, 2007, 3rd Edition - 451 pages; ISBN-13: 978-0071494267; на англ. языке Book Description Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See...
  • №288
  • 9,66 МБ
  • добавлен
  • изменен
Rowman & Littlefield International, 2018. — 288 p. — ISBN 10 1786606798, 13 978-1786606792. Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war. Governments around the globe have started to develop cyber security strategies, governance and operations to consider cyberspace as an...
  • №289
  • 17,38 МБ
  • добавлен
  • изменен
Springer, 2017. — 150 p. — ISBN 10 3319536338. — ISBN 13 978-3319536330. This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and the implementation of social media applications and big data innovations, it analyzes threat perceptions regarding privacy and cyber security, and examines socio-political...
  • №290
  • 1,65 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2017. — 190 p. — ISBN 10 1973774178, ISBN 13 978-1973774174. Preview ebook Critical Infrastructure Information Security systems are failing under persistent adversarial efforts because too many organizations still depend on antiquated legacy systems, un-cyber-hygienic personnel, and devices that lack security-by-design. The...
  • №291
  • 5,75 МБ
  • добавлен
  • изменен
Weldon Owen, 2017. — 224 p. — ISBN-13 978-1681881751. As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just...
  • №292
  • 8,21 МБ
  • добавлен
  • изменен
Weldon Owen, 2017. — 224 p. — ISBN-13 978-1681881751. As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just...
  • №293
  • 6,84 МБ
  • добавлен
  • изменен
Weldon Owen, 2017. — 272 p. — ISBN 10 1681881756, 13 978-1681881751. As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even...
  • №294
  • 8,32 МБ
  • добавлен
  • изменен
McGraw-Hill, 2014. — 625 p. — 4th ed. — ISBN: 9780071800150, 9780071800143 Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You’ll get detailed explanations of each tool’s function along with best practices for configuration and...
  • №295
  • 35,35 МБ
  • добавлен
  • изменен
Gatorbytes, 2017. — 74 p. — (Gatorbytes). — ISBN 10 1942852134, 13 978-1942852131. Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices-everything from computers and mobile phones to traffic cameras and pacemakers-will reach 50 billion by 2050. That number is...
  • №296
  • 1,79 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform, 2016. — 104 р. Hacking. In the digital age the word conjures up images of individuals in darkened basements, breaking into multi-national company’s computer systems, leaking sensitive information and living on takeaways – never seeing the light of day. But reality is very different and there are many, who are novices at hacking,...
  • №297
  • 10,87 МБ
  • добавлен
  • изменен
Course Technology, 2013. — 464 p. — ISBN-13 978-1133935612. 's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security...
  • №298
  • 83,36 МБ
  • добавлен
  • изменен
Это подборка лучших глав о взломе винды ХР, а также об обеспечении её безопасности от и до. Просто огромный мануал о скрытых настройках Windows XP, оптимизации, командная строка, регистр, и многое другое в доступной и понятной форме как для юных молодых хакеров, так и для тех людей, которые хотят себя обезопасить от возможных угроз. Книга высокого уровня и в удачном исполнении....
  • №299
  • 10,14 МБ
  • дата добавления неизвестна
  • изменен
Year: 2016 This book is intended for complete programming beginners or general people who know nothing about any programming language but want to learn ethical hacking. Ethical Hacking, by no means, is associated with any kind of illegal electronic activities. They always stay within laws. This book is intended for those people – young and old – who are creative and curious and...
  • №300
  • 1,61 МБ
  • добавлен
  • изменен
Auerbach Publications, 2017. — 416 p. — ISBN 10 1138031828, 13 978-1138031821. Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to single...
  • №301
  • 15,52 МБ
  • добавлен
  • изменен
Wiley-IEEE Press, 2018. — 457 p. — ISBN 978-1-119-22604-8. Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and...
  • №302
  • 7,57 МБ
  • добавлен
  • изменен
Nova Science Publishers, Inc., 2017. — 281 p. — (Cybercrime and Cybersecurity Research). — ISBN 10 1536129429, 13 978-1536129427. This book presents the current popular issues in information security and privacy, covering human users, hardware and software, the Internet and also communication protocols. The book provides a comprehensive combination of studies that offer integrated...
  • №303
  • 10,17 МБ
  • добавлен
  • изменен
Notion Press, 2015. — 158 р. — ISBN 978-9352061273. Authors and ardent techies, Sahil Baghla and Arun Soni share their innate wisdom on protecting yourself and your family from certain vices of technology. They also show us how to make the most of it! With just a little help from our trusty computers and smart phones, the duo educate us on a variety of practical applications and...
  • №304
  • 14,47 МБ
  • добавлен
  • изменен
Elsevier, 2014. — 146 p. Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve...
  • №305
  • 5,51 МБ
  • добавлен
  • изменен
ISBN-13: 9781402295614, Publisher: Sourcebooks, Incorporated, Publication date: 11/18/2014, Pages: 256 In Spam Nation, investigative journalist and cybersecurity expert Brian Krebs unmasks the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital...
  • №306
  • 1,41 МБ
  • добавлен
  • изменен
Independently Published, 2018. — 590 p. — ISBN 978-1983005473, 1983005479. EC-Council Certified Ethical Hacking (CEH) v10 Exam 312-50 Latest v10. This updated version includes two major enhancement, New modules added to cover complete CEHv10 blueprint. Book scrutinized to rectify grammar, punctuation, spelling and vocabulary errors. CEHv10 Update CEH v10 covers new modules for the...
  • №307
  • 93,33 МБ
  • добавлен
  • изменен
Santa-Barbara: ABC-Clio, 2017. — 400 p. This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century. Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to...
  • №308
  • 23,25 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 142 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
  • №309
  • 1,81 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 65 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and tricks...
  • №310
  • 2,27 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 106 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
  • №311
  • 1,77 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 107 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
  • №312
  • 2,04 МБ
  • добавлен
  • изменен
Wiley Publishing, 2007. - 425 p. ISBN: 0471917109 A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers...
  • №313
  • 6,91 МБ
  • добавлен
  • изменен
Business Expert Press, 2018. — 168 p. — ISBN 10 1947441469, 13 978-1947441460. Until recently, if it has been considered at all in the context of business continuity, cyber security may have been thought of in terms of disaster recovery and little else. Recent events have shown that cyber-attacks are now an everyday occurrence, and it is becoming clear that the impact of these can...
  • №314
  • 2,21 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 318 p. — ISBN 978-1-78528-781-7. Develop the capacity to dig deeper into mobile device data acquisition Mobile forensics presents a real challenge to the forensic community due to the fast and unstoppable changes in technology. This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with...
  • №315
  • 15,67 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 330 p. — ISBN 978-1787120365. Learn the art of preventing digital extortion and securing confidential data About This Book Get acquainted with multiple cyber extortion attacks and techniques to mitigate them Learn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloud A concise, fast-paced...
  • №316
  • 6,64 МБ
  • добавлен
  • изменен
Packt Publishing, 2017. — 330 p. — ISBN 978-1787120365. +True PDF Learn the art of preventing digital extortion and securing confidential data. Get acquainted with multiple cyber extortion attacks and techniques to mitigate them Learn how DDOS, Crypto Virus, and other cyber extortion techniques can infect your computers, smartphones, servers, and cloud A concise, fast-paced guide...
  • №317
  • 21,79 МБ
  • добавлен
  • изменен
Course Technology, 2009. - 352 р. ISBN: 143548360X Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...
  • №318
  • 17,06 МБ
  • добавлен
  • изменен
Course Technology, 2009. - 192 p. ISBN: 1435483650 The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be...
  • №319
  • 7,90 МБ
  • добавлен
  • изменен
Course Technology, 2009. - 309 p. ISBN: 1435483618 This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By...
  • №320
  • 15,24 МБ
  • добавлен
  • изменен
Course Technology, 2009. - 239 p. Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and...
  • №321
  • 13,45 МБ
  • добавлен
  • изменен
Bath: Future plc, 2014. — 146 p. Fully Revised & Updated for 2014. Over 80 hacking tutorials to get your teeth into! Networking – dive into the protocols, build a network and analyse your traffic. Sysadmin – harness the power of Docker and learn time-saving terminal tricks. Hacking – get a full Linux OS on your phone and hack your distro for speed. Privacy – give The Man the...
  • №322
  • 32,28 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 34 p. — ASIN B073S5QV5V. Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest. What does this app do? Well, if you think about the way technology is moving, it does not do much for you but you can use it for chatting with friends,...
  • №323
  • 750,84 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 56 p. — ASIN B073S5QV5V. Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest. What does this app do? Well, if you think about the way technology is moving, it does not do much for you but you can use it for chatting with friends,...
  • №324
  • 289,57 КБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2017. — 54 p. — ASIN B073S5QV5V. Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest. What does this app do? Well, if you think about the way technology is moving, it does not do much for you but you can use it for chatting with friends,...
  • №325
  • 1,11 МБ
  • добавлен
  • изменен
Wiley, 2014. — 411 p. — ISBN: 1118888146, 9781118888148 Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers 'What to Do When You Get...
  • №326
  • 1,77 МБ
  • добавлен
  • изменен
O’Reilly Media, 2019. — 300 р. — ISBN 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical...
  • №327
  • 2,55 МБ
  • добавлен
  • изменен
O’Reilly Media, 2019. — 300 р. — ISBN 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical...
  • №328
  • 2,21 МБ
  • добавлен
  • изменен
O’Reilly Media, 2019. — 300 р. — ISBN 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical...
  • №329
  • 835,06 КБ
  • добавлен
  • изменен
O’Reilly Media, 2019. — 300 р. — ISBN 1492041319. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical...
  • №330
  • 760,57 КБ
  • добавлен
  • изменен
CreateSpace Independent Publishing, 2016. — 386 p. — ISBN 978-1523764365. Written by an expert in Computer Science and Information Security with ten years of experience in his field at the time of writing, The Hacker Ethos was specifically designed to be put in the hands of the beginner-level hacker, IT professional, and hopeful IT security researcher. This book covers the...
  • №331
  • 2,41 МБ
  • добавлен
  • изменен
Secure Web Apps, 2016. Cyber security can be very mysterious. The constant news about hacking can be very frightening. Either can leave you wondering if you will be the next victim. This book is for the majority of people who aren’t involved in cyber security for a living. It’s for those who do other things. It’s an attempt to make cyber security simple, to acquaint you with...
  • №332
  • 1,53 МБ
  • добавлен
  • изменен
CRC Press, 2011. — 412 p. — ISBN 9781439821190. As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them.
  • №333
  • 22,84 МБ
  • добавлен
  • изменен
Packt Publishing, 2016. — 312 p. — ISBN 9781785883378. Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be...
  • №334
  • 11,07 МБ
  • добавлен
  • изменен
McGraw-Hill, 2019. - 384p. - ISBN: 1260455084 4th.ed Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v10 exam objectives, this practical guide contains more than 600...
  • №335
  • 4,41 МБ
  • добавлен
  • изменен
3rd Ed. — McGraw-Hill Education, 2017. — 893 p. — ISBN 10 125983753X, 13 978-1259837531. Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified...
  • №336
  • 17,03 МБ
  • добавлен
  • изменен
McGraw-Hill. New York, USA. 2014. 2nd Edition. 408 pages. Includes glossary and index. ISBN-10: 0071836489; ISBN-13: 978-0071836487 Fully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and...
  • №337
  • 33,91 МБ
  • добавлен
  • изменен
3rd Ed. — McGraw-Hill Education, 2016. — 364 p. — (All-In-One). — ISBN 1259836606. — ISBN 978-1259836602. Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the...
  • №338
  • 4,08 МБ
  • добавлен
  • изменен
Apress, 2017. — 240 p. — ISIN 978-1484224298. Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers...
  • №339
  • 3,27 МБ
  • добавлен
  • изменен
No Starch Press, 2014 - 528; ISBN-13: 978-1-59327-564-8; на англ. языке. Book Description Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer...
  • №340
  • 12,20 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2009. — 312 p. — ISBN 9780321498816. The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex...
  • №341
  • 12,53 МБ
  • добавлен
  • изменен
CreateSpace Independent Publishing Platform; Version 1 from 02.13.2017. — 144 p. — ISBN-13 978-1541016361; ISBN-10 154101636X. Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow...
  • №342
  • 5,66 МБ
  • добавлен
  • изменен
Syngress, Elsevier, 2012., - 264 p., ISBN: 978-1-59749-665-0 Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the...
  • №343
  • 7,65 МБ
  • добавлен
  • изменен
Syngress, 2010. - 376 pages ISBN: 1597495883 Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...
  • №344
  • 9,86 МБ
  • добавлен
  • изменен
Elsevier, 2011. - 313 p. ISBN: 1597495883 Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing...
  • №345
  • 12,07 МБ
  • добавлен
  • изменен
Springer, 2019. — 230 p. — ISBN 3030045307. This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive...
  • №346
  • 6,24 МБ
  • добавлен
  • изменен
Amazon Digital Services LLC, 2018. — 175 р. Ethical hackers are in high demand. As we become more and more reliant on computer technology, black-hat hackers are working to profit from exploiting those technologies to steal personal information, so this is a perfect ethical hacking book for beginners 2019. In this we will learn basic of hacking and how to protect yourself from...
  • №347
  • 7,89 МБ
  • добавлен
  • изменен
Addison-Wesley Professional, 2017. — 347 p. — (SEI Series in Software Engineering) — ISBN 978-0-134-18980-2. Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best...
  • №348
  • 22,48 МБ
  • добавлен
  • изменен
Springer Verlag, Singapore, 2019. — 152 p. — ISBN 9789811366208 This book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile...
  • №349
  • 9,30 МБ
  • добавлен
  • изменен
Springer Verlag, Singapore, 2019. — 152 p. — ISBN 9789811366208 This book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile...
  • №350
  • 10,29 МБ
  • добавлен
  • изменен
Springer, 2019. — 1476 p. — (Advances in Intelligent Systems and Computing). — ISBN 10 3030152340, 13 978-3030152345. This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber...
  • №351
  • 68,34 МБ
  • добавлен
  • изменен
Springer, 2015. — 285 p. This volume gives readers a glimpse, by all means far from being comprehensive, on new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to issues related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis...
  • №352
  • 7,38 МБ
  • добавлен
  • изменен
Springer Nature Switzerland AG, 2019. — xi+436 p. — ISBN 978-3-319-72536-9. This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an...
  • №353
  • 5,37 МБ
  • добавлен
  • изменен
Leanpub, 2018. - 254 p. On December 22, 2015, Twitter paid over $14,000 to ethical hackers for exposing vulnerabilities. This wasn't a shakedown. Sites like Twitter, Shopify, Dropbox, Yahoo, Google, Facebook and more, ask ethical hackers to report security bugs and pay them. This book will teach you how you can get started with ethical hacking. With a Foreword written by HackerOne...
  • №354
  • 9,37 МБ
  • добавлен
  • изменен
Leanpub, 2015-2016. — 142 p. How to Make Money Hacking Ethically. With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilies or...
  • №355
  • 5,87 МБ
  • добавлен
  • изменен
Издательство CRC Press, 2004, -849 pp. The book moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around...
  • №356
  • 9,91 МБ
  • добавлен
  • изменен