А Б В Г Д Е Ж З И К Л М Н О П Р С Т У Ф Х Ц Ч Ш Щ Э Ю Я
0-9 A B C D I F G H IJ K L M N O P Q R S TU V WX Y Z #

Книги по компьютерной безопасности бесплатно



Security in IoT-Enabled Spaces
скачать Security in IoT-Enabled Spaces бесплатно
Название: Security in IoT-Enabled Spaces
Автор: Fadi Al-Turjman
Страниц: 287
Формат: PDF
Размер: 10.1 MB
Качество: Отличное
Язык: Английский
Год издания: 2019


 Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor

 

 

Hacking with Kali Linux: A beginner’s guide to learning all the basic of Kali Linux and cybersecurity. Includes network defense strategies, penetration testing and hacking tools for computer
скачать Hacking with Kali Linux: A beginner’s guide to learning all the basic of Kali Linux and cybersecurity. Includes network defense strategies, penetration testing and hacking tools for computer бесплатно
Название: Hacking with Kali Linux: A beginner’s guide to learning all the basic of Kali Linux and cybersecurity. Includes network defense strategies, penetration testing and hacking tools for computer
Автор: Norman Laurence
Страниц: 142
Формат: EPUB
Размер: 10.1 MB
Качество: Отличное
Язык: Английский
Год издания: 2020


 This book is going to teach you how hackers reason. Besides understanding the reasons why a hacker would target your computer, you will also get to know how they are able to do it and even how you can safeguard your systems, equipment, and network against hacking attacks. Keen readers will, by the end of this book, understand how their systems work, how to scan, and how to gain access to your computer.

 

 

Защита от взлома. Сокеты, shell-код, эксплойты - Джеймс С. Фостер.
скачать Защита от взлома. Сокеты, shell-код, эксплойты - Джеймс С. Фостер. бесплатно
Название: Защита от взлома. Сокеты, shell-код, эксплойты - Джеймс С. Фостер.
Автор: Джеймс С. Фостер.
Формат: DJVU
Размер: 38 Mb
Качество: Отличное
Язык: Русский
Год издания: 2006


В своей книге Джеймс Фостер, автор ряда бестселлеров, показывает методы, которыми пользуются хакеры для атак на операционные системы и прикладные программы. Он приводит примеры работающего кода на языках C/C++, Java, Perl и NASL, в которых иллюстрируются методы обнаружения и защиты от наиболее опасных атак.

 

 

Design and Analysis of Security Protocol for Communication
скачать Design and Analysis of Security Protocol for Communication бесплатно
Название: Design and Analysis of Security Protocol for Communication
Автор: Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O.P. Verma
Страниц: 368
Формат: PDF
Размер: 7 mb
Качество: Отличное
Язык: Английский
Год издания: 2020


The purpose of designing this book is to discuss and analyze security protocols available for communication.


 

 

Introduction to Cryptography with Coding Theory, 3rd Edition
скачать Introduction to Cryptography with Coding Theory, 3rd Edition бесплатно
Название: Introduction to Cryptography with Coding Theory, 3rd Edition
Автор: Wade Trappe, Lawrence C. Washington
Страниц: 620
Формат: EPUB
Размер: 11.4 MB
Качество: Отличное
Язык: Английский
Год издания: 2020


 A broad spectrum of cryptography topics, covered from a mathematical point of view. Extensively revised and updated, the 3rd Edition of Introduction to Cryptography with Coding Theory mixes applied and theoretical aspects to build a solid foundation in cryptography and security. The authors’ lively, conversational tone and practical focus inform a broad coverage of topics from a mathematical point of view, and reflect the most recent trends in the rapidly changing field of cryptography.

 

 

Intrusion Detection: A Data Mining Approach
скачать Intrusion Detection: A Data Mining Approach бесплатно
Название: Intrusion Detection: A Data Mining Approach
Автор: Nandita Sengupta, Jaya Sil
Страниц: 151
Формат: PDF
Размер: 10.1 MB
Качество: Отличное
Язык: Английский
Год издания: 2020


 This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters

 

 

Data Science in Cybersecurity and Cyberthreat Intelligence
скачать Data Science in Cybersecurity and Cyberthreat Intelligence бесплатно
Название: Data Science in Cybersecurity and Cyberthreat Intelligence
Автор: Leslie F. Sikos, Kim-Kwang Raymond Choo
Страниц: 140
Формат: PDF
Размер: 10.1 MB
Качество: Отличное
Язык: Английский
Год издания: 2020


 This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables.

 

 

Applied Incident Response
скачать Applied Incident Response бесплатно
Название: Applied Incident Response
Автор: Steve Anson
Страниц: 464
Формат: PDF
Размер: 20 mb
Качество: Отличное
Язык: Английский
Год издания: 2020


Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them.


 

 

Digital Forensics and Incident Response, 2nd Edition
скачать Digital Forensics and Incident Response, 2nd Edition бесплатно
Название: Digital Forensics and Incident Response, 2nd Edition
Автор: Gerard Johansen
Страниц: 448
Формат: EPUB, PDF
Размер: 65 mb, 67 mb
Качество: Отличное
Язык: Английский
Год издания: 2020


Incident response techniques and procedures to respond to modern cyber threats


 

 

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
скачать Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques бесплатно
Название: Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
Автор: Vinny Troia
Страниц: 514
Формат: PDF
Размер: 31.5 MB
Качество: Отличное
Язык: Английский
Год издания: 2020


 The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization.

 

 



Навигация по сайту


Читательские рекомендации

Информация