TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Информационная безопасность

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
GM 6T40 / 6T45, руководство по ремонту коробки передач в электронном виде (на английском языке)
GM 6T40 / 6T45, руководство по ремонту коробки передач в электронном виде (на английском языке)
 
 
 Информационная безопасность
    Наименование 
 Cryptography Engineering. Design Principles and Practical Applications
220579
 Cryptography Engineering. Design Principles and Practical Applications

 Автор: Bruce Schneier

  The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to t
...
 Web Commerce Security. Design and Development
220578
 Web Commerce Security. Design and Development

 Автор: Hadi Nahari

  A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce
...
 Microsoft Windows Security Essentials
220140
 Microsoft Windows Security Essentials

 Автор: Darril Gibson

  Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon wh
...


 Unmasking the Social Engineer. The Human Element of Security
219337
 Unmasking the Social Engineer. The Human Element of Security

 Автор: Кристофер Хэднеги

  Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing th
...
 Cloud Security. A Comprehensive Guide to Secure Cloud Computing
217649
 Cloud Security. A Comprehensive Guide to Secure Cloud Computing

 Автор: Russell Vines Dean

  Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad
...
 Mastering Windows Network Forensics and Investigation
217541
 Mastering Windows Network Forensics and Investigation

 Автор: Steve Bunting

  An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book–aimed at law enforcement personnel, prosecutors, and corporate investigators–provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of comp
...
 Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
217464
 Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code

 Автор: Michael Ligh

  A computer forensics «how-to» for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a
...
 The Best of 2600, Collector's Edition. A Hacker Odyssey
217355
 The Best of 2600, Collector's Edition. A Hacker Odyssey

 Автор: Emmanuel Goldstein

  In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans of 2600 a compilation of fascinating—and controversial—articles. Cult author and hacker Emmanuel Goldstein has collected some of the strongest, most interesting, and often provocat
...
 Implementing SSL / TLS Using Cryptography and PKI
217332
 Implementing SSL / TLS Using Cryptography and PKI

 Автор: Joshua Davies

  Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations
...
Показано 154 - 162 (всего 423 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
11 12 13 14 15 16 17 18 19 20
Отзывы 
Богдатский вор
если бы действительно можно было бы прочитать книгу, то отзы ..
1 из 5 звёзд!
 Рекомендуем
Секреты уличных знакомств
Секреты уличных знакомств
 Информация 
Свяжитесь с нами
Как скачать и чем читать
 
  Quiero dinero © 2007