TakeBooks.com TakeBooks.com TakeBooks.com
TakeBooks.com
TakeBooks.com
  Каталог> Знания и навыки> Компьютерная литература>

Информационная безопасность

TakeBooks.com
TakeBooks.com
 Каталог
:: Java книги
:: Авто
:: Астрология
:: Аудио книги
:: Биографии и Мемуары
:: В мире животных
:: Гуманитарные и общественные науки
:: Детские книги
:: Для взрослых
:: Для детей
:: Дом, дача
:: Журналы
:: Зарубежная литература
:: Знания и навыки
   :Бизнес-книги
   :Компьютерная литература
     :Базы данных
     :Зарубежная компьютерная литература
     :Интернет
     :Информационная безопасность
     :Книги о компьютерах
     :Компьютерное железо
     :Ос и сети
     :Программирование
     :Программы
   :Научно-популярная литература
   :Словари, справочники
   :Учебная и научная литература
:: Издательские решения
:: Искусство
:: История
:: Компьютеры
:: Кулинария
:: Культура
:: Легкое чтение
:: Медицина и человек
:: Менеджмент
:: Наука и образование
:: Оружие
:: Программирование
:: Психология
:: Психология, мотивация
:: Публицистика и периодические издания
:: Разное
:: Религия
:: Родителям
:: Серьезное чтение
:: Спорт
:: Спорт, здоровье, красота
:: Справочники
:: Техника и конструкции
:: Учебная и научная литература
:: Фен-Шуй
:: Философия
:: Хобби, досуг
:: Художественная лит-ра
:: Эзотерика
:: Экономика и финансы
:: Энциклопедии
:: Юриспруденция и право
:: Языки
 Новинки
Haval F7 / F7x since 2018, wiring diagrams (in Russian)
Haval F7 / F7x since 2018, wiring diagrams (in Russian)
 
 
 Информационная безопасность
    Наименование 
 Network Security Bible
227209
 Network Security Bible

 Автор: Eric Cole

  The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organiza
...
 Schneier on Security
227202
 Schneier on Security

 Автор: Bruce Schneier

  Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay – figuratively and literally – when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sp
...
 Computer Forensics For Dummies
227026
 Computer Forensics For Dummies

 Автор: Reynaldo Anzaldua

  Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You’ll learn all about e-mail
...


 The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
226554
 The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

 Автор: Kevin D. Mitnick

  Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use «social engineering» to
...
 The Oracle Hacker's Handbook. Hacking and Defending Oracle
226103
 The Oracle Hacker's Handbook. Hacking and Defending Oracle

 Автор: David Litchfield

  David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chanc
...
 Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
225512
 Mission-Critical Security Planner. When Hackers Won't Take No for an Answer

 Автор: Eric Greenberg

  Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Present
...
 Сетевая защита на базе технологий фирмы Cisco Systems. Практический курс. Учебное пособие
221372
 Сетевая защита на базе технологий фирмы Cisco Systems. Практический курс. Учебное пособие

 Автор: А. Н. Андрончик
 Год: 2018
 Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
220816
 Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security

 Автор: Gary Jackson M.

  A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of s
...
 Carry On. Sound Advice from Schneier on Security
220757
 Carry On. Sound Advice from Schneier on Security

 Автор: Bruce Schneier

  Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the P
...
Показано 163 - 171 (всего 423 позиций)
Страницы: [<< Предыдущая]   [Следующая >>] 
11 12 13 14 15 16 17 18 19 20
Отзывы 
Транзисторный радиоприемник «Минск-62»
Классно, когда можно найти такие старые книги!!! там все нап ..
5 из 5 звёзд!
 Рекомендуем
Самоучитель хакера
Самоучитель хакера
 Информация 
Свяжитесь с нами
Как скачать и чем читать
 
  Quiero dinero © 2007