Книги жанра Информационная безопасность - скачать бесплатно в fb2 или читать онлайн | Bookz.ru - Cтраница 2
bannerbanner

Книги жанра Информационная безопасность

Mike Chappleзарубежная компьютерная литература, информационная безопасность
4
Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all ex…
Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CSA+) Study Guide provides 100% coverage of all ex…
Wade Alcornзарубежная компьютерная литература, информационная безопасность
5
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hack…
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hack…
Jessey Bullockзарубежная компьютерная литература, информационная безопасность
5
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, yo…
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, yo…
Michael Lighзарубежная компьютерная литература, информационная безопасность
4
A computer forensics «how-to» for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ev…
A computer forensics «how-to» for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ev…
Steve Buntingзарубежная компьютерная литература, информационная безопасность
4
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehen…
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehen…
Russell Dean Vinesзарубежная компьютерная литература, информационная безопасность
5
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small…
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small…
Russell Dean Vinesзарубежная компьютерная литература, информационная безопасность
5
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small…
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small…
Emmanuel Goldsteinзарубежная компьютерная литература, информационная безопасность
4
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600:…
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600:…
Joshua Daviesзарубежная компьютерная литература, информационная безопасность
3
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programm…
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programm…
Darril Gibsonзарубежная компьютерная литература, информационная безопасность
3
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT.…
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT.…
Hadi Nahariзарубежная компьютерная литература, информационная безопасность
3
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop sec…
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop sec…
Bruce Schneierзарубежная компьютерная литература, информационная безопасность
3
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping in…
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping in…
Gary M. Jacksonзарубежная компьютерная литература, информационная безопасность
4
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world securi…
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world securi…
Eric Greenbergзарубежная компьютерная литература, информационная безопасность
3
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting tech…
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting tech…
David Litchfieldзарубежная компьютерная литература, информационная безопасность
4
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them.…
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them.…
Network Security Bible
Eric Coleзарубежная компьютерная литература, информационная безопасность
3
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensiv…
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensiv…
Adam Youngзарубежная компьютерная литература, информационная безопасность
4
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber…
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber…
John Chirilloзарубежная компьютерная литература, информационная безопасность
5
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or o…
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or o…
Wil Allsoppзарубежная компьютерная литература, информационная безопасность
3
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on kee…
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on kee…
Lynn Margaret Battenзарубежная компьютерная литература, информационная безопасность
5
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attackin…
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attackin…
bannerbanner