Книги жанра Информационная безопасность
Mark Stampзарубежная компьютерная литература, информационная безопасность
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses a…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses a…
Markus Jakobssonзарубежная компьютерная литература, информационная безопасность
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness t…
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness t…
Igor Bernikзарубежная компьютерная литература, информационная безопасность
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describe…
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describe…
Rudis Bobужасы / мистика, ужасы, информационная безопасность
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase the…
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase the…
Mike Chappleзарубежная компьютерная литература, информационная безопасность
World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the ne…
World-class preparation for the new PenTest+ exam The CompTIA PenTest+ Study Guide: Exam PT0-001 offers comprehensive preparation for the ne…
Timothy Rooneyзарубежная компьютерная литература, информационная безопасность
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network m…
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network m…
Man Young Rheeзарубежная компьютерная литература, информационная безопасность
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology ha…
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology ha…
Mark Stampзарубежная компьютерная литература, информационная безопасность
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses a…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses a…
Lynn Margaret Battenзарубежная компьютерная литература, информационная безопасность
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attackin…
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attackin…
Kevin Beaverзарубежная компьютерная литература, информационная безопасность
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not!…
Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not!…
Кристофер Хэднегизарубежная компьютерная литература, информационная безопасность
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge…
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge…
Кристофер Хэднегизарубежная компьютерная литература, информационная безопасность
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combini…
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combini…
Bruce Schneierзарубежная компьютерная литература, информационная безопасность
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentato…
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentato…
Kevin D. Mitnickзарубежная компьютерная литература, информационная безопасность
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most ce…
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most ce…
Reynaldo Anzalduaзарубежная компьютерная литература, информационная безопасность
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional a…
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional a…
Bruce Schneierзарубежная компьютерная литература, информационная безопасность
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the …
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the …
Matthew Strebeзарубежная компьютерная литература, информационная безопасность
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year,…
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year,…
Kevin Beaverзарубежная компьютерная литература, информационная безопасность
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, th…
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, th…
И. С. Лебедевтехнические науки, информатика и вычислительная техника, защита информации, автоматизированные системы управления, информационная безопасность, кибербезопасность
В статье исследована задача определения состояния информационной безопасности автономных объектов с использованием информации, полученной по…
В статье исследована задача определения состояния информационной безопасности автономных объектов с использованием информации, полученной по…
И. С. Лебедевтехнические науки, информатика и вычислительная техника, защита информации, автоматизированные системы управления, информационная безопасность, кибербезопасность
В статье исследована задача определения состояния информационной безопасности автономных объектов с использованием информации, полученной по…
В статье исследована задача определения состояния информационной безопасности автономных объектов с использованием информации, полученной по…