Зарегистрироваться
Восстановить пароль
FAQ по входу

Безопасность информационных сетей

A
Wiley, 2017. — 288 p. — ISBN: 978-1119367680. Build a better defense against motivated, organized, professional attacks. Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali Linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive...
  • №1
  • 6,17 МБ
  • добавлен
  • описание отредактировано
Academic Press, 2021. — 268 p. — ISBN 9780128215999. Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for...
  • №2
  • 37,83 МБ
  • добавлен
  • описание отредактировано
Babelcube Inc., 2017. — 207 p. Wireless Hacking 101 - How to hack wireless networks easily! This book is perfect for computer enthusiasts that want to gain expertise in the interesting world of ethical hacking and that wish to start conducting wireless pentesting. Inside you will find step-by-step instructions about how to exploit Wi-Fi networks using the tools within the known...
  • №3
  • 2,48 МБ
  • добавлен
  • описание отредактировано
B
Matthew Baker, Brandon Beck, Doron Chosnek, Jason McGee, Sean McKeown. — Cisco Press, 2023. — 320 p. — ISBN-13: 978-0-13-789973-9. Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and...
  • №4
  • 27,71 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley, 2004. — 798 p. This book is for security professionals of all skill levels and inclinations. The primary audience includes network security architects looking for ways to improve their understanding of their network security posture. My goal is to provide tools and techniques to increase visibility and comprehension of network traffic. If you feel let down by your...
  • №5
  • 13,83 МБ
  • добавлен
  • описание отредактировано
C
Packt Publishing Limited, 2018. — 316 p. — ISBN: 978-1-78883-923-5. Get more from your network by securing its infrastructure and increasing its effectiveness Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in...
  • №6
  • 12,39 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — O’Reilly Media, Inc., 2017. — 622 p. Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions...
  • №7
  • 547,73 КБ
  • добавлен
  • описание отредактировано
O’Reilly Media, 2017. — 400 p. — ISBN: 978-1-491-96284-8. Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...
  • №8
  • 4,03 МБ
  • добавлен
  • описание отредактировано
D
CRC Press, 2020. — 224 p. — ISBN: 978-1-003-08121-0 (ebk). Web applications occupy a large space within the IT infrastructure of a business or a corporation. They simply just don’t touch a front end or a back end; today’s web apps impact just about every corner of it. Today’s web apps have become complex, which has made them a prime target for sophisticated cyberattacks. As a...
  • №9
  • 2,87 МБ
  • добавлен
  • описание отредактировано
Packt, 2022. — 464 p. — ISBN 1801816875, 9781801816878. Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with ease Key Features Learn end-to-end OPNsense firewall implementation and management Defend against attacks by leveraging third-party plugins such as Nginx and Sensei Grasp hands-on examples and labs to...
  • №10
  • 17,99 МБ
  • добавлен
  • описание отредактировано
E
BPB Publications, 2023. — 303 р. — ISBN 978-93-5551-275-8. Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks. Key Features ● Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. ● Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. ●...
  • №11
  • 10,34 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — BPB Publications, 2024. — 446 p. — ISBN: 978-93-55519-436. Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition...
  • №12
  • 32,06 МБ
  • добавлен
  • описание отредактировано
F
No Starch Press, 2018. — 336 p. — ISBN: 978-1-59327-750-5. Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive guide looks at networking from an attacker’s perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You’ll start with a rundown of...
  • №13
  • 28,51 МБ
  • добавлен
  • описание отредактировано
G
Apress, 2021. — 306 p. — ISBN 9781484267011. Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise...
  • №14
  • 6,95 МБ
  • добавлен
  • описание отредактировано
Orange Education Pvt Ltd, AVA, 2024. — 747 p. — ISBN 978-81-97081-87-3. Максимальное тестирование на проникновение для веб-приложений: разблокируйте расширенную безопасность веб-приложений посредством тестирования на проникновение с использованием Burp Suite, Zap Proxy, Fiddler, Charles Proxy и Python для надежной защиты. Discover the essential tools and insights to safeguard...
  • №15
  • 7,32 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, 2017. — 240 p. — ISBN: 978-1491962190. The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the...
  • №16
  • 2,45 МБ
  • добавлен
  • описание отредактировано
Springer, 2018. — 426 p. — ISBN: 3319981609. This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be...
  • №17
  • 36,90 МБ
  • добавлен
  • описание отредактировано
Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier. — Cisco Press, 2023. — 336 p. — ISBN-13: 978-0-13-789973-9. Архитектура нулевого доверия Today’s organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people,...
  • №18
  • 9,42 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2021. — 526 p. — ISBN 978-93-89328-547. Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applications. We begin with exposure to modern application...
  • №19
  • 11,54 МБ
  • добавлен
  • описание отредактировано
H
3rd Edition. — Jones & Bartlett Learning, 2022. — 450 р. — ISBN 978-1284206166. Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive...
  • №20
  • 19,37 МБ
  • добавлен
  • описание отредактировано
J
Packt Publishing, 2019. — 692 p. — ISBN10: 1838642307, 13 978-1838642303. Digitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various...
  • №21
  • 37,76 МБ
  • добавлен
  • описание отредактировано
K
3rd edition. — Addison-Wesley, 2023. — 544 p. — ISBN 0136643604. Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have...
  • №22
  • 8,22 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2019. — 504 p. — ISBN: 178899082X. Implement defensive techniques in your ecosystem successfully with Python Key Features Identify and expose vulnerabilities in your infrastructure with Python Learn custom exploit development. Make robust and powerful cybersecurity tools with Python Book Description With the current technological and infrastructural shift,...
  • №23
  • 35,97 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2018. — 294 p. — ISBN: 1788624033. Learn how to execute web application penetration testing from end to end. Key Features Build an end to end threat model landscape for Web Application Security Gain hands-on experience of using tools like Nmap, Metasploit, and Burp Suite Understand the web application vulnerabilities and learn the heart of web intrusion...
  • №24
  • 7,59 МБ
  • добавлен
  • описание отредактировано
L
Wiley-Scrivener, 2019. — 330 p. — ISBN: 978-1-119-59226-6. The book provides cutting-edge research that delivers insights into the tools, opportunities, novel strategies, techniques, and challenges for handling security issues in cloud computing, Internet of Things and social networking. Security concerns around the rapid growth and variety of devices that are controlled and...
  • №25
  • 14,70 МБ
  • добавлен
  • описание отредактировано
M
River Publishers, 2025. — 258 p. — ISBN 978-87-7004-698-5. This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who may lack formal training in cybersecurity or those seeking to update...
  • №26
  • 52,05 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2018. — 240 p. Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Bug bounties have quickly become a critical part of the security economy. This book shows...
  • №27
  • 18,97 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2018. - 138p. - ISBN: 178953397X Leverage the simplicity of Python and available libraries to build web security testing tools for your application Key Features Understand the web application penetration testing methodology and toolkit using Python Write a web crawler/spider with the Scrapy library Detect and exploit SQL injection vulnerabilities by creating a...
  • №28
  • 4,42 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2016. — 16 p. — ASIN: B01L4LE4XM Do you sometimes encounter sudden drops in your Wi-Fi internet connection speed? It is possible that someone could be messing around with your Wi-Fi. No, one does not need to be a hacker to hack Wi-Fi networks. There are many FREE Wi-Fi hacking software flying around. One such example is "WEPCrack - An 802.11 key...
  • №29
  • 81,84 КБ
  • добавлен
  • описание отредактировано
Independently published, 2023. — 176 p. — SBN-10: B0CB1X8B5N. Unleash the Power of Web Penetration Testing: Safeguard Your Applications from Cyber Threats In an increasingly interconnected world, the security of web applications is of paramount importance. Dive into the captivating realm of web penetration testing and become a master of safeguarding your applications against...
  • №30
  • 6,84 МБ
  • добавлен
  • описание отредактировано
R
2nd Edition. — Rais Razi, Morillo Christina, Gilman Evan, Doug Barth. — O’Reilly Media, 2024. — 332 p. — ISBN: 978-1-492-09659-7. This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never...
  • №31
  • 8,57 МБ
  • добавлен
  • описание отредактировано
S
Independently published, 2020. — 287 p. — ASIN B08YWHQTFQ. It provides a holistic view of modern network security including operating system hardening, Firewalls, intrusion-detection systems, VPNs and Encryption.Physical Security, Standards, System Security and Security Policies are also included. Before diving into how to protect a network, exploring what networks are,would...
  • №32
  • 52,43 МБ
  • добавлен
  • описание отредактировано
IoT Red Teaming, 2025. — 260 p. Wireless Hacking Unleashed: Attacking Wi-Fi, Bluetooth, and RF Protocols is your all-access pass into the world of wireless security—where signals travel invisibly, encryption is tested to its limits, and vulnerabilities lurk in places most people never think to check. Whether you're a cybersecurity professional, an ethical hacker, or just a...
  • №33
  • 478,66 КБ
  • добавлен
  • описание отредактировано
4th Edition. — Books On Demand, 2023-05-17. — 364 p. — ISBN-13: 978-3757805364. Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and Antivirus. No network is too insignificant to be spared by an...
  • №34
  • 5,56 МБ
  • добавлен
  • описание отредактировано
T
Lean Publishing, 2020. — 118 p. A Hands-On Field Guide to latest techniques used by security researchers and bug bounty hunters. No matter if you're veteran or newcomer to the security field, the key technologies used in today’s web applications are rapidly changing — with more and more data stored in the cloud and applications based on cutting-edge, open-source technologies,...
  • №35
  • 3,90 МБ
  • добавлен
  • описание отредактировано
V
CRC Press, 2022. — 271 p. — ISBN 978-1-003-25760-8. Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background....
  • №36
  • 3,77 МБ
  • добавлен
  • описание отредактировано
К
М.: СОЛОН-Р, 2001. — 468 с. — ISBN: 5-93455-078-0. Книга в доступной форме рассказывает о проблемах безопасности сетевых сообщений. Излагаемый материал рассчитан в том числе и на неподготовленного читателя; значительную часть книги занимает описание базовых принципов функционирования сети, основных команд протоколов, архитектур операционных систем и т.д. "Техника сетевых атак"...
  • №37
  • 1,09 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.