Обратная связь В избранное
Как скачать книги бесплатно Если вы нашли ошибки, сообщите нам.

Поиск по сайту

По Вашему запросу найдено 28 ответов (Результаты запроса 1 - 18) :

#1: network security bible бесплатно

АвторАвтор: lbooks  Опубликовано: 3-10-2008, 21:12  Комментариев: 0
Network Security Bible approaches network security from the view of the individual who wants to learn and apply the associated network security best practices without having to sort through a myriad of extraneous material from multiple sources. The information provided in this text includes “secrets” learned by practicing professionals in the field of network security through many years of real-world experience.

#2: Wi-Fi Security бесплатно

АвторАвтор: lbooks  Опубликовано: 19-11-2008, 14:02  Комментариев: 0
Security is now an essential element that forms the cornerstone of every corporate network. Without privacy, however, your solution is incomplete!
My expertise in the areas of security and privacy has provided me with a valuable perspective that has enabled me to save my clients hundreds of thousands of dollars of what would have been revenue lost to hackers.
Many of my clients ask me to work with their organizations as either a contractor or consultant to assist them in implementing effective security measures because there is no greater cost to an organization than falling prey to a plethora of security vulnerabilities.

#3: Microsoft Encyclopedia of Security бесплатно

АвторАвтор: lbooks  Опубликовано: 4-11-2008, 18:51  Комментариев: 0
The essential security reference for computer professionals at all levels.

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The MICROSOFT ENCYCLOPEDIA OF SECURITY delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.

#4: Best of Security - Лучшее о безопасности бесплатно

АвторАвтор: lbooks  Опубликовано: 16-08-2007, 19:40  Комментариев: 0
Best of Security - Лучшее о безопасности
Серия или Выпуск: информационно-аналитический журнал
Журнал "BOS" (Best of Security) позиционирует себя как информационно-аналитическое издание о безопасности в широком смысле этого слова.

#5: Mastering FreeBSD and OpenBSD Security бесплатно

АвторАвтор: lbooks  Опубликовано: 4-11-2008, 14:21  Комментариев: 0
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.
There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today s system administrators, a single chapter on the subject can t provide the depth of information you need to keep your systems secure.

#6: Организация и современные методы защиты информации бесплатно

АвторАвтор: lbooks  Опубликовано: 27-11-2008, 21:08  Комментариев: 0
В настоящем издании рассматриваются основные формы и методы обеспечения безопасности и защиты информации предприятий и организаций, независимо от их форм собственности.
В каждой главе пособия приводятся сведения, необходимые для углубленного понимания вопросов защиты информации, и содержатся рекомендации прикладного характера.

#7: Maximum Security: A Hacker’s Guide to Protecting Your Computer Systems and Network, 4 бесплатно

АвторАвтор: lbooks  Опубликовано: 26-05-2009, 16:47  Комментариев: 0
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform news of section issues, and includes clear, to the saucer descriptions of the most ordinary techniques hackers ingest to understand systems. This aggregation provides aggregation for section administrators and others fascinated in machine and meshwork section and provides them with techniques to verify steps to protect their systems

#8: Hacking For Dummies бесплатно

АвторАвтор: lbooks  Опубликовано: 12-11-2008, 22:40  Комментариев: 0
Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself—an ethical hacker.
Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You’ll discover how to:

#9: Информационная безопасность предприятия бесплатно

АвторАвтор: lbooks  Опубликовано: 6-08-2008, 23:58  Комментариев: 0
В книге рассматривается технология информационной безопасности, в необходимом объеме приведены сведения для организации службы информационной безопасности в типичном учреждении, начиная с малого предприятия (10 компьютеров) и до большой многофилиальной корпорации (более 1000 компьютеров). Подробно изложены вопросы управления рисками, данные современных исследований в криптографии. Большое внимание уделено практическому и прикладному применению информационной безопасности. При создании книги использовались материалы промышленных стандартов, лучшие российские и западные публикации, личный опыт авторов в рассматриваемой области.
Для специалистов в области защиты информации

#10: The Web Application Hacker’s Handbook: Discovering бесплатно

АвторАвтор: lbooks  Опубликовано: 10-11-2008, 16:04  Комментариев: 1
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.

#11: Безопасность Linux. Руководство администратора по системам защиты с открытым исходным кодом бесплатно

АвторАвтор: lbooks  Опубликовано: 7-11-2008, 05:53  Комментариев: 0
В книге рассказывается об инсталляции, конфигурировании и сопровождении Linux-систем с точки зрения безопасности. Это руководство администратора по реализации стратегии защиты Linux, а также по утилитам защиты, существующим в Linux. Книга не претендует на исчерпывающее описание темы компьютерной безопасности, но в тоже время является хорошей отправной точкой к построению и сопровождению защищенных систем. Придерживаясь описанных в книге процедур и правил, читатели снизят общий уровень уязвимости своих систем и научатся перекрывать наиболее опасные бреши в системной и сетевой защите. Книга предназначена для пользователей средней и высокой квалификации.

#12: Blowing Up Russia: Terror from Within (Second Edition) бесплатно

АвторАвтор: dim_boss  Опубликовано: 29-03-2011, 20:58  Комментариев: 0
Blowing Up Russia: Acts of terror, abductions, and contract killings organised by the Federal Security Services of the Russian Federation
Blowing Up Russia contains the allegations of ex-spy Alexander Litvinenko against his former spymasters in Moscow which led to his being murdered in London in November 2006.

#13: The Design and Evaluation of Physical Protection Systems бесплатно

АвторАвтор: dim_boss  Опубликовано: 14-03-2011, 21:43  Комментариев: 1
The book emphasizes the use of component performance measures to establish the effectiveness of physical protection systems, applying scientific and engineering principles to meet goals. The author takes a problem-solving approach to security and risk assessment, explaining the use of electronic protection elements and demonstrating how these elements are integrated into an effective system.

#14: Effective Handgun Defense: A Comprehensive Guide to Concealed Carry бесплатно

АвторАвтор: dim_boss  Опубликовано: 13-03-2011, 12:37  Комментариев: 0
Personal protection is a hot issue in today's changing world. Currently, 42 states have some form of concealed-carry legislation. Now holders of concealed carry permits, law enforcement officers, security personnel and anyone interested in real world defensive tactics can find all the historical, safety and legal information they need in Effective Handgun Defense.

#15: Pro Silverlight for the Enterprise бесплатно

АвторАвтор: lbooks  Опубликовано: 5-06-2009, 11:40  Комментариев: 0
This book is unique in that it focuses on how Silverlight can be applied in today’s business environment rather than simply delving into the product’s syntax and grammar in isolation. Silverlight is discussed in context with consideration given to security, scalability, and deployment. As such this book makes an excellent addition to any Silverlight library and extends your knowledge into practical areas that are rarely discussed.

#16: Спец №02- 2007, №075 бесплатно

АвторАвтор: lbooks  Опубликовано: 27-04-2008, 12:42  Комментариев: 0
Журнал из серии редких номеров.

Содержание:

XSS/SQL Injection
- Дефектный замысел / Теория SQL Injection
- Осознанный пример / Реальная угроза SQL Injection
- RFI-паноптикумъ / PHP-инклюдинг
- Притоны Интернета / Обзор security-сайтов
- Противоукольный костюм / Правильный web-кодинг
- Обзор технологий взлома web-ресурсов
- Создание многоуровневой системы защиты от взлома web-приложений
- Вокруг запретов / Как защитить web-сервер?
- Запах пропасти / Обзор программ поиска уязвимостей на сайтах
- Ключ ко многим дверям / Теория XSS

#17: BSD UNIX Toolbox: 1000+ Commands for FreeBSD, OpenBSD бесплатно

АвторАвтор: lbooks  Опубликовано: 9-11-2008, 11:37  Комментариев: 0
Explore a ton of powerful BSD UNIX commands

This handy, compact guide teaches you to use BSD UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to use and administer servers and desktops running FreeBSD, OpenBSD, NetBSD, or any other BSD flavor.

#18: Bush at War (Буш на войне) бесплатно

АвторАвтор: lbooks  Опубликовано: 10-01-2009, 21:28  Комментариев: 0
This is an account of President George W. Bush at war during the first 100 days after the September 11, 2001, terrorist attacks. The information I obtained for this book includes contemporaneous notes taken during more than 50 National Security Council and other meetings where the most important decisions were discussed and made. Many direct quotations of the president and the war cabinet members come from these notes. Other personal notes, memos, calendars, written internal chronologies, transcripts and other documents also were the basis for direct quotations and other parts of this story.

Навигация по сайту

Опрос пользователей

Как вам новый дизайн [?]

Супер
Хорошо
Неплохо
Было лучше
Плохо
Ужасно

Лучшее за неделю

Новинки