Компьютеры: прочее - скачать книги или читать онлайн. Страница 32

Купить книгу Game of Tag. Fantasy, автора
Электр. книга
Game of Tag. Fantasy
«Game of Tag» – a story for fans of fantasy and twisted plots. The action takes place in the middle of the XXI century in the space of reality and the game. The world of Julia Syanovoy is saturated with images of Grand battles, intertwined with the development of action in a scientific Institute. To get into the game against my will – not so bad, you need to get out of it. Dynamic storytelling keeps the reader’s attention throughout the story.
Купить книгу Как открыть интернет-магазин? 8 советов для самостоятельного старта, автора Алексея Номейна
Электр. книга
Как открыть интернет-магазин? 8 советов для самостоятельного старта
Интернет-магазин – это по своей сути интерактивный веб-сайт, рекламирующий товары или услуги, и принимающий заказы на их покупку. Как и любой другой бизнес, электронная коммерция требует внимательного подхода на старте. Сайт всего лишь инструмент, за которым стоит, собственно, сама бизнес-модель по продажам и доставке товаров конечному потребителю.
Купить книгу Как делать деньги, не выходя из дома. С пошаговым планом заработка 1000$ в месяц. Бизнес на партнерских программах, автора Игоря Крестинина
Электр. книга
Как делать деньги, не выходя из дома. С пошаговым планом заработка 1000$ в месяц. Бизнес на партнерских программах
Давно ли вы могли себе позволить уехать за границу на пару месяцев? Да так, что не думать о том, хватит ли денег, или что вы будете делать после возвращения?Эта книга расскажет о том, как можно зарабатывать деньги, не отрываясь от приятного времяпрепровождения под пальмой, или прихлебывать «Пина коладу», не отрываясь от бизнеса – кому как нравится. Главное в том, что с этой книгой вы сможете позволить себе больше свободы.
Купить книгу Cybercrime and Cyber Warfare, автора Igor  Bernik
Pdf-книга
Cybercrime and Cyber Warfare
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter. The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned. The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book. Contents 1. Cybercrime. 2. Cyberwarfare. About the Authors Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.
Купить книгу Wireless Mobile Internet Security, автора
Pdf-книга
Wireless Mobile Internet Security
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment. Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues. Features: Written by a top expert in information security Gives a clear understanding of wired/wireless mobile internet technologies Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro) Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.
Купить книгу The Death of the Internet, автора Markus  Jakobsson
Pdf-книга
The Death of the Internet
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.
Купить книгу Information Security. Principles and Practice, автора Mark  Stamp
Pdf-книга
Information Security. Principles and Practice
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic «orange book» view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
Купить книгу IP Address Management Principles and Practice, автора Timothy  Rooney
Pdf-книга
IP Address Management Principles and Practice
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send an email or an instant message by IP address instead of by name! It's equally important that these DHCP and DNS configurations be based on a common IP address plan, which maps out the IP address hierarchy, subnets, address pools, and domains. IPAM applies management disciplines to these core services, including configuration, change control, auditing, reporting and so on, and they are necessary given the absolute requirement for properly managing IP space and DHCP and DNS servers. The linkages among an IP address plan, DHCP server configuration and DNS server configuration are inseparable; a change of an IP address will affect DNS information and perhaps DHCP as well. These functions provide the foundation for today's converged services IP networks, so they need to be managed using a rigorous approach. Today, there is no single book that covers the management of these linkages and services they provide; IP Address Management Principles and Practice will fill that gap. While several books are available for leading vendors' DHCP and DNS services implementations, few exist for IP address planning, and none exist that unifies these three topics. To obtain a free copy of the IPAM Configuration Guide please send an email to: ieeeproposals@wiley.com
Купить книгу Public Key Cryptography. Applications and Attacks, автора
Pdf-книга
Public Key Cryptography. Applications and Attacks
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: • Explains fundamentals of public key cryptography • Offers numerous examples and exercises • Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam • Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
Купить книгу Модели интернет-бизнеса. Полный обзор, автора Алексея Номейна
Электр. книга
Модели интернет-бизнеса. Полный обзор
Описываются основные инструменты, способствующие ведению бизнеса в Интернете, а затем их возможные комбинации с плюсами и минусами каждого варианта.
Купить книгу 10 способов получить больше продаж, автора Алексея Номейна
Электр. книга
10 способов получить больше продаж
Речь пойдет сразу и об онлайн продажах, интернет-магазинах, цифровых товарах, и еще эти методы подойдут для оффлайн продаж. Вам просто останется подобрать подходящий способ получения доверия от потенциального покупателя, внедрив конкретную гарантию по своему товару.
Купить книгу Маркетинг и работа для интернет-маркетолога, автора Алексея Номейна
Электр. книга
Маркетинг и работа для интернет-маркетолога
Сегодня рынок интернет-маркетинга переполнен специалистами, но найти толкового маркетолога очень трудно. Порой кажется, что таковых и вовсе не существует. Наверное, это связано с тем, что многие из них самоучки и не считают нужным пройти для этого хотя бы специальные курсы. Есть, конечно, неплохо мыслящие ребята, которые запрашивают N-ую сумму в месяц, но их профессионализм не внушает особого доверия. Но, как вы уже поняли, интернет-маркетолог – это профессия очень высокооплачиваемая.