Компьютеры: прочее - скачать книги или читать онлайн. Страница 36

Купить книгу Mission-Critical Security Planner. When Hackers Won't Take No for an Answer, автора Eric  Greenberg
Pdf-книга
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization Presents the material in a witty and lively style, backed up by solid business planning methods Companion Web site provides all worksheets and the security planning template
Купить книгу Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security, автора
Pdf-книга
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures. Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the future Illustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing security Covers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis Predicting Malicious Behavior fuses the behavioral and computer sciences to enlighten anyone concerned with security and to aid professionals in keeping our world safer.
Купить книгу Fabricated. The New World of 3D Printing, автора Melba  Kurman
Pdf-книга
Fabricated. The New World of 3D Printing
Fabricated tells the story of 3D printers, humble manufacturing machines that are bursting out of the factory and into schools, kitchens, hospitals, even onto the fashion catwalk. Fabricated describes our emerging world of printable products, where people design and 3D print their own creations as easily as they edit an online document. A 3D printer transforms digital information into a physical object by carrying out instructions from an electronic design file, or 'blueprint.' Guided by a design file, a 3D printer lays down layer after layer of a raw material to 'print' out an object. That's not the whole story, however. The magic happens when you plug a 3D printer into today’s mind-boggling digital technologies. Add to that the Internet, tiny, low cost electronic circuitry, radical advances in materials science and biotech and voila! The result is an explosion of technological and social innovation. Fabricated takes the reader onto a rich and fulfilling journey that explores how 3D printing is poised to impact nearly every part of our lives. Aimed at people who enjoy books on business strategy, popular science and novel technology, Fabricated will provide readers with practical and imaginative insights to the question 'how will this technology change my life?' Based on hundreds of hours of research and dozens of interviews with experts from a broad range of industries, Fabricated offers readers an informative, engaging and fast-paced introduction to 3D printing now and in the future.
Купить книгу Carry On. Sound Advice from Schneier on Security, автора Bruce  Schneier
Pdf-книга
Carry On. Sound Advice from Schneier on Security
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike. Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more Previous Schneier books have sold over 500,000 copies Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.
Купить книгу Cryptography Engineering. Design Principles and Practical Applications, автора Bruce  Schneier
Pdf-книга
Cryptography Engineering. Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field. After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography. An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Купить книгу Web Commerce Security. Design and Development, автора
Pdf-книга
Web Commerce Security. Design and Development
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems. Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security; he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it. Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.
Купить книгу Microsoft Windows Security Essentials, автора Darril  Gibson
Pdf-книга
Microsoft Windows Security Essentials
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more Reviews all the topics you need to know for taking the MTA 98-367 exam Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.
Купить книгу Unmasking the Social Engineer. The Human Element of Security, автора
Pdf-книга
Unmasking the Social Engineer. The Human Element of Security
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering security Reveals the various dirty tricks that scammers use Pinpoints what to look for on the nonverbal side to detect the social engineer Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, Unmasking the Social Engineer arms readers with the knowledge needed to help protect their organizations.
Купить книгу Social Engineering. The Art of Human Hacking, автора Paul  Wilson
Pdf-книга
Social Engineering. The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.
Купить книгу CCNA Wireless Study Guide. IUWNE Exam 640-721, автора Todd  Lammle
Pdf-книга
CCNA Wireless Study Guide. IUWNE Exam 640-721
A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex study guide family and helps network administrators advance their careers with a highly desirable certification. The CCNA Wireless certification is the most respected entry-level wireless certification for system administrators looking to advance their careers Written by Todd Lammle, the leading networking guru and author of numerous bestselling certification guides Provides in-depth coverage of every exam objective and the technology developed by Cisco for wireless networking Covers WLAN fundamentals, installing a basic Cisco wireless LAN and wireless clients, and implementing WLAN security Explains the operation of basic WCS, basic WLAN maintenance, and troubleshooting Companion CD includes the Sybex Test Engine, flashcards, and entire book in PDF format Includes hands-on labs, end-of-chapter review questions, Exam Essentials overview, Real World Scenarios, and a tear-out objective map showing where each exam objective is covered The CCNA Wireless Study Guide prepares any network administrator for exam success. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Купить книгу Cloud Security. A Comprehensive Guide to Secure Cloud Computing, автора
Pdf-книга
Cloud Security. A Comprehensive Guide to Secure Cloud Computing
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support. As the most current and complete guide to helping you find your way through a maze of security minefields, this book is mandatory reading if you are involved in any aspect of cloud computing. Coverage Includes: Cloud Computing Fundamentals Cloud Computing Architecture Cloud Computing Software Security Fundamentals Cloud Computing Risks Issues Cloud Computing Security Challenges Cloud Computing Security Architecture Cloud Computing Life Cycle Issues Useful Next Steps and Approaches
Купить книгу Mastering Windows Network Forensics and Investigation, автора Steve  Bunting
Pdf-книга
Mastering Windows Network Forensics and Investigation
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book–aimed at law enforcement personnel, prosecutors, and corporate investigators–provides you with the training you need in order to acquire the sophisticated skills and software solutions to stay one step ahead of computer criminals. Specifies the techniques needed to investigate, analyze, and document a criminal act on a Windows computer or network Places a special emphasis on how to thoroughly investigate criminal activity and now just perform the initial response Walks you through ways to present technically complicated material in simple terms that will hold up in court Features content fully updated for Windows Server 2008 R2 and Windows 7 Covers the emerging field of Windows Mobile forensics Also included is a classroom support package to ensure academic adoption, Mastering Windows Network Forensics and Investigation, 2nd Edition offers help for investigating high-technology crimes.