Зарегистрироваться
Восстановить пароль
FAQ по входу

Аудит информационной безопасности

Справочные материалы

Учебно-методические материалы

B
McGraw-Hill, 2021. — 400 p. — ISBN: 978-1-26-046392-7. 100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. CCISO Certified Chief Information Security Officer All-in-One Exam Guide provides 100% coverage...
  • №1
  • 9,10 МБ
  • добавлен
  • описание отредактировано
C
Packt Publishing, 2016. — 534 p. — ISBN13: 9781785883491. Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it In this book you will be introduced to a proven professional security and penetration testing methodology that has trained thousands of professional testers. Your experience from reading...
  • №2
  • 29,35 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC., 2020. — 252 p. — ISBN13: 978-1-4842-6433-1. Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud...
  • №3
  • 1,86 МБ
  • добавлен
  • описание отредактировано
F
No Starch Press, 2025. — 336 p. — ISBN-13 978-1-7185-0375-5. Креативные сценарии для хакеров и пентестеров Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more! In the hands of the penetration tester, bash scripting becomes a powerful offensive...
  • №4
  • 8,50 МБ
  • добавлен
  • описание отредактировано
H
Cybellium Ltd., 2023-09-11. — 288 p. — ASIN: B0CHXP7Y8T. Unlocking the Secrets of Effective IT Auditing In a rapidly evolving technological landscape, the role of IT auditing has never been more crucial. As organizations increasingly rely on complex digital systems to drive their operations, the need for robust IT audit practices has become paramount. Welcome to the...
  • №5
  • 890,26 КБ
  • добавлен
  • описание отредактировано
K
2nd Edition. — David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham. — No Starch Press, 2024 — 288 p. — ISBN-13: 978-1-7185-0299-4. The new and improved guide to penetration testing using the legendary Metasploit Framework. Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit...
  • №6
  • 6,65 МБ
  • добавлен
  • описание отредактировано
R
The Pragmatic Programmers, LLC., 2016. — 219 p. — ISBN13: 978-1-68050-183-4. This book is for everyone who needs to test the web. As a tester, you’ll automate your tests. As a developer, you’ll build more robust solutions. And as a team, you’ll gain a vocabulary and a means to coordinate how to write and organize automated tests for the web. Follow the testing pyramid and level...
  • №7
  • 14,91 МБ
  • добавлен
  • описание отредактировано
S
No Starch Press, 2014. — 192 p. — ISBN: 1593275900, 9781593275907 Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it? A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers,...
  • №8
  • 3,32 МБ
  • добавлен
  • описание отредактировано
2nd Edition, Early Access edition, 12/3/20. — Independently published, 2021. — 200 p.— ISBN 978-1-7185-0112-6, 978-1-7185-0113-3. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, you’ll explore...
  • №9
  • 2,86 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — No Starch Press, April 13, 2021. — 216 p.— ISBN 978-1-7185-0112-6. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing network sniffers, stealing email credentials, brute forcing directories,...
  • №10
  • 3,47 МБ
  • добавлен
  • описание отредактировано
4th Edition. — Jones & Bartlett Learning, 2022-12-07. — 400 р. — ISBN 978-1284248999. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with...
  • №11
  • 18,78 МБ
  • добавлен
  • описание отредактировано
V
Packt Publishing, 2015. — 132 p. — ISBN: 9781784395049. A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed,...
  • №12
  • 4,60 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.