Зарегистрироваться
Восстановить пароль
FAQ по входу

Аудит информационной безопасности

Справочные материалы

Учебно-методические материалы

2024.12
2nd Edition. — David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham. — No Starch Press, 2024 — 288 p. — ISBN-13: 978-1-7185-0299-4. The new and improved guide to penetration testing using the legendary Metasploit Framework. Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit...
  • №1
  • 4,05 МБ
  • добавлен
  • описание отредактировано
2024.09
No Starch Press, 2025. — 336 p. — ISBN-13 978-1-7185-0375-5. Креативные сценарии для хакеров и пентестеров Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more! In the hands of the penetration tester, bash scripting becomes a powerful offensive...
  • №2
  • 18,28 МБ
  • добавлен
  • описание отредактировано
2024.05
Cybellium Ltd., 2023-09-11. — 288 p. — ASIN: B0CHXP7Y8T. Unlocking the Secrets of Effective IT Auditing In a rapidly evolving technological landscape, the role of IT auditing has never been more crucial. As organizations increasingly rely on complex digital systems to drive their operations, the need for robust IT audit practices has become paramount. Welcome to the...
  • №3
  • 881,28 КБ
  • добавлен
  • описание отредактировано
2022.11
4th Edition. — Jones & Bartlett Learning, 2022-12-07. — 400 р. — ISBN 978-1284248999. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with...
  • №4
  • 17,32 МБ
  • добавлен
  • описание отредактировано
2022.08
3rd edition. — Jones & Bartlett Learning, 2024. — 1104 p. — ISBN 9781284248807. The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how...
  • №5
  • 5,87 МБ
  • добавлен
  • описание отредактировано
2021.04
Packt Publishing, 2021. — 382 p. — ISBN 978-1-78961-913-3. Explore embedded systems pentesting by applying the most common attack techniques and patterns Key Features Learn various pentesting tools and techniques to attack and secure your hardware infrastructure Find the glitches in your hardware that can be a possible entry point for attacks Discover best practices for...
  • №6
  • 53,23 МБ
  • добавлен
  • описание отредактировано
2021.03
2nd Edition. — No Starch Press, April 13, 2021. — 216 p.— ISBN 978-1-7185-0112-6. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing network sniffers, stealing email credentials, brute forcing directories,...
  • №7
  • 1,36 МБ
  • добавлен
  • описание отредактировано
2020.11
Apress Media LLC., 2020. — 252 p. — ISBN13: 978-1-4842-6433-1. Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud...
  • №8
  • 1,82 МБ
  • добавлен
  • описание отредактировано
McGraw-Hill, 2021. — 400 p. — ISBN: 978-1-26-046392-7. 100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. CCISO Certified Chief Information Security Officer All-in-One Exam Guide provides 100% coverage...
  • №9
  • 9,11 МБ
  • добавлен
  • описание отредактировано
2020.02
The Pragmatic Programmers, LLC., 2016. — 219 p. — ISBN13: 978-1-68050-183-4. This book is for everyone who needs to test the web. As a tester, you’ll automate your tests. As a developer, you’ll build more robust solutions. And as a team, you’ll gain a vocabulary and a means to coordinate how to write and organize automated tests for the web. Follow the testing pyramid and level...
  • №10
  • 7,00 МБ
  • добавлен
  • описание отредактировано
2014.12
No Starch Press, 2014. — 192 p. — ISBN: 1593275900, 9781593275907 Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it? A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers,...
  • №11
  • 3,32 МБ
  • добавлен
  • описание отредактировано
2014.07
Packt Publishing, 2014 - 150; ISBN13: 978-1-84969-510-7; на англ. языке. Book Description This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux. The book begins by introducing some of the fundamental bash...
  • №12
  • 21,05 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.