Зарегистрироваться
Восстановить пароль
FAQ по входу

Кибербезопасность и киберпреступления

Материалы конференций, симпозиумов, съездов, сборники научных работ

Сборники и серии

Учебно-методические материалы

A
Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh. — CRC Press, 2019. — 331 p. — ISBN13: 978-0-8153-6145-9. Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs...
  • №1
  • 10,45 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
  • №2
  • 1,78 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
  • №3
  • 8,14 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, Inc., 2024. — 220 р. — ISBN-13: 978-1-098-14779-2. Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk...
  • №4
  • 1,05 МБ
  • добавлен
  • описание отредактировано
ReferencePoint Press, 2021. — 80 p. As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.Online gamers consider themselves among the most tech-savvy people in the world. Yet many of them have been snared by a game-related online scam....
  • №5
  • 5,17 МБ
  • добавлен
  • описание отредактировано
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
  • №6
  • 2,19 МБ
  • добавлен
  • описание отредактировано
Kogan Page, 2024. — 304 р. — ISBN-13: 978-1-3986-1428-4. To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and...
  • №7
  • 1,17 МБ
  • добавлен
  • описание отредактировано
Wiley, 2023. — 272 р. — ISBN 978-1119582311. A classroom tested introduction to cyber investigations with real-life examples included. Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence,...
  • №8
  • 4,96 МБ
  • добавлен
  • описание отредактировано
RAND Corporation, 2001. — 370 p. Networks and Netwars: The Future of Terror, Crime, and Militancy by John Arquilla and David Ronfeldt demonstrates that Netwar―like cyberwar―describes a new spectrum of conflict that is emerging in the wake of the information revolution. What distinguished netwar is the networked organizational structure of its practitioners and their quickness...
  • №9
  • 473,31 КБ
  • добавлен
  • описание отредактировано
B
James Bacigalupo, Janine Fodor, John Bambenek, Kevin Borgeson, Matthew Thierry, Michael Hoffman, Michael Loadenthal, Robin Maria Valeri, Samantha Hausserman. — Lexington Books, 2022. — 186 p. — ISBN-13: 978-1793606983. Cyberhate: The Far Right in the Digital Age explores how right-wing extremists operate in cyberspace by examining their propaganda, funding, subcultures,...
  • №10
  • 4,30 МБ
  • добавлен
  • описание отредактировано
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
  • №11
  • 5,09 МБ
  • добавлен
  • описание отредактировано
Kogan Page, 2024. — 304 р. — ISBN 978-1-3986-1-3713. When it comes to cyber attacks, everyone's a potential victim. But you don't have to be helpless against these threats. Hackedoffers the knowledge and strategies you need to protect yourself and your business. In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and...
  • №12
  • 1,15 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2017. — 258 p. — ISBN13: 9781787288744. Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how...
  • №13
  • 50,45 КБ
  • добавлен
  • описание отредактировано
BPB Publications, 2023. — 282 р. — ISBN 978-93-5551-150-8. A Guide to Enter the Journey of a Digital Forensic Investigator. Description Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to...
  • №14
  • 10,27 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
  • №15
  • 2,38 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2020. — 331 p. — ISBN-13: 978-9389328646. Understand Cybersecurity fundamentals and protect your Blockchain systems for a scalable and secured automation Key Features Understand the fundamentals of Cryptography and Cybersecurity and the fundamentals of Blockchain and their role in securing the various facets of automation. Also understand threats to Smart...
  • №16
  • 3,51 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC., 2020. — 359 p. — ISBN13: (electronic): 978-1-4842-5952-8. Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will...
  • №17
  • 5,88 МБ
  • добавлен
  • описание отредактировано
University of Georgia Press, 2016. — 241 p. — ISBN10: 0820349208. — ISBN13: 978-0820349206. — Studies in Security and International Affairs Ser Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic...
  • №18
  • 3,63 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 240 р. — ISBN-13: 978-1394254941. Discover how to navigate the intersection of tech, cybersecurity, and commerce In an era where technological innovation evolves at an exponential rate, Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security by Chuck Brooks emerges as a critical roadmap for understanding and...
  • №19
  • 2,68 МБ
  • добавлен
  • описание отредактировано
Independently published, 2023-07-31. — 158 p. — ASIN: B0CDF6GX74. In today’s digital age, safeguarding your organization’s assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with “Cyber Security Program and Policy Using NIST Cybersecurity Framework” by seasoned cybersecurity professionals. This guide steers you through the process of...
  • №20
  • 1,16 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2017. — 45 p. — ASIN B01MT6GO9Q. This book is an excellent guide to hacking. It has been written with the target being individuals who are beginners at hacking. Have you ever wished to setup a fake Wi-Fi hotspot? This book guides you on how to do this and steal data from the individual you are targeting. Invisible folders are also a common feature...
  • №21
  • 151,42 КБ
  • добавлен
  • описание отредактировано
Harvard University Press, 2020. — 268 p. — ISBN: 978-0-674-24599-0. “One of the finest books on information security published so far in this century―easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.” ―Thomas Rid, author of Active Measures “The best examination I have read of how increasingly dramatic developments in cyberspace are defining the...
  • №22
  • 1,53 МБ
  • добавлен
  • описание отредактировано
C
ITGP, 2020. — 54 p. — ISBN: 978-1787782099. Cyber Security – Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations...
  • №23
  • 199,36 КБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2020. — 260 p. — ISBN: 978-1119643777. Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies...
  • №24
  • 2,60 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-64344-9 (ebk). Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world’s leading Blue Team security specialists show you how to harden systems...
  • №25
  • 10,16 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2019. — 337 p. — ISBN: 978-1-79346-418-7. Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry,...
  • №26
  • 4,76 МБ
  • добавлен
  • описание отредактировано
Sold by: Amazon Digital Services LLC, 2016. — 9 p. — ASIN: B01CWG04L4 This article really outlines issues of security that have cost even lives as well as the loss of security because of vulnerabilities of the Internet. There are simple cost effective solutions that stop the hacks and the attacks. This article outlines the constant problems of Internet security that even the...
  • №27
  • 108,97 КБ
  • добавлен
  • описание отредактировано
U.S. Army War College Press, 2016. — 62 p. — ASIN: B01HUE9SHY The development of cyberspace defense capabilities for the North Atlantic Treaty Organization (NATO) has been making steady progress since its formal introduction at the North Atlantic Council Prague Summit in 2002. Bolstered by numerous cyber attacks, such as those in Estonia (2007), Alliance priorities were...
  • №28
  • 542,39 КБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2019. — 224 p. — ISBN: 978-1119442134 (EPUB). The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity―but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity...
  • №29
  • 257,14 КБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 388 p. — ISBN-13: 979-8-8688-0094-8. This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years...
  • №30
  • 2,07 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
  • №31
  • 5,45 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2022. — 150 р. — ISBN-13: 978-1-4842-8628-9. Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions...
  • №32
  • 1,67 МБ
  • добавлен
  • описание отредактировано
Cambridge University Press, 2024. — 411 p. The Cyber Predators. Dark Personality and Online Misconduct and Crime by Aaron Cohen is focusing on dark personalities perpetrating cybercrime and deviance. This incredible academic and practical handbook provides valuable awareness of this growing phenomenon. Ever wondered who lurks in the shadows of the internet's vast landscape,...
  • №33
  • 672,46 КБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 320 p. — ISBN-13: 978-1119712091. A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the...
  • №34
  • 4,43 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, Inc., 2024. — 292 p. — ISBN 978-1-098-14567-5. Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping...
  • №35
  • 4,05 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2024. — 500 р. — ISBN-13: 978-1718503267. Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools. We’re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and...
  • №36
  • 42,80 МБ
  • добавлен
  • описание отредактировано
D
Orange Education Pvt Ltd, 2023. — 338 p. — ISBN: 978-81-19416-46-2. Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to. Book Description In today’s digital landscape, web apps evolve rapidly, demanding enhanced security. This Ultimate Web Authentication Handbook offers a comprehensive journey into this realm. Beginning with web...
  • №37
  • 4,22 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley Professional, 2022-11-28. — 352 p. — ISBN-13: 978-0-13-745033-6. Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks. Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after...
  • №38
  • 3,26 МБ
  • добавлен
  • описание отредактировано
Pearson Education, Ins., 2012. — 576 p. — ISBN: 978-0-13-256471-7. “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this...
  • №39
  • 45,28 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley Professional, 2019. — 489 p. — ISBN13: 978-0134506784. Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical...
  • №40
  • 4,64 МБ
  • добавлен
  • описание отредактировано
Manning Publications, December 29th 2020. — 307 p. — ISBN: 978-1617296826. Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The...
  • №41
  • 2,76 МБ
  • добавлен
  • описание отредактировано
Independently published, 2023-08-29. — 55 р. — ASIN: B0CSYTKDFK. Ethical hacking, also known as penetration testing or white-hat hacking, is a practice of deliberately probing and assessing the security of computer systems, networks, applications, and other digital environments in order to identify vulnerabilities and weaknesses that could potentially be exploited by malicious...
  • №42
  • 3,17 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Packt Publishing, 2020. — 595 p. — ISBN: 978-1-83882-779-3. Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and...
  • №43
  • 127,36 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2018. — 384 p. Enhance your organization’s secure posture by improving your attack and defense strategies The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience...
  • №44
  • 9,01 МБ
  • добавлен
  • описание отредактировано
Robert Douglass, Keith Gremban, Ananthram Swami, Stephan Gerali. — Wiley-IEEE Press, 2023. — 516 р. — ISBN: 978-1119892144. Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and...
  • №45
  • 15,08 МБ
  • добавлен
  • описание отредактировано
Palgrave Macmillan, 2023. — 273 p. Critical Security Studies in the Digital Age - Social Media and Security by Joseph Downing demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is...
  • №46
  • 1,06 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
  • №47
  • 676,37 КБ
  • добавлен
  • описание отредактировано
E
John Wiley & Sons Ltd., 2024. — 672 p. — ISBN 978-1394250196. Understand and respond to a new generation of cybersecurity threats. Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity...
  • №48
  • 2,12 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
  • №49
  • 2,74 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2022. — 291 р. — ISBN-13: 978-1-7185-0149-2. A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll...
  • №50
  • 9,29 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2021. — 623 p. — ISBN 9781800569218. Learn to identify a security incident and build a series of best practices to stop an attack before it creates serious consequences Key Features Discover the entire spectrum of Incident Response (IR), from its evolution to recovery in general as well as in the cloud Understand IR best practices through real-world phishing...
  • №51
  • 79,16 МБ
  • добавлен
  • описание отредактировано
F
BPB Publications, 2022. — 571 p. — ISBN 978-93-89328-93-6. Этический взлом промышленной системы управления: анализ, использование, смягчение последствий и защита промышленных процессов для этичного хакера Explore to tackle industrial cyber risks Key Features Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and...
  • №52
  • 16,79 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2021. — 265 p. — ISBN 978-1-7185-0126-3. How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way. Go deep into the mind of a master hacker as he breaks into a hostile, cloud-based security environment. Sparc Flow invites you to...
  • №53
  • 4,44 МБ
  • добавлен
  • описание отредактировано
G
Independently published, 2023. — 234 р. — ISBN-13: 978-1088210093. Do you know if you were hacked? Do you know if some personal information was stolen from your system or account? Have you always wanted to learn how to protect your system from such attacks? If you answered yes to all these questions, you’ve come to the right place. Unlike malicious hacking, ethical hacking is a...
  • №54
  • 13,42 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2021. — 216 p. — ISBN 9781718501287. Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as how to defend yourself and organizations against online attacks. You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need...
  • №55
  • 14,55 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2020. — 170 p. — ISBN13: 978-0-367-36770-1. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures (Security, Privacy, and Trust in Mobile Communications) Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect...
  • №56
  • 2,55 МБ
  • добавлен
  • описание отредактировано
Mercury Learning & Information, 2020. — 220 p. — ISBN: 978-1-68392-498-2. This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and...
  • №57
  • 2,06 МБ
  • добавлен
  • описание отредактировано
H
2nd Edition. — Apress, 2020. — 419 p. — ISBN13: (electronic): 978-1-4842-5914-6. See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors...
  • №58
  • 4,61 МБ
  • добавлен
  • описание отредактировано
Apress, 2020. — 190 p. — ISBN13: (electronic): 978-1-4842-5165-2. Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage...
  • №59
  • 4,40 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Apress Media LLC., 2024. — 303 p. — ISBN-13: 979-8-8688-0233-1. Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities―whether human or...
  • №60
  • 5,49 МБ
  • добавлен
  • описание отредактировано
Akram Press, 2023. — 84 р. — ASIN: B0C522DNCM. Even if you have no technological expertise, this book will give an accessible introduction to the fundamentals of cybersecurity. You may be a businessperson who wants to learn more about this critical topic or an information security professional who wants to brush up on your skills. Companies that employ technology intelligently...
  • №61
  • 42,17 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2017. — 32 p. — ASIN B074M64V6H. This book will show you many easy things that you can do in order to protect yourself online. It details many of the online threats that you can face, such as describing what spyware and backdoors are. In addition to describing the threats, it lists different types of software that you can utilize to protect yourself...
  • №62
  • 324,04 КБ
  • добавлен
  • описание отредактировано
Qian Han, Sai Deep Tetali, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Yanhai Xiong. — No Starch Press, 2024. — 328 p. — ISBN-13: 978-1-7185-0330-4. This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a comprehensive introduction to detecting...
  • №63
  • 6,50 МБ
  • добавлен
  • описание отредактировано
Apress, 2019. — 205 p. — ISBN13: (electronic): 978-1-4842-4255-1. Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to...
  • №64
  • 10,35 МБ
  • добавлен
  • описание отредактировано
Routledge, 2017. — 754 p. — ISBN: 978-1138238732, 1138238732. 2nd Edition. This book offers a comprehensive and integrative introduction to cybercrime. It provides an authoritative synthesis of the disparate literature on the various types of cybercrime, the global investigation and detection of cybercrime and the role of digital information, and the wider role of technology as...
  • №65
  • 16,71 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2023. — 400 p. — ISBN: 978-1-394-17309-9. The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that...
  • №66
  • 4,21 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2019. — 99 p. — ISBN: 1514673150, ASIN B010EN16P0. Do you hear news everyday on the latest hacking attack, but just don't quite understand what it is all about? Well this is the book for you. In BIT WARS, Dr. Thomas Hyslip presents the history of cybercrime, hacking and information warfare that has lead us to where we are today. Espionage, Stuxnet,...
  • №67
  • 536,03 КБ
  • добавлен
  • описание отредактировано
J
John Wiley & Sons, Inc., 2024. — 240 p. — ISBN-13: 978-1394256099. Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process. Practical Cyber Intelligence provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber...
  • №68
  • 9,61 МБ
  • добавлен
  • описание отредактировано
CreateSpace Independent Publishing Platform, 2015. — 25 p. — (Hacking for Beginners, hacking, hacking for dummies). — ISBN10: 1517599334. — ISBN13: 9781517599331. — B01K91EPBO. Hacking. An art, curse, piece of knowledge, illegality, business or an insatiable thirst for power and money? How can a word represent all that and much more? How can a notion become so synonymous to...
  • №69
  • 140,26 КБ
  • добавлен
  • описание отредактировано
CTS GMBH, 2017. — 37 p. — (CTS SOLUTIONS IT-PRO E). — ASIN B01N7RZ9XC. Secure your Web server with free Let's Encrypt Certificates. Guide to fully automate the process of creating and renewing certificates without the need of installing extra software. Script based copy & paste solution for Linux, FreeBSD and Plesk. Introduction SSL Certificates In the past services offered on...
  • №70
  • 139,28 КБ
  • добавлен
  • описание отредактировано
2nd edition. — Packt Publishing, 2020. — 432 p. — ISBN 183864900X, 9781838649005. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life...
  • №71
  • 101,86 МБ
  • добавлен
  • описание отредактировано
K
John Wiley & Sons, Inc., 2024. — 224 p. — ISBN-13: 978-1394189076. A guide for insurance and other industries to staying on customers’ radars Attention Hacking: The Power of Social Media Selling in Insurance and Finance shows how you can make insurance go viral on social media. It might sound too good to be true, but think about it―products that enhance wealth accumulation,...
  • №72
  • 3,85 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2016. — 210 p. — ASIN: B01MTZY6U2. This book is for IT security professionals who have tried to use ISO 27002 and NIST SP 800-53, or compliance standards to start an IT security program but found them too generic and abstract to get started. This book fills the gap between abstract standards and specialized materials that detail security measures...
  • №73
  • 757,35 КБ
  • добавлен
  • описание отредактировано
Shaun Kimmons, 2022-07-08. — 90 p. — ISBN-13: 978-3986535384. Protecting yourself and your data against online threats and hacking has never been more critical, and as the saying goes, knowledge is power. The Principles of Cybersecurity and Hacking seeks to equip you with such knowledge and power. Our complete, in-depth reference to the basics, ideas, and techniques of...
  • №74
  • 838,15 КБ
  • добавлен
  • описание отредактировано
André Zingsheim, Dr Matthias Wübbeling, Frank Neugebauer, Klaus Gebeshuber, Markus Widl, Michael Kofler, Peter Kloep, Roland Aigner, Stefan Kania, Thomas Hackner, Tobias Scheible. — Rheinwerk Computing, 2023. — 1141 p. — ISBN-13: 978-1-4932-2426-5. Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning...
  • №75
  • 46,10 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, Inc., 2023. — 163 р. — ISBN-13: 978-1-098-13189-0. Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and co__cpLocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and...
  • №76
  • 2,00 МБ
  • добавлен
  • описание отредактировано
Springer Nature, 2023. — 1120 р. — (International Series in Operations Research & Management Science No. Volume 342). — ISBN 13: 978-3-031-30190-2. This book analyzes cyberdefense from a novel and interdisciplinary perspective, offering solutions for problems that have long impeded a more efficient defense. It explains why cyberdefense organized and performed by humans is too...
  • №77
  • 17,44 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2022. — 288 р. — ISBN: 978-161728004. A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. In Making Sense of Cybersecurity you will learn how to. Develop and incrementally improve your own cybersecurity strategy Detect rogue Wi-Fi networks and safely...
  • №78
  • 7,37 МБ
  • добавлен
  • описание отредактировано
University of Toronto Press, 2021. — 432 p. — ISBN 978-1-4875-3125-6. Cyber-threats are among the most critical issues facing the world today. Cybersecurity Management draws on case studies to analyze cybercrime at the macro-level, and evaluates the strategic and organizational issues connected to cybersecurity. Cross-disciplinary in its focus, orientation, and scope, the...
  • №79
  • 2,95 МБ
  • добавлен
  • описание отредактировано
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong. — CRC Press, 2020. — 230 p. — ISBN: 978-0-367-81643-8 (ebk). Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices) This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one...
  • №80
  • 8,52 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2025. — 210 p. — ISBN: 978-93-65891-218. Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the...
  • №81
  • 1,65 МБ
  • добавлен
  • описание отредактировано
L
John Wiley & Sons, Inc., 2023. — 307 p. — ISBN 978-1119861768. Информация о киберугрозах CYBER THREAT INTELLIGENCE “Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when...
  • №82
  • 2,38 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2023. — 544 p. — ISBN 978-1-7185-0313-7. Data-science investigations have brought journalism into the 21st century, and — guided by The Intercept’s infosec expert Micah Lee — this book is your blueprint for uncovering hidden secrets in hacked datasets. In the current age of hacking and whistleblowing, the internet contains massive troves of leaked information....
  • №83
  • 7,57 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Apress Media LLC, 2023. — 245 p. — ISBN-13: 978-1-4842-9319-5. Понимание, управление и измерение кибер-рисков: практические решения для создания устойчивой кибербезопасности When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components,...
  • №84
  • 10,31 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 150 p. — ISBN-13 979-8-8688-0823-4. Безопасность и конфиденциальность в современных сетях: стратегии и идеи по защите цифровых инфраструктур This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense...
  • №85
  • 562,47 КБ
  • добавлен
  • описание отредактировано
No Starch Press, 2024. — 200 р. — ISBN-13: 978-1-7185-0383-0. The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their...
  • №86
  • 1,35 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Springer Nature, 2024. — 208 p. — ISBN 978-981-99-4943-4. The continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has...
  • №87
  • 10,26 МБ
  • добавлен
  • описание отредактировано
Syngress, 2016. — 226 p. — ISBN: 978-0-12-803306-7. DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the...
  • №88
  • 2,19 МБ
  • добавлен
  • описание отредактировано
Independent, 2023. — 21 p. — ASIN: B0C3827CF3. "The Algorithm Hack: The Secret to Social Media Success" is a must-read for anyone looking to enhance their social media presence and gain more visibility online. In today's digital age, social media has become a powerful tool for businesses, entrepreneurs, and individuals alike, but with so many users and so much content being...
  • №89
  • 224,32 КБ
  • добавлен
  • описание отредактировано
M
De Gruyter, 2023. — 160 р. — ISBN 978-3-11-076676-9. Cyber threats today are one of the expensive losses that an organization can face. Today, it is impossible to deploy effective cybersecurity technology without relying heavily on advanced techniques like Machine Learning and Deep Learning. Cybersecurity is a growing challenge in the era of Internet. This book addresses...
  • №90
  • 1,53 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2021. — 267 p. — ISBN 978-1718500549. Like Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security. Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a...
  • №91
  • 5,61 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 288 p. — ISBN-13: 978-1394226238. A comprehensive overview for directors aiming to meet their cybersecurity responsibilities. In the following chapters, we will cover various cybersecurity topics in depth, such as threat actors, data breaches, compliance regulations, risk assessments, and incident response. But more importantly, we will provide...
  • №92
  • 492,79 КБ
  • добавлен
  • описание отредактировано
Addison-Wesley Professional, 2016. — 317 p. — (SEI Series in Software Engineering). — ISBN10: 0134189809. — ISBN13: 978-0134189802. This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition....
  • №93
  • 13,52 МБ
  • добавлен
  • описание отредактировано
Lulu Publishing Services, 2016. — 45 p. — ISBN10: 1483446344. — ISBN13: 978-1483446349. The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about? This dictionary began life...
  • №94
  • 215,61 КБ
  • добавлен
  • описание отредактировано
Independently published, 2023. — 118 p. — ISBN: 978-3986536312. NEW 2022 UPDATE! THE NEW EDITION INCLUDES ALL OF THE READERS’ SUGGESTIONS. The books have been appropriately updated, edited, and proofread, and new information has been added. Most of us associate hacking with individuals with a lot of programming abilities and lose morality, and it is too difficult for us to...
  • №95
  • 340,65 КБ
  • добавлен
  • описание отредактировано
Manning Publications, 2022. — 250 p. — ISBN: 978-1617298202. Cybersecurity Career Guide unlocks your pathway to becoming a great security practitioner. You’ll learn how to reliably enter the security field and quickly grow into your new career, following clear, practical advice that’s based on research and interviews with hundreds of hiring managers. Practical self-analysis...
  • №96
  • 1,67 МБ
  • добавлен
  • описание отредактировано
Independently published, 2024. — 252 p. — (Python Trailblazer’s Bible). — ASIN: B0D5VXZ1GB. Cybersecurity Crash Course: From Digital Chump to Cyber Champion in One Sitting Feeling like a sitting duck in a digital world crawling with hackers? Does the mere mention of “phishing” send shivers down your spine? You’re not alone. In today’s hyper-connected world, everyone – from...
  • №97
  • 426,38 КБ
  • добавлен
  • описание отредактировано
BPB Publications, 2023. — 564 p. — ISBN 978-93-55513-137. Security is a shared responsibility, and we must all own it. Once a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks,...
  • №98
  • 2,16 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 199 p. — (The Human Element in Smart and Intelligent Systems). — ISBN 978‑1‑032‑61051‑1. Анализ человеческого фактора 23 кибератаки As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.4 billion a day. While technical issue analyses are...
  • №99
  • 1,55 МБ
  • добавлен
  • описание отредактировано
Independently published, 2023-05-05. — 152 р. — ISBN-13: 979-8393656386. "APIs Unlocked: Defending Against Hackers and Threats" is a comprehensive guide to securing APIs in the modern digital landscape. APIs have become an essential component of modern software development, but they are also increasingly targeted by hackers looking to exploit vulnerabilities and gain access to...
  • №100
  • 83,63 КБ
  • добавлен
  • описание отредактировано
Packt Publishing Ltd., 2020. — 418 p. — ISBN: 978-1-83898-992-7. Plan and design robust security architectures to secure your organization’s technology landscape and the applications you develop Cybersecurity architects work with others to develop a comprehensive understanding of the business’ requirements. They work with stakeholders to plan designs that are implementable,...
  • №101
  • 7,14 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2022. — 208 p. — ISBN 978-1119863137. This book offers any senior level executive an understanding of the core fundamentals of Cyber Risk, which is critical for any business to remain sustainable and viable in the information age era of disruptive cyber-attacks. For any executive to understand that Cyber Risk is like any other business risk, it needs to...
  • №102
  • 1,54 МБ
  • добавлен
  • описание отредактировано
N
Amazon Digital Services LLC, 2016. — 359 p. — ASIN: B01M59TGT0. The Essential Cyber Security Handbook is a great resource anywhere you go; it presents the most current and leading edge research on system safety and security. You do not need to be a cyber-security expert to protect your information. There are people out there whose main job it is trying to steal personal and...
  • №103
  • 717,04 КБ
  • добавлен
  • описание отредактировано
Inforge.net, 2018. — 176 p. Have you ever wished to become a hacker? If the answer is yes, this book is for you! Started as a crowdfunding project, Hacklog Volume 1: Anonymity is the first of a book collection dedicated to who wants to enter the world of Hacking and IT Security. You’ll learn how to use the tools real-life hackers leverage everyday to avoid controls, how to...
  • №104
  • 1,07 МБ
  • добавлен
  • описание отредактировано
O
2nd Edition. — Apress Media LLC, 2024. — 235 p. — ISBN-13: 979-8-8688-0339-0. Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will...
  • №105
  • 7,82 МБ
  • добавлен
  • описание отредактировано
Apress, 2019. — 188 p. — ISBN13: (electronic): 978-1-4842-4309-1. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or...
  • №106
  • 8,29 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC., 2024. — 319 р. — ISBN-13: 979-8-8688-0174-7. There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the...
  • №107
  • 1,10 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2020. — 368 p. — ISBN: 978-1-83864-817-6. Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings A computer forensics investigator must possess a variety of skills, including the ability to answer legal questions, gather and document evidence, and prepare for an...
  • №108
  • 42,92 МБ
  • добавлен
  • описание отредактировано
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
  • №109
  • 3,74 МБ
  • добавлен
  • описание отредактировано
Springer, 2022. — 59 p. — (Springer Briefs in Computer Science). — ISBN 978-3-031-11626-1. This book discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge...
  • №110
  • 5,67 МБ
  • добавлен
  • описание отредактировано
Springer, 2022. — 336 р. — ISBN 978-3-031-05752-6. This book presents a collection of state-of-the-art Artificial Intelligence (AI) and Big Data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive countermeasures. It also introduces...
  • №111
  • 10,04 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2019. — 534 p. — ISBN: 978-1-78961-619-4. It’s not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO’s like Satya Nadella, McAfee’s CEO Chris Young, Cisco’s CIO Colin...
  • №112
  • 8,11 МБ
  • добавлен
  • описание отредактировано
P
Kavis Web Designer, 2023-10-16. — 239 p. — ASIN: B0CL72QSS8. Ethical Hacking Tutorial For Beginners Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated. In this tutorial, we will...
  • №113
  • 9,80 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2022. — 339 p. — ISBN 978-1-119-83367-3 (ebk.). Land the perfect cybersecurity role—and move up the ladder—with this insightful resource. Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In...
  • №114
  • 504,30 КБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2019. — 518 p. — ISBN: 978-1-83864-016-3. Get up to speed with various penetration testing techniques and resolve security threats of varying complexity Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you’ll learn crucial penetration testing...
  • №115
  • 193,99 МБ
  • добавлен
  • описание отредактировано
Q
John Wiley & Sons, 2019. — 251 p. — ISBN: 978-1-119-61736-5. Cybersecurity experts from across industries and sectors share insights on how to think like scientists to master cybersecurity challenges Humankind’s efforts to explain the origin of the cosmos birthed disciplines such as physics and chemistry. Scientists conceived of the cosmic ‘Big Bang’ as an explosion of...
  • №116
  • 1,46 МБ
  • добавлен
  • описание отредактировано
R
BPB Publications, 2022. — 472 р. — ISBN-13: 978-9355512154. Discover security posture, vulnerabilities, and blind spots ahead of the threat actor Key Features Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning,...
  • №117
  • 15,14 МБ
  • добавлен
  • описание отредактировано
Wiley, 2021. — 480 p. — ISBN-13 978-1119809555. Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is...
  • №118
  • 1,08 МБ
  • добавлен
  • описание отредактировано
Skyhorse Publishing, 2023. — 240 p. Intelligent Safety: How to Protect Your Connected Family from Big Cybercrime by Hari Ravichandran teaches how we can put our families’ online safety on autopilot and regain our peace of mind. It provides families with the tools and knowledge they need to create a personalized, proactive defense against cybercriminals. From identifying the...
  • №119
  • 970,72 КБ
  • добавлен
  • описание отредактировано
Apress, 2019. — 455 p. — ISBN13: (electronic): 978-1-4842-4460-9. Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your...
  • №120
  • 47,40 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2020. — 506 p. — ISBN: 978-1-83882-886-8. Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage It’s now more important than ever for organizations to be ready to detect and respond to security events and breaches....
  • №121
  • 98,37 МБ
  • добавлен
  • описание отредактировано
Pearson, 2018. — 704 p. — ISBN: 0789759351. All You Need to Know to Secure Linux Systems, Networks, Applications, and Datain one Book From the basics to advanced techniques: no Linux security experience necessary Realistic examples & step-by-step activities: practice hands-on without costly equipment The perfect introduction to Linux-based security for all students and IT...
  • №122
  • 37,36 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2020. — 190 p. — ISBN: 978-1-78980-700-4. Cyber Minds brings together an unrivalled panel of international experts who offer their insights into current cybersecurity issues in the military, business, and government. Shira Rubinoff’s Cyber Minds brings together the top authorities in cyber security to discuss the emergent threats that face industries,...
  • №123
  • 3,26 МБ
  • добавлен
  • описание отредактировано
S
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
  • №124
  • 53,04 МБ
  • добавлен
  • описание отредактировано
3rd Edition. — Pearson IT Certification, 2018. — 672 p. — ISBN13: 978-0-7897-5940-5. All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and...
  • №125
  • 5,35 МБ
  • добавлен
  • описание отредактировано
McGraw-Hill Education, 2018. — 592 p. — ISBN: 978-1260118179. Cutting-edge cybersecurity solutions to defend against the most sophisticated attacks This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain...
  • №126
  • 3,38 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2020. — 256 p. — (For Dummies). — ISBN: 978-1-119-57747-8. Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with...
  • №127
  • 5,78 МБ
  • добавлен
  • описание отредактировано
Mercury Learning and Information, 2024. — 150 p. — ISBN: 978-1-50152-312-0. Surviving a Cyberattack: Securing Social Media and Protecting Your Home is a roadmap to protecting your homeagainst cybercrime. This comprehensive guide addresses the ever-growing challenges users face from the potential of cybercrime in the technology-connected world. It explores various online risks,...
  • №128
  • 2,77 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2020. — 102 p. — ISBN-13: 978-0-367-64278-5. Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part of our lives in an environment that is almost an essential service but is full of potential dangers: a place where criminals...
  • №129
  • 290,00 КБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2022. — 230 p. — ISBN-13 (electronic): 978-1-4842-7744-7. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords,...
  • №130
  • 6,78 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley; Pearson, 2023. — 550 p. — ISBN-13: 978-0-13-792923-8. 175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them. Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our...
  • №131
  • 13,70 МБ
  • добавлен
  • описание отредактировано
Amazon Digital Services LLC, 2017. — 107 p. — ASIN B074Q31MKM. Have you been hacked yet? covers all the basics you need to know to protect yourself and your loved ones against the most common cyber security threats to privacy and financial well being: what are the threats a typical user of information technology faces these days, who are your "cyber enemies", their tools and...
  • №132
  • 2,04 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2020. — 368 p. — ISBN: 978-1-119-56034-0 (EPUB). Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both...
  • №133
  • 2,30 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — BCS, The Chartered Institute for IT, 2022. — 333 p. Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of...
  • №134
  • 1,68 МБ
  • добавлен
  • описание отредактировано
T
4th Edition. — Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty. — Packt Publishing, 2020. — 525 p. — ISBN: 978-1-83864-752-0. Become well-versed with forensics for the Android, iOS, and Windows 10 mobile platforms by learning essential techniques and exploring real-life scenarios Mobile phone forensics is the science of retrieving data from a mobile phone under...
  • №135
  • 40,32 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 217 p. — ISBN: 978-981-15-1706-8 (eBook). This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further,...
  • №136
  • 17,36 МБ
  • добавлен
  • описание отредактировано
Apress, 2018. — 136 p. — ISBN13: (electronic): 978-1-4842-3870-7. Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don’t allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a...
  • №137
  • 17,96 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
  • №138
  • 2,07 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, 2019. — 306 p. — ISBN: 978-1-492-04131-3. If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This...
  • №139
  • 774,69 КБ
  • добавлен
  • описание отредактировано
V
BPB Publications, 2024. — 414 р. — ISBN 978-93-5551-7180. Empowering you to investigate, analyze, and secure the digital realm. Key Features: Comprehensive coverage of all digital forensics concepts. Real-world case studies and examples to illustrate techniques. Step-by-step instructions for setting up and using essential forensic tools. In-depth exploration of volatile and...
  • №140
  • 9,32 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2020. — 356 p. — ISBN: 978-0-367-34602-7. Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email...
  • №141
  • 5,33 МБ
  • добавлен
  • описание отредактировано
W
Apress Media LLC., 2024. — 334 p. — ISBN-13: 979-8-8688-0785-5. The digital age has ignited a new era of opportunity and efficiency. However, this interconnected world has also created a rapidly evolving landscape of cyber threats. In 2023 alone, cybercrime caused an estimated $6 trillion in global damages, a staggering figure that showcases the immense financial risk...
  • №142
  • 2,88 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
  • №143
  • 9,03 МБ
  • добавлен
  • описание отредактировано
X
Wiley-IEEE Press, 2023. — 147 р. — ISBN 978-1119784128. Cybersecurity in Intelligent Networking Systems Help protect your network system with this important reference work on cybersecurity Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social...
  • №144
  • 3,84 МБ
  • добавлен
  • описание отредактировано
А
СПб.: Питер, 2022. — 400 с. — ISBN 978-5-4461-1938-7. Цифровая среда — Интернет, социальные сети, приложения – является неотъемлемой частью той «мультиреальности», в которой существует современный человек. Естественно, что вместе с неоспоримой пользой виртуальность приносит в нашу жизнь и огромные риски. Сейчас цифровой мир – это джунгли, подчас населённые не самыми приятными...
  • №145
  • 2,80 МБ
  • добавлен
  • описание отредактировано
Л
СПб.: Питер, 2024. — 544 с.: ил. — (Библиотека программиста). — ISBN: 978-5-4461-2125-0. Как обеспечить надежную защиту в эпоху, когда кибератаки становятся всё более продвинутыми? Каковы последствия уязвимости цифровых систем? Пётр Левашов, экс-хакер с богатым бэкграундом, рассматривает все грани кибербезопасности, начиная с базовых принципов и заканчивая новейшими...
  • №146
  • 1,10 МБ
  • добавлен
  • описание отредактировано
С
М.: Альпина ПРО, 2023. — 128 с. — ISBN 978-5-2060-0170-9. «Шифровальщики» – это программы, которые находят уязвимости в сетях предприятий, чтобы потом с помощью этих уязвимостей внедриться в сеть, завладеть ценной для предприятия информацией и далее вымогать деньги из руководства компании. Разумеется, программы эти создаются людьми, которые могут как объединяться в преступные...
  • №147
  • 3,78 МБ
  • добавлен
  • описание отредактировано
У
Выходные данные не указаны. Книга о различных аспектах хакерской культуры, написанная шведским хакером в середине 1990-ых.
  • №148
  • 2,24 МБ
  • добавлен
  • описание отредактировано
Я
Пер. с англ. Евгений Бурмакин. — Victoria, British Columbia, Canada; leanpub.com, 2016. — 201 с. "Основы веб-хакинга" рассказывает об этичном использовании софта для поиска уязвимостей в безопасности и о том, что научиться взламывать не всегда легко. С небольшими исключениями, существующие книги являются чрезмерно технологическими, посвящая лишь одну главу уязвимостям в сайтах...
  • №149
  • 5,53 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

В этом разделе нет комментариев.