Elsevier Inc., 2014. — 590 p. — ISBN 978-0-12-411474-6. Lack of security is a constant concern in open distributed systems. Because of this problem, many tools for evaluating vulnerabilities of networks, as well as for their protection, are being developed and largely deployed; for example, techniques for encryption, antivirus, firewall, and IDSs (Intrusion Detection Systems)....
Springer, 2021. — 564 p. — ISBN 978-3-030-69459-3. This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical...
2nd edition. — Springer, 2016. — 128 p. — ISBN: 978-3-319-29742-2. The purpose of this book is the same as before: to raise user awareness in regard to security and privacy threats present in the use of mobile phones. It is focused on practical issues and easy to follow examples, skipping theoretical analysis of algorithms and standards. Most sections have been enriched with...
John Wiley & Sons, Inc., 2020. — 448 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
John Wiley & Sons, Inc., 2020. — 464 p. — ISBN: 978-1-119-56026-5. Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing...
Springer, 2024. — 385 p. — ISBN 978-3-031-37988-8. This book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO’s and DON’Ts in this approach....
Springer, 2024. — 385 p. — ISBN 978-3-031-37989-5. This book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO’s and DON’Ts in this approach....
Packt Publishing, 2021. — 282 p. — ISBN 978-1-83921-227-7. Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key Features Investigate, detect, and respond to various types of malware threat Understand how to use what you've learned as an analyst to produce actionable IOCs and...
Packt Publishing, 2021. — 282 p. — ISBN 978-1-83921-227-7. Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key Features Investigate, detect, and respond to various types of malware threat Understand how to use what you've learned as an analyst to produce actionable IOCs and...
Wiley, 2025. — 821 p. — ISBN-13 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment. In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and...
2nd Edition. — Cengage, 2014. — 393 p. — ISBN 978-0-8400-2093-2. Delivering up-to-the-minute coverage, Computer Security and Penetration Testing, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge...
Basta Alfred, Basta Nadine, Anwar Waqar, Essar Mohammad I. — Wiley, 2025. — 480 p. — ISBN-13: 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of...
Basta Alfred, Basta Nadine, Anwar Waqar, Essar Mohammad I. — Wiley, 2025. — 480 p. — ISBN-13: 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of...
Basta Alfred, Basta Nadine, Anwar Waqar, Essar Mohammad I. — Wiley, 2025. — 480 p. — ISBN-13: 978-1394201600. A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of...
Wiley-Scrivener, 2021. — 320 p. — ISBN 978-1-119-76040-5. Artificial intelligence (AI) and data mining is the fastest growing field in computer science. AI and data mining algorithms and techniques are found to be useful in different areas like pattern recognition, automatic threat detection, automatic problem solving, visual recognition, fraud detection, detecting...
Springer, 2009. — 384 p. It is our great pleasure to compile the Platinum Jubilee Commemorative Monograph Series of the Indian Statistical Institute: Volume 3, titled Algorithms, Architectures, and Information Systems Security. This volume contains mostly a collection of invited papers from leading researchers. It also includes the extended versions of a few papers, which were...
Morgan Kaufmann, 2019. — 501 p. — ISBN: 9780128124772. This book provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory...
Springer, 2017. — 316 p. — ISBN: 3319500554. This book is about security in embedded systems and it provides an authoritative reference to all aspects of security in system-on-chip (SoC) designs. The authors discuss issues ranging from security requirements in SoC designs, definition of architectures and design choices to enforce and validate security policies, and trade-offs...
Packt Publishing, 2011. - 337 p.
This book is a practical, step-by-step tutorial to planning deployment, installing, configuring, and troubleshooting Data Protection Manager 2010. It will take you through all the steps required to use DPM to effectively back up your business data. If you are a Network Administrator, System Administrator, Backup Administrator, Storage...
Springer, 2016. — 599. The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari...
Packt Publishing, 2018. - 497p. - ISBN: 978-1788997409 Become a master at penetration testing using machine learning with Python Key Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithms Book Description Cyber security is crucial for both businesses and...
Packt Publishing, 2018. - 497p. - ISBN: 978-1788997409 Become a master at penetration testing using machine learning with Python Key Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithms Book Description Cyber security is crucial for both businesses and...
Packt Publishing, 2018. - 497p. - ISBN: 978-1788997409 !Code files only Become a master at penetration testing using machine learning with Python Key Features Identify ambiguities and breach intelligent security systems Perform unique cyber attacks to breach robust systems Learn to leverage machine learning algorithms Book Description Cyber security is crucial for both...
O’Reilly Media, 2018. — 371 p. — ISBN: 1491979909. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you'll explore ways to apply machine learning to...
O’Reilly Media, 2018. — 386 p. — ISBN: 1491979909. True PDF Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level...
O’Reilly Media, 2018. — 386 p. — ISBN: 978-1-491-97990-7. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine...
O’Reilly Media, 2018. — 386 p. — ISBN: 978-1-491-97990-7. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine...
O’Reilly Media, 2018. — 386 p. — ISBN: 978-1-491-97990-7. Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself! With this practical guide, you’ll explore ways to apply machine...
O’Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine...
O’Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine...
O’Reilly Media, 2017. — 300 p. Machine learning has become a hot topic in computer security in the past couple of years as a technique that can counter advances in attacker competency. This book will provide security and software practitioners with a practical guide to approaching modern security with machine learning. If you have a surface-level understanding of machine...
Syngress, Elsevier, 2013. — 460 p. — ISBN10: 1597496359. Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log analysis methods are...
Independently published, 2019. — 408 p. Do you feel that informatics is indispensable in today’s increasingly digital world? Do you want to introduce yourself to the world of programming or cyber security but don’t know where to get started? If the answer to these questions is yes, then keep reading… Computer Programming And Cyber Security for Beginners. This Book Includes:...
Springer, 2021. — 219 p. — (Services and Business Process Reengineering). — ISBN 978-981-16-1006-6. This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for...
Springer, 2021. — 219 p. — (Services and Business Process Reengineering). — ISBN 978-981-16-1006-6. This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for...
Auerbach Publications, 2017. — 422 p. — ISBN: 978-1482244151. This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is data protection?...
2nd edition. — Auerbach Publications, 2021. — 423 p. — ISBN 9780367474102. The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and...
2nd Edition. — CRC Press, 2020. — 422 p. — ISBN: 978-0-367-25677-7. The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues. A new model is presented for understanding and planning the...
Packt Publishing, 2021. — 236 p. — ISBN 978-1-80056-798-6. Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and...
Packt Publishing, 2021. — 236 p. — ISBN 978-1-80056-798-6. Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and...
Packt Publishing, 2021. — 236 p. — ISBN 978-1-80056-798-6. Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and...
O’Reilly Media, 2015. - 296p. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
Mercury Learning and Information, 2022. — 350 p. — ISBN-13: 978-1683926634. Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases . Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1302-3. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
Apress Media LLC, 2025. — 224 p. — ISBN-13: 979-8-8688-1303-0. Remote development has drastically changed the way teams build software. The freedom to work from wherever and possibly whenever has increased flexibility, but these benefits have not come without growing pains. The people managing this new type of team have worked tirelessly to adapt existing practices to this new,...
CRC Press, 2019. — 263 p. — ISBN13: 978-0-3673-4284-5. This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
Packt Publishing Ltd., July 2020. — 572 p. — ISBN: 978-1-83921-641-1. Enhance Windows security and protect your systems and servers from various cyber attacks Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide to help you gain expertise when implementing...
Independently published, 2025. — 196 p. — ISBN 978-1230008883872. EPUB (true) 18+ Exploring the Dark Web: An Ex-Hacker’s True Horror Stories & Cyber Secrets. Unmask the Hidden Internet – A Real-World Deep Dive into the Dark Web. Have you ever been curious about the Dark Web, Deep Web, and Hidden Internet? Forget the myths—this firsthand account from an ex-hacker reveals the...
New York: Springer, 2020. — 289 p. This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based...
Springer, 2023. — 415 p. — ISBN 978-3-031-26895-3. САПР для аппаратной безопасности This book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253128. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
John Wiley & Sons, Inc., 2024. — 368 р. — ISBN-13: 978-1394253135. Discover the power of open source observability for your enterprise environment In Mastering Observability and OpenTelemetry: Enhancing Application and Infrastructure Performance and Avoiding Outages, accomplished engineering leader and open source contributor Steve Flanders unlocks the secrets of enterprise...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Jones & Bartlett Learning, 2023. — 658 р. — ISBN 978-1284261158. Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software engineering) together. It addresses the software development process from the perspective of a security practitioner. The text focuses on...
Springer, 2016. — 112 p. — ISBN10: 3319449613. This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and...
Springer, 2008. — 577 p. — ISBN: 978-0-387-48533-1. The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. This edited volume represents the most comprehensive work on...
O’Reilly, 2007. - 652 pages. На англ. языке. ISBN10: 0596528353 ISBN13: 978-0596528355 Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build...
Independently published, 2021. — 377 p. — ISBN B08TMTT677. All the Basic Knowledge a newcomer Must Have It is not easy in the ocean of information to find a guide that explains the basics of programming well, avoiding you to jump from one language to another without understanding what you are doing taking the first steps by following the right manual, will facilitate the...
Independently published, 2021. — 377 p. — ISBN B08TMTT677. All the Basic Knowledge a newcomer Must Have It is not easy in the ocean of information to find a guide that explains the basics of programming well, avoiding you to jump from one language to another without understanding what you are doing taking the first steps by following the right manual, will facilitate the...
Independently published, 2021. — 377 p. — ISBN B08TMTT677. All the Basic Knowledge a newcomer Must Have It is not easy in the ocean of information to find a guide that explains the basics of programming well, avoiding you to jump from one language to another without understanding what you are doing taking the first steps by following the right manual, will facilitate the...
Wiley, 2022. — 323 p. — ISBN 978-1-119-84912-4. Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger...
Wiley, 2022. — 323 p. — ISBN 978-1-119-84912-4. Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger...
New York: IOS Press, 2014. - 104p. Until quite recently, the correctness and security of software systems was a largely theoretical problem relevant only for a small group of computer specialists. Today it is a fundamental problem for society at large, with security breaches in banking software, malware attacks and bugs in programs affecting millions of people and making the...
Springer, 2024. — 126 p. — ISBN 978-3-031-65437-4. Digital Shakedown: полное руководство по пониманию программ-вымогателей и борьбе с ними This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel...
Springer, 2024. — 126 p. — ISBN 978-3-031-65437-4. Digital Shakedown: полное руководство по пониманию программ-вымогателей и борьбе с ними This book is a comprehensive review of ransomware that covers ransomware from every angle. It presents origins, components, purpose, impacts, relevant laws, prevention techniques and proposed solutions. This book also introduces novel...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
Packt Publishing, 2018. — 346 p. Master Shellcode to leverage the buffer overflow concept Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you...
River Publishers, 2021. — 280 p. — ISBN 978-87-7022-423-9. Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used ineffectively. The editors have developed multiple projects which can help in...
Apress, 2004. — 200 p. — ISBN: 1590592662 This book is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate those attacks and compromises and harden Windows NT, 2000, XP, and Server 2003 against them. administrators know the Internet is a hostile environment. They can't tell when a hacker will attempt to...
Artech House, 2018. — 285 p. — (Artech House Information Security and Privacy). — ISBN10: 1630811343, 13 978-1630811341. This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into...
Буклет от компании InfoWatch
Содержание.
Введение.
Защита конфиденциальности.
Решения.
InfoWatch Traffic Monitor.
InfoWatch Device Monitor.
InfoWatch Enterpriwe Solution.
Сервисы.
Наши партнеры.
О компании.
Wiley, 2014. — 354 p. in color. — ISBN: 1118793722, 9781118793725 Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon...
Wiley-IEEE Press, 2011. — 728 p. — ISBN: 0470565128, 9780470565124
Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
Syngress, 2016. — 678 p. — ISBN: 0128023244. Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and...
2nd Edition. — Academic Press, 2020. — 763 p. — ISBN: 978-0-12-818427-1. Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all...
Syngress, 2016. — 678 p. — ISBN: 0128023244. Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and...
Cary, NC: DZone, 2018. — 54 p. As software attacks become more frequent and severe, it’s becoming more and more important to understand the top threats and how to protect against them. The 2018 DZone Guide to Security: Defending Your Code covers going beyond shifting left to protect applications, how to reduce hacker risk, and how AI takes security to the next level. 2...
InTech, 2012. — 233 p. — ISBN: 9-5351-0643-2. This book aims to present a number of innovative security enhanced applications. The book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network...
Springer, 2021. — 212 p. — ISBN 978-3-030-74663-6. The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and...
Springer, 2021. — 212 p. — ISBN 978-3-030-74663-6. The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and...
Springer, 2018. — 174 p. — (Advances in Information Security 71). — ISBN: 331991426X. This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas. It also considers scenarios where deploying smart grids can be both cost-prohibitively expensive and logistically challenging. Deploying smart...
CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
CRC Press, 2025. — 200 p. — ISBN-13: 978-1-003-60467-9. This book helps to reduce the risk of data loss by monitoring and controlling the flow of sensitive data via network, email, or web. Guardians of Data also shows guidance about data protection that data is not corrupted, is accessible for authorized purposes only, and is in compliance with applicable legal or regulatory...
No Starch Press, 2022. — 332 p. — ISBN 978-17185-0192-8. Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the...
Morgan & Claypool, 2013. — 117 p.
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of...
Kumar P., Obaid A.J., Cengiz K., Khanna A., Balas V.E. — Springer, 2022. — 462 p. — ISBN 978-3-030-76652-8. This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the...
Springer, 2015. — 368 p. This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical...
Wiley, 2016. — 184 p. — ISBN: 1848218508. This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it...
Wiley, 2015. — 362 p. — ISBN: 1118896696, 9781118896693 Similar to unraveling a math word problem, Security Intelligence: A Practitioner s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
John Wiley & Sons, Inc., 2015. — 309 p. — ISBN: 978-1-118-89667-9 (ebk). Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology...
Packt Publishing, 2021. — 272 p. — ISBN 978-1800566354. Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize...
Packt Publishing, 2021. — 272 p. — ISBN 978-1800566354. Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize...
Packt Publishing, 2021. — 272 p. — ISBN 978-1800566354. Advance your career as an information security professional by turning theory into robust solutions to secure your organization Key Features Convert the theory of your security certifications into actionable changes to secure your organization Discover how to structure policies and procedures in order to operationalize...
CRC Press, 2021. — 220 p. — ISBN 9780367700027. Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. Designing Secure Systems takes a theory-based approach to concepts underlying all forms of systems, from...
Apress, 2016. — 132 p. — ISBN: 978-1-484218-56-3. Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you’ll gain the foundations...
Metasploit Project, 2019. — 295 с. Metasploit - это платформа тестирования проникновений, которая позволяет находить, использовать и подтверждать уязвимости. Платформа включает в себя Metasploit Framework и ее коммерческие версии: Metasploit Pro, Express, Community и Nexpose Ultimate.
CRC Press, 2014. — 572 p. — ISBN10: 143989583X, ISBN13: 978-1-4398-9584-9. На англ. языке. Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...
BPB Publications, 2022 — 875 p. — ISBN 9789391030377 Reverse Engineering (RE) is an art of understanding any program code when no source code is available. This book provides stepbystep explanation of the essential concepts and practical examples to understand and implement Reverse Engineering. It will enable the readers to understand the application code flow to identify...
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
BPB Publications, 2023. — 285 р. — ISBN 978-93-5551-362-5. Crack a ransomware by identifying and exploiting weaknesses in its design. Key Features: - Get an overview of the current security mechanisms available to prevent ransomware digital extortion. - Explore different techniques to analyze a ransomware attack. - Understand how cryptographic libraries are misused by malware...
Пособие по администрирования одного из лучших бесплатных продуктов в области защиты компьютерных сетей. Превосходно подходит как для фирменных так и для индивидуальных пользователей. IPS Firewall создан на основе бесплатной FreeBSD. Постоянно обновляется, содержит антивирус, прокси технология и многое другое.
Springer, 2024. — 197 p. — ISBN 978-981-97-1458-2. The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in...
Springer, 2024. — 197 p. — ISBN 978-981-97-1458-2. The rise of Android malware poses a significant threat to users’ information security and privacy. Malicious software can inflict severe harm on users by employing various tactics, including deception, personal information theft, and device control. To address this issue, both academia and industry are continually engaged in...
Springer, 2021. — 163 p. — ISBN 978-3-030-77221-5. It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted...
Springer, 2021. — 163 p. — ISBN 978-3-030-77221-5. It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted...
Arcler Press, 2025. — 244 p. — ISBN: 978-1-77956-418-4. Databases store sensitive and critical information, making them prime targets for cyberattacks. This book deals with the methods for protecting databases against internal breaches, external threats, and advanced persistent attacks. Topics include encryption, access control, and intrusion detection systems. With practical...
Springer, 2019. - 152 p. - ISBN: 1447144589. Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems . Features: reviews the historical developments...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9035-4. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
5th Edition. — Apress Media, LLC., 2023. — 620 p. — ISBN-13: 978-1-4842-9036-1. Пошаговое руководство по компьютерной безопасности и конфиденциальности для неспециалистов Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers...
O’Reilly Media, Inc., 2021. — 370 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
O’Reilly Media, Inc., 2021. — 370 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
O’Reilly Media, Inc., 2021. — 387 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
O’Reilly Media, Inc., 2021. — 387 p. — ISBN 978-1492094050. Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including...
Apress, 2020. — 161 p. — ISBN13: 978-1-4842-6401-0. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an...
Apress, 2020. — 161 p. — ISBN13: 978-1-4842-6401-0. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely used for manual application security testing of web applications plus APIs and mobile apps. The book starts with the basics and shows you how to set up a testing environment. It covers basic building blocks and takes you on an...
Packt Publishing, 2017. — 190 p. — ISBN: 978-1788295970. Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its...
Apress, 2019. - 145p. - ISBN: 1484242696 Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between...
Apress, 2019. - 145p. - ISBN: 1484242696 Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between...
Packt Publishing Limited, 2019. — 660 p. — ISBN: 978-1838822477, 183882247X. Master the Metasploit Framework and become an expert in penetration testing. Key Features Gain a thorough understanding of the Metasploit Framework Develop the skills to perform penetration testing in complex and highly secure environments Learn techniques to integrate Metasploit with the industry's...
Packt Publishing Limited, 2019. — 660 p. — ISBN: 978-1838822477, 183882247X. Master the Metasploit Framework and become an expert in penetration testing. Key Features Gain a thorough understanding of the Metasploit Framework Develop the skills to perform penetration testing in complex and highly secure environments Learn techniques to integrate Metasploit with the industry's...
Apress Media LLC., 2020. — 180 p. — ISBN13: 978-1-4842-6402-7. Use this comprehensive guide to learn the practical aspects of Burp Suite―from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely...
Apress Media LLC., 2020. — 180 p. — ISBN13: 978-1-4842-6401-0. Use this comprehensive guide to learn the practical aspects of Burp Suite―from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing. It is widely...
Apress Media LLC., 2020. — 180 p. — ISBN13: (electronic): 978-1-4842-6402-7. Use this comprehensive guide to learn the practical aspects of Burp Suite―from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps. Burp Suite is a simple, yet powerful, tool used for application security testing....
Packt Publishing, 2017. — 190 p. — ISBN: 978-1788295970. Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its...
Packt Publishing, 2017. — 190 p. — ISBN: 978-1788295970. Key Features Carry out penetration testing in highly-secured environments with Metasploit Learn to bypass different defenses to gain access into different systems. A step-by-step guide that will quickly enhance your penetration testing skills. Book Description This book will begin by introducing you to Metasploit and its...
Packt Publishing, 2017. — 860 p. — ISBN: 9781788624596. Exploit the secrets of Metasploit to master the art of penetration testing. Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities....
CRC Press, 2016. — 220 р. — (Internal Audit and IT Audit). — ISBN: 978-1498738835. Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
Leanpub, 2020-05-13. — 65 р. Book walks through a number of real world examples for reverse engineering data structures and algorithms found in malware. Walk through a number of real world examples for reverse engineering data structures and algorithms found in malware in order to gradually introduce the reader to more advanced examples culminating in reverse engineering a C2...
Wiley-IEEE Press, 2022. — 371 p. — ISBN 9781119771531. Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in...
Wiley-IEEE Press, 2022. — 371 p. — ISBN 9781119771531. Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in...
2nd Edition. — Packt Publishing, 2020. — 247 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
2nd Edition. — Packt Publishing, 2020. — 216 p. — ISBN: 978-1-83898-266-9. A comprehensive guide that will help you get started with the latest Metasploit 5.0 framework for exploiting real-world vulnerabilities Metasploit 5.x for Beginners, Second edition will help readers absorb the essential concepts of using the Metasploit framework for comprehensive penetration testing....
IGI Global, 2021. — 318 p. – (Advances in Information Security, Privacy, & Ethics (AISPE) Book Series). — ISBN 9781799834441. Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into...
CRC Press, 2021. — 191 p. — (Internet of Everything (IoE): Security and Privacy Paradigm). — ISBN 1119558638. This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and...
O’Reilly Media, Inc., 2024. — 402 p. — ISBN 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
O’Reilly Media, Inc., 2024. — 402 р. — ISBN-13: 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
O’Reilly Media, Inc., 2024. — 402 р. — ISBN-13: 978-1-098-16947-3. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of...
The Institution of Engineering and Technology, 2019. — 554 p. — ISBN 978-1-78561-799-7. IP Core Protection and Hardware-Assisted Security for Consumer Electronics presents established and novel solutions for security and protection problems related to IP cores (especially those based on DSP/multimedia applications) in consumer electronics. The topic is important to researchers...
MPS Limited, 2020. — 345 p. — ISBN: 978-1-83953-031-9. This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI...
Independently published, 2021. — 171 p. — ISBN B097Z5VFG6. The world’s most used penetration testing framework As metasploit.com says: Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;...
Independently published, 2021. — 171 p. — ISBN B097Z5VFG6. The world’s most used penetration testing framework As metasploit.com says: Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;...
Independently published, 2021. — 171 p. — ISBN B097Z5VFG6. The world’s most used penetration testing framework As metasploit.com says: Knowledge is power, especially when it’s shared. A collaboration between the open source community and Rapid7, Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;...
Independently published, 2021. — 131 p. — ISBN B08SKPVF8W. Fortigate Admin crash course was written with one thing in mind: To give you the skills needed to administrate your Fortigate Firewall fast, very fast, yet with a very solid foundation The book covers the basic set-up, admin account creation, configuring interfaces, creating firewall policies, backing up your...
FortiTip, 2021. — 99 p. — (Fortigate Pocket Guide, 3). — ISBN 979-8712681761. Knowing how to diagnose your FortiGate is probably one of the most important tools that you can acquire as a FortiGate professional. It will make you aware of what is happening on your network, on your FortiGate kernel, services, and much more. this skill set is unique and the mindset that you will...
FortiTip, 2021. — 128 p. — (Fortigate Pocket Guide, 2). — ISBN 979-8702335520. This book is a follow up to “Fortigate Admin Pocket Guide “: Following The basic administration and the creation of interfaces, policies, routes, and logs, we will now start to think as security warriors and inspect our traffic for viruses, malware, anomalies as Denial of service attacks and exploits...
Packt Publishing, 2012. — 269 p. — ISBN: 978-1-84951-742-3. Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present...
Packt Publishing, 2012. — 262 p. — ISBN: 978-1-84951-742-3. Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present...
Packt Publishing, 2012. — Code only. — ISBN: 978-1-84951-742-3. Приложения к файлу и файлу Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
Packt Publishing, 2020. — 532 p. — ISBN: 978-1-78995-352-7. Identify, exploit, and test web application security with ease Metasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you’ll explore another aspect of the framework – web...
Walter de Gruyter GmbH, 2021. — 234 p. — ISBN 978-3-11-061675-0. Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation....
Walter de Gruyter GmbH, 2021. — 234 p. — ISBN 978-3-11-061675-0. Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation....
Springer, 2023. — 228 p. — ISBN 978-3-031-19123-7. Provides a comprehensive introduction to logic locking, suitable for beginners and experts. Offers a novel perspective on hardware Trojan classification and its interplay with logic locking. Introduces scaling techniques to design and apply logic locking A subtle change that leads to disastrous consequences—hardware Trojans...
Springer, 2021. — 210 p. — ISBN 978-3-030-74449-6. This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book...
Springer, 2021. — 210 p. — ISBN 978-3-030-74449-6. This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book...
O’Reilly Media, 2017. — 240 p. — ISBN10: 149196362X, 13 978-1491963623. By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built...
Syngress, Elsevier, 2013., - 452 p., ISBN: 1597497479
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM)...
Springer, 2021. — 614 p. — ISBN 978-3-030-64447-5. This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware...
Springer, 2021. — 614 p. — ISBN 978-3-030-64447-5. This book provides an overview of emerging topics in the field of hardware security, such as artificial intelligence and quantum computing, and highlights how these technologies can be leveraged to secure hardware and assure electronics supply chains. The authors are experts in emerging technologies, traditional hardware...
Springer, 2023. — 331 p. This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers,...
Springer, 2024. - 537 p. - ISBN 3031586867. This book provides a look into the future of hardware and microelectronics security , with an emphasis on potential directions in security-aware design, security verification and validation, building trusted execution environments, and physical assurance . The book emphasizes some critical questions that must be answered in the domain...
Packt Publishing, 2018. — 426 p. — ISBN: 1788623177. Over 100 recipes for penetration testing using Metasploit and virtual machines Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social...
Packt Publishing, 2018. — 426 p. — ISBN: 1788623177. Over 100 recipes for penetration testing using Metasploit and virtual machines Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social...
CRC Press, 2023. — 191 p. — (Security, Privacy, and Trust in Mobile Communications). The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will...
Mamoun Alazab, Roopak Surendran, Teenu John, Tony Thomas. — CRC Press, 2022. — 174 p. — ISBN-13: 978-0367638719. The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile...
CRC Press, 2010. – 482 p. – ISBN: 0849370523, 9780849370526
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to...
Springer International Publishing AG, 2017. — 106 p. — ISBN: 9783319489469 With the rapid development of Internet-based technologies and the increasing reliance of society on these technologies, providing security and assurance to information systems has become a critical endeavor for practitioners and the various stakeholders impacted by information and system insecurities. In...
CRC Press, 2001. — 282 p. — ISBN: 0-8493-9988-2. Information Security Architecture Why an Architecture? Getting Started Security Organization and Infrastructure The Security Organization The Executive Committee for Security Centralized versus Decentralized Security Administration Risk-Based Approach to Classifying Resources Levels of Classification Getting Started: Project...
No Starch Press, 2022. — 515 p. — ISBN 978-1-59327-874-8, 978-1-59327-875-5. The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re...
No Starch Press, 2022. — 512 p. — ISBN 978-3-030-74651-3. The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones,...
No Starch Press, 2022. — 781 p. — ISBN-13: 978-1-59327-874-8. The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in phones,...
No Starch Press, 2022. — 781 p. — ISBN-13: 978-1-59327-875-5 (ebook). The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in...
No Starch Press, 2022. — 781 p. — ISBN-13: 978-1-59327-875-5 (ebook). The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they’re everywhere—in...
Springer, 2021. — 211 p. — ISBN 978-3-030-73444-2. Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and...
Springer, 2021. — 211 p. — ISBN 978-3-030-73444-2. Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and...
BookRix, 2018. — 40 p. — ASIN B00YRUNSZI. The eBook to the freeware password management "Password Case" from the "PRIMA"-series ((Private Information Management) describes often with an example all available functions. You can save "normal" password data and also access data for your mobile phone / cellular phone (PIN, PUK, PUK2). There is a reminder for passwords with an...
BookRix, 2018. — 38 p. — ASIN B00YRUNSZI. The eBook to the freeware password management "Password Case" from the "PRIMA"-series ((Private Information Management) describes often with an example all available functions. You can save "normal" password data and also access data for your mobile phone / cellular phone (PIN, PUK, PUK2). There is a reminder for passwords with an...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
Amazon.com Services LLC, 2020. — 193 p. — ISBN: 979-8614981143. This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or...
John Wiley & Sons Singapore Pte. Ltd., 2013. — 343 p. — ISBN: 978-1-118-16881-3. На англ. языке. The first book to introduce computer architecture for security and provide the tools to implement secure computer systems. This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a...
Wiley, 2013. — ISBN: 111816881X, 9781118168813 The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer...
4th edition. — Syngress, 2021. — 366 p. — ISBN 9780128015797. Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard...
5th Edition. — CRC Press, 2022-12-22. — 314 p. — ISBN-13: 978-0367570026. The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources. If you accept, process, transmit, or store payment card data branded by Visa, MasterCard, American Express, Discover, or JCB (or their affiliates...
CRC Press, 2022. — 223 p. — ISBN 978-0-367-55465-1. This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the...
Packt Publishing, 2018. — 436 p. — ISBN: 178883884X. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and...
Packt Publishing, 2018. — 436 p. — ISBN: 178883884X. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and...
Packt Publishing, 2018. — 436 p. — ISBN: 178883884X. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and...
Apress Media LLC., 2020. — 960 p. — ISBN13: 978-1-4842-6105-7. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it represents an...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Apress Media LLC., 2020. — 960 p. — ISBN13: (electronic): 978-1-4842-6106-4. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it...
Packt Publishing, 2021. — 242 p. — ISBN 978-1-80107-974-7. Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key Features Gain a clear understanding of the security landscape and research approaches to bypass antivirus software Become well-versed with practical techniques to bypass antivirus solutions Discover best practices to...
Packt Publishing, 2021. — 242 p. — ISBN 978-1-80107-974-7. Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key Features Gain a clear understanding of the security landscape and research approaches to bypass antivirus software Become well-versed with practical techniques to bypass antivirus solutions Discover best practices to...
Packt Publishing, 2021. — 242 p. — ISBN 978-1-80107-974-7. Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques Key Features Gain a clear understanding of the security landscape and research approaches to bypass antivirus software Become well-versed with practical techniques to bypass antivirus solutions Discover best practices to...
36 с.
Сферу применения Windows вообще надо ограничить использованием в быту и метлой гнать из корпоративных систем в силу безнадежной убогостью в плане безопасности и надежности. Оставить только как одну из систем для кухарок и прочих пользователей, для которых проблема надежности не столь критична.
Учебно-методическое пособие. — Бишкек: КРСУ, 2019. — 200 с. Описаны информационные процессы, происходящие в материальном мире, живой природе и человеческом обществе, которые изучают все научные дисциплины. Рассмотрена информация в различных отраслях, в том числе о государственных органах Кыргызской Республики и Российской Федерации. Также приведены примеры информации о нашем...
Учебно-методическое пособие. — Бишкек: КРСУ, 2019. — 102 с. В данном пособии рассмотрены информационные процессы, происходящие в материальном мире, живой природе и человеческом обществе, изучающиеся всеми научными дисциплинами. Рассмотрены информационные технологии в различных отраслях, в том числе современные информационные коммуникационные технологии Кыргызской Республики. Также...
Учебно-методическое пособие. — Бишкек: КРСУ, 2019. — 106 с. Изложены основные составляющие информационной безопасности, дополнена информация о понятии информации и информационной безопасности, о которой мы писали в первой части данного учебно-методического пособия, объекты ее защиты и программно-технические способы и средства обеспечения информационной безопасности, также раскрыты...
Учебно-методическое пособие для специалистов «Компьютерная безопасность». — М: РУТ (МИИТ). 2017. — 24 с. В учебно-методическом пособии излагаются методы и способы защиты информации и рассматриваются новые направления защиты, связанные со скрытыми каналами утечки информации. Материал, изложенный в учебно-методическом пособии, может использоваться в ходе курсового проектирования и...
Екатеринбург: Издательство Уральского университета 2014. — 181 c. — ISBN: 9785799612016
Андрончик А., Коллеров А., Синадский Н., Щербаков М.А.
Учебное пособие раскрывает вопросы практического применения методов и средств защиты информации в компьютерных сетях. В качестве платформы для построения защищенных сетей рассмотрены технологии и программно-аппаратные комплексы фирмы...
Конспект лекций. – 85 с. Специальность 090104 – Комплексная защита объектов информатизации Программные и аппаратные механизмы защиты. Хранение аутентифицирующей информации в открытых компьютерных системах. Типовые схемы хранения ключевой информации. Защита БД аутентификации. Протоколы стойкой удаленной аутентификации пользователей. Протокол CHAP, S/KEY. Удаленная аутентификация...
Саров: Российский федеральный ядерный центр – ВНИИЭФ, 2015. — 224 с. Курс Президентской программы «Методы и средства обеспечения программно-аппаратной защиты информации» на базе СарФТИ НИЯУ МИФИ позволяет оценить современное состояние дел в области защиты данных и получить практические навыки реализуемого информационно-технического обеспечения. Обобщены самые последние...
Учебное пособие. Минск: БГУ, 2008. – 188 с.
В пособии рассматриваются методы, алгоритмы и технические средства защиты информации и анализируются основные направления их развития.
Предназначено для студентов факультета радиофизики и электроники
Содержание
Введение
Обеспечение информационной безопасности компьютерных систем
Критерии оценки информационной безопасности
Общие...
М.: Metrotek, 2015. — 23 с. Содержание: Технические решения компании Метротек Производство. Технологии. Инновации.. Краткая информация Метротек. История побед и инноваций. Производственный цикл. Лаборатория – место разработки, тестирования и соединения с мировым опытом. Программа перспективного развития Метротек. Целевые программы развития.
Юбилейный: Trend Micro, 2015. — 21 с.
Форум «Информационная безопасность банков»
Содержание:
Самая большая проблема – это осознать проблему
Есть средства защиты
Есть средства защиты, но нет защищенности
Как обнаружить неизвестные угрозы
Продвинутый сетевой анализ
Динамический анализ угроз
Индикаторы компрометации (IoC)
Корреляция с глобальной базой угроз
Методическое пособие к курсовому проектированию по курсу «Компьютерные сети» для студентов специальностей «Сети телекоммуникаций», «Защита информации в телекоммуникациях» всех форм обучения. — Минск: БГУИР, 2007. — 32 с. Методическое пособие содержит краткие теоретические сведения по проектированию компьютерных и телекоммуникационных сетей, требования к оформлению курсового...
Учебно-методическое пособие. – Минск: Белорусский государственный университет информатики и радиоэлектроники, 2018. – 58 с. — ISBN: 978-985-543-368-3. Cодержит сведения об особенностях организации и автоматизации банковской деятельности, принципах функционирования систем дистанционного банковского обслуживания и электронных платежных систем, а также методах и средствах...
Сборник заданий к курсовому проектированию для студ. спец. 1-38 02 03 «Техническое обеспечение безопасности» всех форм обуч. — Минск : БГУИР, 2008. — 74 с. : ил. Представлены варианты заданий к курсовому проектированию по дисциплине «Физические и аппаратные средства защиты информации и их проектирование». Сборник состоит из шести разделов: принципиальные схемы устройств для...
Москва: Эшелон, 2014. — 23 с. Вареница Виталий Содержание: Что есть? Что должны искать? Что предписывает РД Что ищут за пределами РФ Классификация уязвимостей ПО Подходы к выявлению уязвимостей ПО Десятка OWASP Анализатор кода вычислительных систем (AK-ВС)
Учебное пособие. Владивосток: ДВГТУ, 2007. — 318 с. В учебном пособии последовательно излагаются основные понятия аппаратнопрограммных средств защиты информации. Рассматриваются основные понятия программно-аппаратной защиты информации, идентификация пользователей КС-субъектов доступа к данным, средства и методы ограничения доступа к файлам, аппаратно-программные средства...
М.: Элвис-Плюс, 2015. — 35 с. Содержание: Проблема импортозамещения в ИТ-сфере Прикладное ПО Угрозы инфраструктуре Масштабная поддержка импортозамещения ИТ-технологий для снижения экономических рисков имеет больше ограничений, чем мотивирующих факторов Утечки госсекретов РИСК 100% импортозамещение Борьба с санкциями Пути нейтрализации источников угроз
Учеб. пособие. М.: РУДН, 2008. – 261 с.
Рассматривается теория и практика защиты интеллектуальной собственности в предпринимательской деятельности. Изучаются охрана авторского права законами государства, все элементы системы безопасности предприятия с целью выработки концепции системы безопасности и определения правового статуса службы безопасности предприятия. Раскрываются...
Москва: Альпина Паблишер, 2016. — 694 c. — (Библиoтeкa Цeнтрa иccлeдoвaний плaтeжных cиcтeм и рacчeтoв). — ISBN: 978-5-9614-5646-2, 978-5-9614-1233-8. Книга даeт читатeлю систeматизированное прeдставление о соврeменных микропроцессорных картах, используемых в банковском деле. Она может служить путеводителем по объемным книгам, содержащим описание стандарта EMV, и спецификациям...
Учебное пособие в 3-х частях. — Тамбов: Тамбовский государственный технический университет, 2022. — 80 с. — ISBN 978-5-8265-2467-1. Посвящено вопросам построения и функционирования программно-аппаратных средств защиты информации в автоматизированных системах, являющихся основой комплексной системы информационной безопасности организации. Включает в себя полный теоретический...
Учебное пособие в 3-х частях. — Тамбов: Тамбовский государственный технический университет, 2023. — 78 с. — ISBN 978-5-8265-2609-5. Посвящено вопросам построения и функционирования программно-аппаратных средств защиты информации в автоматизированных системах, являющихся основой комплексной системы информационной безопасности организации. Включает в себя полный теоретический...
Учебное пособие. — Тамбов: ТГТУ, 2017. — 192 с. — ISBN: 978-5-8265-1737-6. Наряду с научно-практическими мероприятиями по защите современного программного обеспечения рассматриваются организационно-технические, нормативно-правовые аспекты программных и аппаратных средств защиты информации, в том числе процесс сертификации программных комплексов по требованиям безопасности...
Конспект лекций. — Екатеринбург: Уральский государственный университет путей сообщения, 2019. — 87 с. Конспект лекций содержит теоретический материал по всем темам дисциплины и список рекомендуемых источников. Конспект лекций предназначен для студентов направления подготовки «Информационные системы и технологии». Введение. Роль человеческого фактора в обеспечении защиты...
20 с.
(Выходные данные не указаны).
Учебное пособие по дисциплине «Средства защиты информации».
Содержание:
Компьютерный вирус.
Загрузочные.
Файловые.
Макровирусы.
Сетевые.
Полиморфики.
Резидентные.
Stealth.
Террористы.
Трояны (Троянские кони).
Боты.
Последние вирусные явления.
Программы для создания вирусов.
Как бороться с вирусами.
Сканеры.
Проактивные...
М.: Эком, 2003. — 688 с. — ISBN: 5-9570-0014-0
В книге описываются некоторые методы взлома систем и принципы защиты от взломов.
Рассматриваются: средства обеспечения безопасности и анализа системы; средства для атак и исследования систем в сети; средства системного и сетевого аудита, а также средства, используемые в судебной практике и при расследовании инцидентов, связанных с...
М.: Эком, 2003. — 688 с. — ISBN: 5-9570-0014-0
В книге описываются некоторые методы взлома систем и принципы защиты от взломов.
Рассматриваются: средства обеспечения безопасности и анализа системы; средства для атак и исследования систем в сети; средства системного и сетевого аудита, а также средства, используемые в судебной практике и при расследовании инцидентов, связанных с...
М.: Эком, 2003. — 688 с. — ISBN: 5-9570-0014-0
В книге описываются некоторые методы взлома систем и принципы защиты от взломов.
Рассматриваются: средства обеспечения безопасности и анализа системы; средства для атак и исследования систем в сети; средства системного и сетевого аудита, а также средства, используемые в судебной практике и при расследовании инцидентов, связанных с...
2-е изд. — М.: НОУ "Интуит", 2016. — 914 с. В курсе рассматриваются: средства обеспечения безопасности и анализа системы; средства для атак и исследования систем в сети; средства системного и сетевого аудита, а также средства, используемые в судебной практике и при расследовании инцидентов, связанных со взломом компьютерных систем. Для профессионалов в области IT-технологий. Об...
Екатеринбург: УГТУ-УПИ, 2008. — 182 с. — ISBN 5-321-00859-0. Учебное пособие посвящено вопросам практического применения методов и средств защиты информации на примере имеющихся на российском рынке специализированных программно-аппаратных систем. Пособие состоит из трех глав. В первой главе описываются требования к защите конфиденциальной информации и соответствующие им методы....
Екатеринбург: УрГУ, 2008. — 240 с.
Учебное пособие посвящено вопросам практического применения методов и средств защиты информации на примере имеющихся на российском рынке специализированных программно-аппаратных систем. Пособие состоит из четырех глав. В первой главе описываются требования к защите конфиденциальной информации и соответствующие им методы. Вторая и третья главы...
Учебное пособие.— Москва: Горячая линия - Телеком, 2019. — 412 с. — ISBN: 978-5-9912-0797-3. Книга содержит необходимые сведения для получения практических навыков по применению программно-аппаратных средств обеспечения информационной безопасности и состоит из 11 практических занятий и 9 лабораторных работ. Практические занятия посвящены аудиту информационной безопасности,...
Учебное пособие. — Москва: Горячая линия - Телеком, 2019. — 412 с. — ISBN: 978-5-9912-0797-3. Книга содержит необходимые сведения для получения практических навыков по применению программно-аппаратных средств обеспечения информационной безопасности и состоит из 11 практических занятий и 9 лабораторных работ. Практические занятия посвящены аудиту информационной безопасности,...
2-е изд. — М.: Интуит, 2016. — 74 c. Курс является логическим продолжением годичного курса «Системное администрирование + Топология сети» и посвящен проектированию безопасности крупных и очень крупных сетей на базе Windows Server 2003 и ISA Server 2004. В рамках курса обсуждаются возможности проектирования центров сертификации, стратегии аутентификации, проектирование защиты...
Ростов-на-Дону: Ростовский государственный экономический университет ''РИНХ'', 2012. — 60 с. Курс является логическим продолжением годичного курса ''Системное администрирование + Топология сети'' и посвящен проектированию безопасности крупных и очень крупных сетей на базе Windows Server 2003 и ISA Server 2004. Данные материалы входят в состав ''Библиотеки учебных курсов'',...
Учебное пособие. — М.: Машиностроение-1, 2001. — 126 с. —ISBN: 5-94275-049-8 В пособии изложены основные принципы организации защиты в компьютерных системах обработки конфиденциальной информации, приведено описание конкретных аппаратно-программных систем защиты информации.
Учебное пособие. — 2-е изд, испр. и доп. — М.: Машиностроение-1, 2006. — 260 c. — ISBN: 5-94275-345-7 В пособии изложены основные принципы организации защиты в компьютерных системах обработки конфиденциальной информации, приведено описание конкретных аппаратно-программных систем защиты информации. Введение Методы обеспечения информационной безопасности компьютерных систем...
Учебное пособие. – Томск: Изд-во Томск. гос. ун-та систем управления и радиоэлектроники, 2005. – 382 с. Технические каналы утечки информации Технические каналы утечки речевой информации Технические каналы утечки информации, обрабатываемой ТСПИ и передаваемой по каналам связи Способы скрытого видеонаблюдения и съемки Демаскирующие признаки объектов и акустических закладок...
Учеб. пособие. – М.: Горячая линия-Телеком,
2007. –616 с: ил
Рассмотрены технические средства и методы защиты информации от несанкционированного доступа. Описаны возможные технические каналы утечки информации. Основное внимание уделено рассмотрению принципов работы технических средств защиты информации. Отличительной особенностью книги является наличие лабораторных и...
Пермь: Изд-во Перм. нац. исслед. политехн. ун-та, 2023 — 91 с. Изложены основные теоретические сведения по дисциплине «Управление информационной безопасностью». Приведены вопросы для контроля знаний по тематическим разделам дисциплины. Предназначено для студентов, обучающихся по направлениям 10.03.01 «Информационная безопасность», 10.04.01 «Информационная безопасность» и...
2-е изд. — СПб.: БХВ-Петербург, 2021. — 288 с.: ил. — ISBN 978-5-9775-6681-0. Книга представляет собой подробное пошаговое руководство по восстановлению поврежденных данных на жестких дисках, съемных носителях и твердотельных накопителях. Подробно рассмотрена структура популярных файловых систем: NTFS, ext3/ext4, UDF/UFS/FFS и др. Описаны автоматические методы восстановления...
2-е изд. — СПб.: БХВ-Петербург, 2021. — 288 с.: ил. — ISBN 978-5-9775-6681-0. Книга представляет собой подробное пошаговое руководство по восстановлению поврежденных данных на жестких дисках, съемных носителях и твердотельных накопителях. Подробно рассмотрена структура популярных файловых систем: NTFS, ext3/ext4, UDF/UFS/FFS и др. Описаны автоматические методы восстановления...
СПб.: БХВ - Петербург, 2021. — 290 с. Книга представляет собой подробное пошаговое руководство по восстановлению поврежденных данных на жестких дисках, съемных носителях и твердотельных накопителях. Подробно рассмотрена структура популярных файловых систем: NTFS, ext3/ext4, UDF/UFS/FFS и др. Описаны автоматические методы восстановления данных для операционных систем Windows и...
Книга представляет собой пошаговое руководство по восстановлению поврежденных данных на жестких и оптических дисках. Подробно рассмотрена структура популярных файловых систем: NTFS, ext2/ext3, UFS/FFS и др. Описаны автоматические методы восстановления данных для операционных систем Windows и Linux. Приведены способы ручного восстановления, используемые в случае, когда...
СПб.: БХВ - Петербург, 2006 352с. ISBN: 5-94157-455-X Книга представляет собой пошаговое руководство по восстановлению поврежденных данных на жестких и оптических дисках. Подробно рассмотрена структура популярных файловых систем: NTFS, ext2/ext3, UFS/FFS и др. Описаны автоматические методы восстановления данных для операционных систем Windows и Linux. Приведены способы ручного...
Год издания: 2007.
Издательство: БХВ-Петербург.
ISBN: 978-5-94157-455-1, 0-931769-56-7.
Страниц: 352.
Книга представляет собой пошаговое руководство по восстановлению поврежденных данных на жестких и оптических дисках. Подробно рассмотрена структура популярных файловых систем: NTFS, ext2/ext3, UFS/FFS и др. Описаны автоматические методы восстановления данных для операционных...
(Выходные данные не указаны). (В файле 28 с.). Практически всем администраторам приходилось сталкивались с теми или иными сбоями ОС и ее окружения, но далеко не все могли быстро найти источник их возникновения (особенно, если сбой происходит нерегулярно и на чужой машине). Тем не менее, существует несколько вполне универсальных стратегий поиска дефектных компонентов,...
(Выходные данные не указаны). (В файле 8 с.). Лучший способ сохранить информацию - разделить ее с миром (в смысле поделиться с друзьями). Это общеизвестный факт! Давайте попробуем автоматизировать процесс дележа, чтобы компьютер самостоятельно "рассеивал" данные по локальной сети. О проблемах и безопасности информации в условиях общего доступа.
Internet: Лаборатория Касперского. — 2010 г. — 289 с.
Руководство пользователя Kaspersky Internet Security 2011 — поможет Вам установить, настроить и успешно работать с программой Kaspersky Internet Security 2011. Как известно Kaspersky Internet Security 2011 — это оптимальное решение для безопасной работы в интернете. Продукт обеспечивает постоянную защиту от современных...
Издательство: Интернет
Год: 2011
"Ваш компьютер заблокирован. Для снятия блокировки Вам необходимо оплатить штраф в размере 400 рублей. " Редкий пользователь в просторах Интернета не знаком с этой горькой фразой. Баннеры - вымогатели с завидной настойчивостью требуют с нас деньги, надеясь на нашу неопытность, а шансы получить заветный код после оплаты всегда практически равны...
Учебное пособие. — Тамбов: Тамбовский государственный технический университет (ТГТУ), 2022. — 96 с. — ISBN 978-5-8265-2460-2. Изложены вопросы современных проблем повышения надёжности промышленных автоматизированных систем управления (ПАСУ) за счёт обеспечения информационной безопасности. Главное внимание уделено оказанию практической помощи студентам в освоении новых методов...
Юбилейный: БИФИТ, 2015. — 18 с.
Форум Информационная безопасность банков
Содержание:
Практика компании БИФИТ
Результат аудита
Антифрод – еще одна ступень защиты
Монография . – М: Институт системного программирования РАН, 2013. — 207 с. — ISBN: 978-5-4475-3841-5
Рассмотрены основные факторы, определяющие надежность и безопасность функционирования программных комплексов реального времени, характеристики систем и среды, для которых должна обеспечиваться функциональная безопасность программных продуктов реального времени и необходимые...
Монография. — Саратов: Вузовское образование, 2015. — 207 с. Рассмотрены основные факторы, определяющие надежность и безопасность функционирования программных комплексов реального времени, характеристики систем и среды, для которых должна обеспечиваться функциональная безопасность программных продуктов реального времени и необходимые ресурсы. Представлены требования к...
Монография. — Саратов: Вузовское образование, 2015. — 207 с. Рассмотрены основные факторы, определяющие надежность и безопасность функционирования программных комплексов реального времени, характеристики систем и среды, для которых должна обеспечиваться функциональная безопасность программных продуктов реального времени и необходимые ресурсы. Представлены требования к...
М.: Cisco, 2015. -17 с. Краткий анализ представленных на российском рынке средств защиты информации. Содержание: Цель экспресс-анализа – составить картину возможных альтернатив при условии взятия РФ жесткого курса на полное импортозамещение. Основная таксономия рынка ИБ. Какие отечественные альтернативы мы имеем. Перекрывающиеся сегменты рынка ИБ. 3 сценария действий в кризис....
Юбилейный: ФСТЭК России, 2015. — 16 с.
VII Уральский форум «Информационная безопасность банков»
ФСТЭК России, Лютиков Виталий Сергеевич
Содержание:
Уязвимости ПО
Актуальность: Распределение дефектов безопасности
Основные причины наличия уязвимостей
Этапы выявления уязвимостей
Меры, применяемые ФСТЭК
М.: Бином. Лаборатория знаний. 2004 г. 536 стр. Обсуждаются средства и методы, которые применяются любителями и профессионалами в сфере компьютерного шпионажа, а также контрмеры, предназначенные для борьбы с ними. Приводятся общие концепции и технологии, пригодные для использования на любых компьютерных системах, поэтому пользователи Windows, Linux, OpenBSD и MacOS найдут книгу...
М.: Digital Security, 2014. — 13 с.
Презентация с Инфосекьюрити 2014 .
Содержание:
Зависимость: корнями в 90-е
Мифы безопасности OpenSource
Российское – значит безопасное
Контроль нам только снится
Решение – национальная программа исследований: создание на базе ФСТЭК центров компетенций по анализу ключевых элементов ИТ-технологий
Учебно-методическое пособие. — Москва: МГТУ им. Н.Э.Баумана, 2009. — 656 с.
Описание: Рассматриваются основные виды технических разведок. Содержатся сведения, связанные с историей, возникновением, развитием и совершенствованием данных видов разведки и использованых в них систем и средств. Информация дается применительно к конкретным образцам и типам, используемым вооруженными...
Учебно-методическое пособие. — Москва: МГТУ им. Н.Э .Баумана, 2009. — 656 с. ISBN: 978-5-7038-3244-8
Описание: Рассматриваются основные виды технических разведок. Содержатся сведения, связанные с историей, возникновением, развитием и совершенствованием данных видов разведки и использованных в них систем и средств. Информация дается применительно к конкретным образцам и типам,...
М.: Фойлис, 2011. — 192 с. — ISBN: 978-5-91860-010-8. Книга посвящена вопросам обеспечения безопасности мобильных устройств. В книге рассматривается более 40 вариантов вредоносных действий, с помощью которых злоумышленники похищают конфиденциальные данные, незаконно снимают денежные средства или прослушивают телефонные разговоры. О большинстве рассматриваемых уязвимостей ранее не...
Юбилейный: Банк Москвы, 2015. — 21 с.
Форум Информационная безопасность банков
Содержание:
Вместо вступления
Источники угроз Интернет-банкинга
Распределение угроз Интернет-банкинга
Типовые механизмы защиты в СДБО
Разработка стратегии безопасности СДБО
Определение Политики безопасности
Организационные мероприятия
Технические мероприятия
Кадыков Иван-менеджер по продукту ПАК «Соболь» 3.0, "Код безопасности", Москва-2010г.
Что такое ПАК «Соболь»?
Возможности ПАК «Соболь»
Достоинства ПАК «Соболь»
Учебное пособие. — Екатеринбург: Уральский федеральный университет им. первого Президента России Б.Н. Ельцина (УрФУ), 2020. — 120 с. — ISBN: 978-5-7996-3088-1. Материалы пособия направлены на развитие компетенций, полученных студентами при изучении дисциплины базы данных в части использования средств управления данными при разработке ERP- и MES-систем. В пособии подробно...
Учебник для студ. учреждений высш. проф. образования. — М.: Академия, 2013. — 336 с. — (Сер. Бакалавриат). — ISBN: 978-5-7695-9327-7. Учебник создан в соответствии с Федеральным государственным образовательным стандартом по направлению подготовки 090900 «Информационная безопасность» («квалификация «бакалавр»). Показано обеспечение безопасности межсетевого взаимодействия....
Академия, 2013. – 336 с. – ISBN: 576959327Xб 9785769593277
Учебник создан в соответствии с Федеральным государственным образовательным стандартом по направлению подготовки 090900 "Информационная безопасность" ("квалификация "бакалавр"). Показано обеспечение безопасности межсетевого взаимодействия. Рассмотрены основные виды вредоносных программ, удаленные сетевые атаки и...
М.: Академия, 2006. — 240 с. — ISBN: 5-7695-2706-4 Рассмотрены удаленные сетевые атаки и организация защиты от них. Изложены методы описания атак, их классификация и основные тенденции развития. Описаны основные технологии межсетевых экранов, вопросы их оценки и тестирования. Проанализированы методы построения систем обнаружения вторжений, их разновидности и перспективы....
М.: Академия, 2006. — 240 с. В книге рассматриваются удаленные сетевые атаки и способы защиты от них. Описываются технологии межсетевых экранов (aka firewall), методы построения систем обнаружения вторжений. Рассматриваются проблемы защиты при организации удаленного доступа, принципы построения и функционирования VPN сетей, а также основные отечественные средства для их...
М.: Академия, 2006. — 240 с.
В книге рассматриваются удаленные сетевые атаки и способы защиты от них. Описываются технологии межсетевых экранов (aka firewall), методы построения систем обнаружения вторжений. Рассматриваются проблемы защиты при организации удаленного доступа, принципы построения и функционирования VPN сетей, а также основные отечественные средства для их...
М.: Софт-пресс, 2011. - 24 Мобильные компьютеры и телефоны - лакомый кусок как для охотников за конфиденциальной информацией, так и для простых сумочников и карманников. Впрочем, существует немало простых, но достаточно эффективных способов предотвратить пропажу ценной техники и хранящейся на ней информации. Содержание: Данные под замком RAR? JPEG! И другие маленькие хитрости...
МФПА, Москва - 2011.
Аннотация (основные вопросы, излагаемые в декции):
Основные понятия программно-технического уровня информационной безопасности.
Требования к защите компьютерной информации.
Юбилейный: ФСБ России, 2015. — 17 с.
Форум «Информационная безопасность банков»
Содержание:
Цель
Основные задачи дорожной карты
Угрозы ИБ, связанные с применением импортных HSM
Принципы построения НСПК с использованием отечественных HSM
Этапы создания НСПК с использованием отечественного оборудования
Схема взаимодействия НСПК и МПС через HSM
М.: Яхтсмен, 1993. — 188 с. Книга посвящена организации компьютерной безопасности исключительно программными методами. Представлены математические модели, на базе которых можно осуществлять расчеты надежности защитных механизмов. Предложен новый, перспективный подход к защите данных на базе экспертных и самообучающихся систем, намечена тенденция развития программно-аппаратных...
Ширманов А.Е., "Код безопасности" - 2010г.
Использование аппаратных средств доверенной загрузки при защите информационных систем персональных данных по требованиям ФСТЭК.
Защита от программно-математических воздействий по требованиям ФСТЭК.
Защита сетевых приложений и сервисов, обрабатывающих информацию ограниченного доступа.
Защита виртуальной инфраструктуры.
Учебно-методическое пособие. – СПб: Университет ИТМО, 2020. – 37 с. Учебно-методическое пособие содержит теоретический и практический материал по существующим методам идентификации программного обеспечения, установленного на электронные носители информации. Рассматривается необходимость проведения аудиторских мероприятий по выявлению несанкционированно установленного...
Воронеж: ВГУИТ, 2015. — 139 с. Учебное пособие подготовлено в соответствии с требованиями ФГОС ВО подготовки выпускников по направлению 10.05.03 – «Информационная безопасность автоматизированных систем». Предназначено для закрепления теоретических знаний дисциплины «Безопасность систем баз данных» цикла С3 «Профессиональный цикл».
Солнечногорск: КРИПТО-ПРО, 2015. — 11 с.
Научно-практическая конференция «РусКрипто’2015»
Содержание:
Криптография в браузере для облачных сервисов
Функции криптографического плагина
Целевая
Защитная
Что работает не так
Как это исправить
М.: Гелиос АРВ, 2004. — 224 с, ил. ISBN 5-85438-084-6 На основе системного подхода рассмотрен комплекс вопросов, связанных с обеспечением информационной безопасности: стадии жизненного цикла источника информации и его связь с компонентами окружающей среды, физические основы технических средств обеспечения информационной безопасности и их связь с созданием технических каналов...
Учебное пособие. — Санкт-Петербург : СЗТУ, 2005. — 178 с. Управление безопасностью вычислительных систем охватывает широкий круг вопросов, в число которых входит: обеспечение целостности, конфиденциальности и аутентичности информации; разграничение прав пользователей по доступу к ресурсам автоматизированной системы; защита автоматизированной системы и ее элементов от...
2-е изд. — М.: Интуит, 2016. — 565 с. Программное обеспечение с открытыми исходными текстами составляет неотъемлемую часть Интернет, так что можно смело утверждать, что Интернет в своем нынешнем виде не существовал бы без него. Хотя программы с открытыми исходными текстами охватывают почти все области программного обеспечения - эта книга ориентирована в первую очередь на...
Юбилейный: УЦСБ-ARBOR, 2015. — 30 с.
Форум Информационная безопасность банков
Содержание:
DDoS: статистика и основные тенденции
Защита. Исторически и сегодня
Решения Arbor Networks
Операторы связи. Ростелеком
Солнечногорск: НИИ СОКБ, 2015. — 47 с.
Научно-практическая конференция «РусКрипто’2015»
Содержание:
SafeTechnologies Защищенная мобильная платформа
Задача защиты бумажных документов
Угрозы утечки документов
Возможные пути утечки
Сравнение копий путем наложения оригинала на экземпляры
Скрытая маркировка в системе SafeCopy
Параметры скрытой маркировки в системе SafeCopy...
Юбилейный: Symantec, 2015. — 14 с.
Форум «Информационная безопасность банков»
Содержание:
Результаты разбора инцидентов
Без пересмотра подхода к ИБ нельзя
Волны АТР-решений
Защита от направленных атак на конечных точках
Механизмы защиты от направленных атак, работающие на уровне рабочих станций
Обнаружение подозрительных ситуаций
Юбилейный: Связной Банк, 2015. — 15 с.
Форум Информационная безопасность банков
Содержание:
Собственная система ДБО
Актуальные проблемы в ДБО
Подходы к аутентификации
Требования к антифрод системе
Проблема выбора
Основные этапы создания собственной антифрод системы
М.: ЭДЭЛЬ,1992. — 80 с. О том, как защититься от нежелательного копирования и изучить принципы создания собственных систем защиты вы сможете благодаря книге "Защита от копирования". В брошюре рассматриваются наиболее распространенные методы защиты программ для ПЭВМ типа IBM PC/XT/AT от несанкционированного копирования. Информация о приведенных методах защиты была собрана в...
М.: ЭДЭЛЬ,1992. — 80 с. В данной брошюре рассматриваются наиболее распространенные методы защиты программ для ПЭВМ типа IBM PC/XT/AT от несанкционированного копирования. Информация о приведенных методах защиты была собрана в результате анализа существующих средств защиты типа Shield, Convoy, Nota и т. д. Кроме того, были использованы результаты экспериментов, проведенных...
М.: ДМК Пресс, 2021. — 460 с. Современные вредоносные программы все сильнее обфусцированы и стремятся обмануть аналитиков. Поэтому нам нужны более изощренные методы, способные развеять эту завесу тьмы, – и в этом может помочь двоичный анализ, цель которого – установить истинные свойства двоичных программ и понять, что они делают в действительности. В книге рассматриваются...
Юбилейный: УЦСБ-Check Point , 2015. — 23 с.
Форум Информационная безопасность банков
Содержание:
Угрозы в мобильном мире
4 факта о защищенности мобильных устройств
Check Point Capsule
Интеграция с корпоративным Check Point
Комментарии