Зарегистрироваться
Восстановить пароль
FAQ по входу

Информационная безопасность

Учебные курсы

Учебно-методические материалы

2025.04
Sybex, 2025. — 496 p. The ideal prep guide for earning your CCST Cybersecurity certification. CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach,...
  • №1
  • 19,58 МБ
  • добавлен
  • описание отредактировано
Springer, 2025. — 328 p. — ISBN 978-981-96-0554-5. Образование и обучение кибербезопасности This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The...
  • №2
  • 4,03 МБ
  • добавлен
  • описание отредактировано
2025.02
CRC Press, 2025. — 284 р. — (Security, Audit and Leadership Series). — ISBN: 978-1-003-39069-5. In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain–computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come...
  • №3
  • 16,84 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 416 p. — ISBN: 978-1394171705. Unlock the power of secure coding with this straightforward and approachable guide! Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples,...
  • №4
  • 5,83 МБ
  • добавлен
  • описание отредактировано
2025.01
Apress Media LLC, 2025. — 548 p. — ISBN-13: 979-8-8688-1029-9. Обеспечение безопасности предприятия: максимальное использование цифровых технологий за счет усиления мер безопасности Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing....
  • №5
  • 6,69 МБ
  • добавлен
  • описание отредактировано
2024.12
Apress Media LLC, 2025. — 518 p. — ISBN-13: 979-8-8688-0432-8. Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your...
  • №6
  • 503,68 КБ
  • добавлен
  • описание отредактировано
No Starch Press, 2025. — 376 p. — ISBN-13: 978-1-7185-0379-3. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these...
  • №7
  • 3,36 МБ
  • добавлен
  • описание отредактировано
Sybex, John Wiley & Sons, Inc., 2025. — 352 p. — ISBN: 978-1-394-28491-7. Полное руководство по подготовке к экзамену CIPP / US Your ultimate guide to preparing for the CIPP/US exam. Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP...
  • №8
  • 4,60 МБ
  • добавлен
  • описание отредактировано
Edited By Mounia Zaydi, Youness Khourdifi, Bouchaib Nassereddine, Justin Zhang. — CRC Press, 2025. — 242 p. — ISBN: 978-1-003-47867-6. In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a...
  • №9
  • 4,31 МБ
  • добавлен
  • описание отредактировано
Apress, 2024. — 262 p. — ISBN-13 979-8-8688-0850-0. CyberDynamx: искусство и наука создания упрощенной программы цифровой безопасности This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical...
  • №10
  • 2,23 МБ
  • добавлен
  • описание отредактировано
2024.11
Пер. с англ.: Экслер Алекс. ― М.: Et Cetera Publishing, 2004. ― 160 с. ― (Mенеджeр Mафии. Pуковoдcтва для Бoльшиx Босcoв). ― ISBN 5-94983-030-Х. Увы, друг мой, защита твоей информации – или хотя бы четкое понимание того, что это такое и как подобная защита должна строиться – это Твое Личное Дело! Не Cosa Nostra (хотя твои проблемы могут стать и Нашим Делом тоже), а Cosa Roba –...
  • №11
  • 230,98 КБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 559 p. — ISBN-13: 979-8-8688-0799-2. Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to...
  • №12
  • 2,00 МБ
  • добавлен
  • описание отредактировано
2024.10
Apress Media LLC., 2024. — 179 p. — ISBN-13: 979-8-8688-0870-8. In today’s digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all...
  • №13
  • 394,69 КБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 p. — ISBN 9781032863641. ManusCrypt: Разработано для человечества – антропоцентрическа я информационная безопасность Information security primarily serves these six distinct purposes—authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon...
  • №14
  • 2,83 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 384 p. — ISBN-13: 979-8-8688-0838-8. This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud,...
  • №15
  • 4,46 МБ
  • добавлен
  • описание отредактировано
2024.09
Apress, 2024. — 585 p. — ISBN-13 979-8-8688-0505-9. This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations...
  • №16
  • 1,29 МБ
  • добавлен
  • описание отредактировано
2024.08
Packt Publishing, 2024. — 252 p. Key Features: Create automated CI/CD pipelines for testing and implementing threat detection use cases Apply implementation strategies to optimize the adoption of automated work streams Use a variety of enterprise-grade tools and APIs to bolster your detection program Book Description: Today's global enterprise security programs grapple with...
  • №17
  • 11,52 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 213 p. — ISBN-13: 979-8-8688-0461-8. This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it...
  • №18
  • 441,72 КБ
  • добавлен
  • описание отредактировано
2024.07
CRC Press, 2024. — 310 p. — ISBN-13: 978-0815382386. Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and...
  • №19
  • 23,36 МБ
  • добавлен
  • описание отредактировано
Springer, 2024. — 102 p. — ISBN 978-3031637803, 3031637801, ASIN B0D64WTYW5. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to...
  • №20
  • 3,79 МБ
  • добавлен
  • описание отредактировано
2024.06
2nd Edition. — O’Reilly Media, Inc., 2024. — 417 p. — ISBN 978-1-098-12724-4. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook...
  • №21
  • 8,01 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Apress Media LLC., 2024. — 289 p. — ISBN: 979-8-8688-0345-1. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your...
  • №22
  • 19,04 МБ
  • добавлен
  • описание отредактировано
2024.05
IGI Global, 2024. — 319 p. — ISBN 9798369314319. Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their...
  • №23
  • 19,95 МБ
  • добавлен
  • описание отредактировано
М.: Эксмо, 2023. — 439 с. Перед вами руководство по поиску и измерению рисков в кибербезопасности вашей компании. Устаревшим практикам оценки сетевых угроз автор противопоставляет методы, в основе которых лежат математические вычисления и специальные метрики. С помощью набора инструментов, описанных в его книге, вы сможете не только защититься от возможных угроз, но и...
  • №24
  • 3,07 МБ
  • добавлен
  • описание отредактировано
2024.04
IT Governance Publishing, 2023. — 88 p. — ISBN: 9781787784369 Understand how your organisation can implement Cyber Essentials and Cyber Essentials Plus with this guide!
  • №25
  • 405,44 КБ
  • добавлен
  • описание отредактировано
De Gruyter Oldenbourg, 2019. — 317 p. — ISBN-13: 978-3110668261. This book outlines key concepts and guidelines for ensuring information security awareness, addressing in detail governance, compliance, and learning processes. From choosing media to integrating new hires, the book provides a comprehensive range of configuration options for raising security awareness. It can...
  • №26
  • 4,62 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2024. — 337 p. — ISBN 9781633438224. Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine Learning teaches you how to apply cutting...
  • №27
  • 40,45 МБ
  • добавлен
  • описание отредактировано
Apress, 2023. — 253 p. — ISBN 979-8-8688-0255-3. Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure...
  • №28
  • 2,40 МБ
  • добавлен
  • описание отредактировано
2024.03
Wiley, 2024. — 288 p. — ISBN: 9781394221202. Эффективное управление уязвимостями: управление рисками в уязвимой цифровой экосистеме. Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management. Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and...
  • №29
  • 13,09 МБ
  • добавлен
  • описание отредактировано
Cybellium Ltd, 2023-11-17. — 308 p. — ASIN: B0CNMZWJG4. Unlock Your Expertise in Incident Handling with the "GCIH Certification Guide" In today's ever-changing digital landscape, where cyber threats are constantly evolving, mastering the art of incident handling is critical. The GIAC Certified Incident Handler (GCIH) certification is your beacon of expertise in incident...
  • №30
  • 663,77 КБ
  • добавлен
  • описание отредактировано
Cybellium Ltd, 2023-11-16. — 405 p. — ASIN: B0CNKHDHMH. Elevate Your Cybersecurity Career with the "GSEC Certification Guide" In the realm of cybersecurity, knowledge is power, and the GIAC Security Essentials (GSEC) certification is the key to unlocking your potential as a cybersecurity expert. "GSEC Certification Guide" is your essential companion on the journey to mastering...
  • №31
  • 953,80 КБ
  • добавлен
  • описание отредактировано
Addison-Wesley Professional/Pearson Education, 2024. — 448 p. — (Final) — ISBN-13 978-0-13-807373-2. An all-encompassing guide to securing your database andapplications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified databaseadministrators and software professionals. Hackers are...
  • №32
  • 37,16 МБ
  • добавлен
  • описание отредактировано
2024.02
John Wiley & Sons, 2024. — 400 р. — ISBN 13: 978-1394222544. It is commonly understood that social engineering is one of the biggest challenges modern society faces. Highly orchestrated social engineering campaigns target corporate workers with credential harvesting attacks, wire fraud, and business opportunity scams. It even plagues our personal lives, from calls about your...
  • №33
  • 5,56 МБ
  • добавлен
  • описание отредактировано
O’Reilly Media, Inc., 2024. — 200 р. — ISBN-13: 978-1-098-13370-2. Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as...
  • №34
  • 5,68 МБ
  • добавлен
  • описание отредактировано
No publisher, 2023. — 107 p. Welcome to ISO 27001 Foundation Practice Tests! This comprehensive e-book contains 150 multiple-choice practice questions designed to help you pass the ISO 27001 foundation exam. The ISO 27001 standard is an internationally recognized standard for information security management systems (ISMS). This exam tests your knowledge of the standard and its...
  • №35
  • 907,26 КБ
  • добавлен
  • описание отредактировано
No publisher, 2023. — 90 p. ISO 27001 Foundation - Study Guide is a comprehensive guide that provides an in-depth understanding of the ISO 27001 standard for information security management systems. This study guide is designed to help individuals pass the ISO 27001 foundation exam and gain a solid understanding of the standard's requirements and best practices. The guide...
  • №36
  • 874,43 КБ
  • добавлен
  • описание отредактировано
2024.01
Independently published, 2023. — 56 p. — ASIN: B0C1KVRH2K. Need experience to land that new job role as an SOC Analyst? Get that experience from the comfort of your home and ace that job interview using the experiences gained by simulating everyday real-life situations faced by an SOC Analyst. Welcome to “SOC Workflow and Procedures: Streamlining Security Operations for Optimal...
  • №37
  • 2,90 МБ
  • добавлен
  • описание отредактировано
Springer, 2022. — 105 p. This Springer book contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot...
  • №38
  • 4,24 МБ
  • добавлен
  • описание отредактировано
2023.12
М.: Издательские решения, 2018. — 249 с.: ил. — ISBN: 978-5-4493-0690-6. Книга рассказывает о семействе международных стандартов ISO/IEC 27k, определяющих требования и правила СУИБ (системы управления информационной безопасностью), порядок разработки СУИБ и алгоритмы управления рисками информационной безопасности и инцидентами информационной безопасности.
  • №39
  • 615,78 КБ
  • добавлен
  • описание отредактировано
No Starch Press, Inc., 2024. — 416 р. — ISBN 13: 978-1098168780. Welcome to the world of locksport, the sport of defeating locks. Whether you’re new to the challenge of lockpicking or aiming for championship gold, this book serves as your definitive guide, packed with practical advice from a team of experts. DIVE INTO THE ESSENTIALS WITH LOCKSPORT FOUNDATIONS How various locks...
  • №40
  • 46,32 МБ
  • добавлен
  • описание отредактировано
2023.10
No Starch Press, 2022. — 320 p. — ISBN-13: 978-1-7185-0195-9. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's...
  • №41
  • 10,51 МБ
  • добавлен
  • описание отредактировано
2023.09
Independently published, 2023. — 222 p. Кодовая книга OSINT: взлом стратегий разведки с открытым исходным кодом The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced...
  • №42
  • 1,77 МБ
  • добавлен
  • описание отредактировано
2023.08
Springer, 2023. — 352 p. — (Advanced Sciences and Technologies for Security Applications). — ISBN 978-3-031-33631-7. In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications...
  • №43
  • 58,12 МБ
  • добавлен
  • описание отредактировано
Wiley-IEEE Press, 2023. — 387 p. — ISBN 9781119875420. 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and...
  • №44
  • 20,58 МБ
  • добавлен
  • описание отредактировано
2023.07
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu. — Apress Media LLC, 2023. — 292 p. — ISBN-13: 978-1-4842-8297-7. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a...
  • №45
  • 39,09 МБ
  • добавлен
  • описание отредактировано
СПб.: Питер, 2021. — 336 с.: ил. — (Бестселлеры O’Reilly). — ISBN 978-5-4461-1786-4. Среди огромного количества информации по сетевой и ИТ-безопасности практически не найти книг по безопасности веб-приложений. Познакомьтесь на практике с разведкой, зашитой и нападением! Вы изучите методы эффективного исследования и анализа веб-приложений, даже тех. к которым нет прямого...
  • №46
  • 156,87 МБ
  • добавлен
  • описание отредактировано
6th Edition. — Addison-Wesley/Pearson, 2024. — 1417 р. The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing. Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core...
  • №47
  • 14,56 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2023. — 83 p. — (MEAP v2). Борьба с мошенничеством с помощью машинного обучения Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine...
  • №48
  • 2,82 МБ
  • добавлен
  • описание отредактировано
2023.06
Apress Media LLC, 2023. — 158 p. — ISBN-13: 978-1-4842-9361-4. Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with...
  • №49
  • 19,17 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — O’Reilly Media, Inc., 2023. — 480 p. — ISBN 978-1-098-12068-9. Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber-threat...
  • №50
  • 3,45 МБ
  • добавлен
  • описание отредактировано
IT Governance Publishing, 2022. — 206 p. — ISBN 978-1-78778-367-6. This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu’s The Art of War. So why is the reporting of cyber attacks so low? Why...
  • №51
  • 1,44 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2023. — 336 p. — ISBN: 978-1-394-15850-8. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll...
  • №52
  • 12,46 МБ
  • добавлен
  • описание отредактировано
2023.05
Sybex, 2023. — 208 p. — ISBN-13: 978-1-394-19655-5. Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud....
  • №53
  • 7,16 МБ
  • добавлен
  • описание отредактировано
Springer, 2023. — 144 p. — ISBN 978-3-031-24215-1. This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the...
  • №54
  • 1,51 МБ
  • добавлен
  • описание отредактировано
World Scientific Publishing, 2023. — 377 p. Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies are generating both privacy and security...
  • №55
  • 1,68 МБ
  • добавлен
  • описание отредактировано
2023.04
O’Reilly Media, Inc., 2023. — 500 p. — (ER). — ISBN 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
  • №56
  • 5,95 МБ
  • добавлен
  • описание отредактировано
Pegasus Books, 2022. — 626 р. — ISBN: 978-1-63936-256-1 A fresh exploration into the 'human nature versus technology’ argument, revealing an unexpected advantage that humans have over our future robot masters: we’re actually good at mathematics. There’s so much discussion about the threat posed by intelligent machines that it sometimes seems as though we should simply surrender...
  • №57
  • 1,62 МБ
  • добавлен
  • описание отредактировано
2023.03
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-11382-7. Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our...
  • №58
  • 8,29 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2022. — 384 p. — ISBN-13 978-1617298998. Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy...
  • №59
  • 9,41 МБ
  • добавлен
  • описание отредактировано
Springer, 2023. — 142 p. — (Digital Privacy and Security). — ISBN 978-981-19-8691-8. Безопасность и конфиденциальность в федеративном обучении In this book, the authors highlight the latest research findings on the security and privacy of Federated Learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference,...
  • №60
  • 11,46 МБ
  • добавлен
  • описание отредактировано
2023.02
2nd Edition. – bookboon.com, 2022. — 297 p. — ISBN 978-87-403-3948-2. Cyberspace touches practically everything and everyone when many everyday communications depend on information communication technologies. This new wave of connectivity is going beyond tablets and laptops; to connected cars and buildings; TVs and game consoles; and smart meters and traffic control. As we are...
  • №61
  • 8,48 МБ
  • добавлен
  • описание отредактировано
2023.01
Wiley, 2023. — 354 p. Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a...
  • №62
  • 1,38 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2022. — 269 p. — ISBN 9781668439937. Методы, реализация и применение разведки и аналитики кибербезопасности Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can...
  • №63
  • 18,51 МБ
  • добавлен
  • описание отредактировано
Wiley-IEEE Press, 2023. — 516 p. — ISBN 9781119892144. IoT для обороны и национальной безопасности Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest...
  • №64
  • 33,48 МБ
  • добавлен
  • описание отредактировано
2022.12
Springer, 2023. — 356 p. — ISBN 978-3-031-19184-8. This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to...
  • №65
  • 29,31 МБ
  • добавлен
  • описание отредактировано
2022.10
John Wiley & Sons, 2022. — 291 p. Make security a priority on your team. Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible...
  • №66
  • 2,00 МБ
  • добавлен
  • описание отредактировано
Second Edition. — O’Reilly Media, 2022. — 282 p. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
  • №67
  • 1,91 МБ
  • добавлен
  • описание отредактировано
2022.07
Manning Publications, 2022. — 384 p. — ISBN-13 9781617298998. Конфиденциальность данных: руководство для инженеров Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to Classify data based on privacy risk Build technical tools to catalog and discover data in...
  • №68
  • 9,43 МБ
  • добавлен
  • описание отредактировано
2022.02
Manning Publications Co., 2022. — 365 p. — ISBN: 978-1617298998. Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free...
  • №69
  • 9,43 МБ
  • добавлен
  • описание отредактировано
2021.12
Springer, 2021. — 616 p. — ISBN 978-3-030-85792-9. This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease...
  • №70
  • 40,25 МБ
  • добавлен
  • описание отредактировано
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-20-1. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
  • №71
  • 3,42 МБ
  • добавлен
  • описание отредактировано
Apress, 2021. — 230 p. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a...
  • №72
  • 12,31 МБ
  • добавлен
  • описание отредактировано
2021.10
3rd edition. — Jones & Bartlett Learning, 2022. — 550 p. — ISBN 9781284207811. Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are...
  • №73
  • 5,17 МБ
  • добавлен
  • описание отредактировано
2021.09
2nd Edition. — Jones & Bartlett Learning, 2023. — 500 р. — ISBN 978-1284251470. This text will provide you with an overview of information and cybersecurity and offer a summary of security topics that are addressed in more detail in the Jones & Bartlett Learning “New Information Systems Security & Assurance” series. Cybersecurity is an aspect of information security....
  • №74
  • 16,34 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2021. — 506 p. — ISBN 978-1617296598. In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you’ll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. In a world of changing privacy regulations, identity theft, and online anonymity,...
  • №75
  • 16,43 МБ
  • добавлен
  • описание отредактировано
Ibrahim Habli, Mark Sujan, Simos Gerasimou, Erwin Schoitsch, Friedemann Bitsch. — Springer, 2021. — 335 p. — ISBN 978-3-030-83905-5. This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the 40th International Conference on Computer Safety, Reliability and Security, which took place in York, UK, in September 2021. The 26 regular papers...
  • №76
  • 39,19 МБ
  • добавлен
  • описание отредактировано
Harvard University Press, 2018. — 384 p. Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves―even when the odds are...
  • №77
  • 5,16 МБ
  • добавлен
  • описание отредактировано
No Starch Press, 2021. — 376 p. — ISBN 978-1-7185-0187-4. A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial...
  • №78
  • 11,25 МБ
  • добавлен
  • описание отредактировано
Wiley, 2021. — 286 p. — ISBN 978‐1‐119‐75546‐3. IAPP CIPP / US Certified Information Privacy Professional STUDY GUIDE Your ultimate guide to preparing for the CIPP/US exam The IAPP CIPP / US Certified Information Privacy Professional Study Guide is your one-stop resource for complete coverage of the challenging CIPP/US exam. This Study Guide covers 100% of the CIPP/US domain...
  • №79
  • 6,22 МБ
  • добавлен
  • описание отредактировано
2021.08
O’Reilly Media, Inc., 2021. — 346 p. — ISBN: 978-1-492-07573-8. Fairness is becoming a paramount consideration for data scientists. Mounting evidence indicates that the widespread deployment of machine learning and AI in business and government is reproducing the same biases we're trying to fight in the real world. But what does fairness mean when it comes to code? This...
  • №80
  • 3,88 МБ
  • добавлен
  • описание отредактировано
2021.07
Springer, 2021. — 250 p. — ISBN 978-3-030-69173-8. This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities,...
  • №81
  • 31,15 МБ
  • добавлен
  • описание отредактировано
2021.06
Springer, 2021. — 564 p. — ISBN 978-3-030-69459-3. This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical...
  • №82
  • 49,70 МБ
  • добавлен
  • описание отредактировано
Springer, 2021. — 448 p. — ISBN 978-3-030-78119-4. This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical...
  • №83
  • 34,70 МБ
  • добавлен
  • описание отредактировано
2021.04
Addison-Wesley, 2021. — 1501 p. — ISBN 9780135619773. The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible....
  • №84
  • 35,23 МБ
  • добавлен
  • описание отредактировано
2021.03
Independently published, 2021. — 168 p. — ISBN B08Y8HDG27. The book is designed to introduce fundamental concepts of information systems security by providing you with an understanding of the importance of information security and several techniques of planning and managing information systems security methods, frameworks and ethics. The book provides details of key information...
  • №85
  • 5,73 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley, 2021. — 1501 p. — ISBN 9780135619773. This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The...
  • №86
  • 40,18 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC., 2021. — 134 p. — ISBN-13 (electronic): 978-1-4842-6904-6. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start...
  • №87
  • 8,51 МБ
  • добавлен
  • описание отредактировано
2021.02
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68739-9 (ebk). Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
  • №88
  • 2,01 МБ
  • добавлен
  • описание отредактировано
2021.01
Red Bike Publishing, LLC, 2021. — 249 p.— ISBN 1936800314, 9781936800315. ISP and ISOC Master Exam Prep, gives you insight into test taking and has four 110 question length certification practice exams and a set of essay style questions. Part of Security Clearance and Cleared Defense Contractor series This book is designed to give practice questions to those who are eligible to...
  • №89
  • 3,03 МБ
  • добавлен
  • описание отредактировано
Leanpub, 2020. — 161 p.— ISBN 1670062449, 9781670062444. As software engineers, we often think of security as an afterthought: build it, then fix it later. Truth is, knowing a few simple browser features can save you countless hours banging your head against a security vulnerability reported by a user. This book is a solid read that aims to save you days learning about security...
  • №90
  • 4,69 МБ
  • добавлен
  • описание отредактировано
2020.12
Учебник по информационно-аналитической работе. — М.: Яуза, 2001. — 318 с. В учебнике рассматривается широкий круг проблем по работе с разными по форме и содержанию источниками информации, обеспечению процесса подготовки и ведения информационно-аналитической работы. Подробно раскрываются основные понятия, выбор методов исследования, структура и содержание этапов информационной и...
  • №91
  • 409,61 КБ
  • добавлен
  • описание отредактировано
2020.11
Packt Publishing, 2020. — 390 p. — ISBN: 9781789806298. Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats Prevent cyber attacks by using robust cybersecurity strategies Unlock the secrets of network security Book Description With advanced cyber...
  • №92
  • 16,29 МБ
  • добавлен
  • описание отредактировано
2020.09
Apress, 2020. — 984 p. — ISBN: 9781484261927. Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that...
  • №93
  • 57,79 МБ
  • добавлен
  • описание отредактировано
Independently published, 2020. — 64 p. — ISBN10: 1670903036, 13 978-1670903037. This book has been written in a way that makes it easy for you to understand this very important subject in today’s world. If you’re a beginner, then this is the book for you. The world is increasingly heading in a digital direction and automation is now becoming the norm; this means that...
  • №94
  • 3,14 МБ
  • добавлен
  • описание отредактировано
2020.08
McGraw-Hill, 2020. — 480 p. — ISBN: 978-1-26-046007-0. HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide Prepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resource. Written by a healthcare information security and...
  • №95
  • 6,78 МБ
  • добавлен
  • описание отредактировано
2020.07
Syngress, 2014 .-- 602 p. - 2nd ed. - ISBN: 9780124105263 Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT...
  • №96
  • 3,66 МБ
  • добавлен
  • описание отредактировано
Syngress, 2014. — 210 c. — ISBN13: 978-0128020432. The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted...
  • №97
  • 5,07 МБ
  • добавлен
  • описание отредактировано
2020.06
Fullstack.io, 2020. — 131 p. — ISBN: n/a. Revision 7 – 2020-04-17 Most of the marketing employed by the security industry tends to rely on a bit of fear-mongering. It’s easy to sell sensationalism — to say that “everything is broken” and cause a sense of alarm and hopelessness. The goal of this book is not to impart fear, but knowledge. Informed individuals are less likely to...
  • №98
  • 1,41 МБ
  • добавлен
  • описание отредактировано
2020.02
Apress, 2020. — 221 p. — ISBN13: (electronic): 978-1-4842-5608-4. Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you...
  • №99
  • 14,38 МБ
  • добавлен
  • описание отредактировано
2nd Edition. — Packt Publishing, 2020. — 548 p. — ISBN: 978-1-83864-900-5. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks....
  • №100
  • 65,41 МБ
  • добавлен
  • описание отредактировано
2020.01
No Starch Press, 2018. — 272 p. — ISBN13: 978-1-59327-859-5. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of...
  • №101
  • 9,12 МБ
  • добавлен
  • описание отредактировано
Springer, 2020. — 957 p. — ISBN: 978-3-030-22276-5. This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to...
  • №102
  • 88,30 МБ
  • добавлен
  • описание отредактировано
2019.12
Apress, 2019. — 149 p. — ISBN13: (electronic): 978-1-4842-5034-1. Explore the adoption of chatbots in business by focusing on the design, deployment, and continuous improvement of chatbots in a business, with a single use-case from the banking and insurance sector. This book starts by identifying the business processes in the banking and insurance industry. This involves data...
  • №103
  • 6,81 МБ
  • добавлен
  • описание отредактировано
2019.09
John Wiley & Sons, Inc., 2008. — 336 p. — ISBN: 978-0-470-50562-5. Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay - figuratively and literally - when security fails....
  • №104
  • 3,35 МБ
  • добавлен
  • описание отредактировано
2019.08
2nd ed. — Addison-Wesley Professional, 2018. — 2865 p. — ISBN13: 978-0-321-71233-2. The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer...
  • №105
  • 14,13 МБ
  • добавлен
  • описание отредактировано
2019.06
Zed Books, 2019. — 288 p. — ISBN: 978-1786995353. Once little more than a glorified porn filter, China’s ‘Great Firewall’ has evolved into the most sophisticated system of online censorship in the world. Even as the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and any attempts to organize outside the official Communist Party are...
  • №106
  • 1,11 МБ
  • добавлен
  • описание отредактировано
HarperCollins Publishers Australia Pty. Ltd., 2019. — 320 p. — ISBN: 978-0-06-279599-1. A former FBI Special Agent, U.S. Army officer and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our...
  • №107
  • 721,43 КБ
  • добавлен
  • описание отредактировано
2019.05
Pragmatic Bookshelf, 2019. — 144 p. — ISBN10: 168050634X, 13 978-1680506341. Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have...
  • №108
  • 1,13 МБ
  • добавлен
  • описание отредактировано
2019.04
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
  • №109
  • 7,27 МБ
  • добавлен
  • описание отредактировано
2019.01
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create...
  • №110
  • 3,69 МБ
  • добавлен
  • описание отредактировано
2018.12
Apress, 2019. — 377 р. Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal...
  • №111
  • 13,86 МБ
  • добавлен
  • описание отредактировано
2018.08
Apress, 2018. — 363 p. Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to...
  • №112
  • 9,74 МБ
  • добавлен
  • описание отредактировано
Packt Publishing, 2018. — 346 p. Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging...
  • №113
  • 2,87 МБ
  • добавлен
  • описание отредактировано
2018.07
Packt Publishing, 2018. — 510 p. — ISBN: 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical...
  • №114
  • 14,13 МБ
  • добавлен
  • описание отредактировано
2018.04
Packt Publishing, 2013. — 242 p. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be...
  • №115
  • 3,88 МБ
  • добавлен
  • описание отредактировано
Springer, 2018. — 261 p. — ISBN10: 3319779648, ISBN13: 978-3319779645. With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and...
  • №116
  • 2,57 МБ
  • добавлен
  • описание отредактировано
2018.03
Apress, 2015. — 744 p. Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with...
  • №117
  • 8,55 МБ
  • добавлен
  • описание отредактировано
2017.08
O’Reilly Media, 2017. — 284 p. — ISBN: 978-1-491-93494-4. Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this...
  • №118
  • 1,92 МБ
  • добавлен
  • описание отредактировано
Packt Publishing , 2017. — 350 p. — ISBN: 978-1787288683. Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident...
  • №119
  • 10,55 МБ
  • добавлен
  • описание отредактировано
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 83 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all...
  • №120
  • 883,68 КБ
  • добавлен
  • описание отредактировано
2017.06
Leanpub, 2017. — 167 p. The Mobile Security Testing Guide (MSTG) Summit Preview is a proof-of-concept for an unusual security book. It is the result of an open, crowd-sourced effort, made of the contributions of dozens of authors and reviewers from all over the world. With the MSTG, we aim to create best practices for mobile security, along with a comprehensive set of security...
  • №121
  • 5,15 МБ
  • добавлен
  • описание отредактировано
2017.04
O’Reilly Media, 2017. — 268 p. — ISBN: 978-1491960387. — conv. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a...
  • №122
  • 2,11 МБ
  • добавлен
  • описание отредактировано
2017.01
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
  • №123
  • 54,72 МБ
  • добавлен
  • описание отредактировано
2016.09
McGraw-Hill Education, 2015. — 544 р. — ISBN: 978-0071819749. Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and...
  • №124
  • 17,76 МБ
  • добавлен
  • описание отредактировано
2016.06
Amazon Digital Services LLC, 2015. — 27 p. — ASIN: B019U17G06 A virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the computer system. This will cause the computer to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted. What Is...
  • №125
  • 96,65 КБ
  • добавлен
  • описание отредактировано
2016.04
O’Reilly Media, 2016. — 75 p. — ISBN: 1491952121. — ISBN13: 978-1491952122. Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical...
  • №126
  • 8,34 МБ
  • добавлен
  • описание отредактировано
2015.01
5th Edition. — Prentice Hall, 2015. — 944 p. The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare. Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic...
  • №127
  • 6,67 МБ
  • добавлен
  • описание отредактировано
2013.09
Penguin Books, 2012 — 368 p. From the New York Times’s veteran foreign policy editorialist, a lucid analysis of the harm caused by America’s increasingly misdirected national security state America is trapped in a state of war that has consumed our national life since before Pearl Harbor. Over seven decades and several bloody wars, Democratic and Republican politicians alike...
  • №128
  • 1,28 МБ
  • добавлен
  • описание отредактировано
2013.08
Packt Publishing, 2013. — 324 p. — ISBN: 1849685967. На англ. языке. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. Enterprise...
  • №129
  • 4,67 МБ
  • добавлен
  • описание отредактировано
В этом разделе нет файлов.

Комментарии

в разделе Информационная безопасность #
Предлагаю создать подраздел в разделе Информационная безопасность, в котором были отображены стандарты информационной безопасности (безопасности).
В свою очередь, его разделить на две подрубрики, а именно:
-Государственные (национальные) стандарты РФ
ГОСТ Р 50922-2006 Защита информации. Основные термины и определения
ГОСТ Р 51188-98 Защита информации. Испытания программных средств на наличие компьютерных вирусов. Типовое руководство
ГОСТ Р 51275-2006 Защита информации. Объект информатизации. Факторы, воздействующие на информацию. Общие положения
ГОСТ Р ИСО/МЭК 15408-1-2008 Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 1. Введение и общая модель
ГОСТ Р ИСО/МЭК 15408-2-2008 - Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 2. Функциональные требования безопасности
ГОСТ Р ИСО/МЭК 15408-2-2013 Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 2. Функциональные компоненты безопасности
ГОСТ Р ИСО/МЭК 15408-3-2008. Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 3. Требования доверия к безопасности
ГОСТ Р ИСО/МЭК 17799-2005 Информационная технология. Практические правила управления информационной безопасностью
ГОСТ Р ИСО/МЭК 27002-2012 Информационная технология. Методы и средства обеспечения безопасности. Свод норм и правил менеджмента информационной безопасности
ГОСТ Р 51110-97 Средства защитные банковские. Общие технические требования
ГОСТ Р 51111-97 Средства защитные банковские. Правила приемки и методы испытаний
ГОСТ Р 51624-2000 Автоматизированные информационные системы в защищенном исполнении
и т.д.
Международные стандарты
ISO/IEC 27000: 2014 Information technology - Security techniques - Information security management systems - Overview and vocabulary
ISO/IEC 27001. Information technology. Security techniques. Information security management systems: Requirements
Возможно только в один подраздел: стандарты информационной безопасности (защиты информации)
в разделе Информационная безопасность #
Данные стандарты лежат на своих местах.
в разделе Информационная безопасность #
Тогда, как найти среди множества стандартов нужный безопаснику? И определить, что он касается безопасности. По поиску, оно понятно — можно. И все же, может какую-нибудь перекрестную ссылку дать?
При этом классификации стандартов, могут быть разными, в т.ч. рекомендованные ГОСТ Р.
в разделе Информационная безопасность #
По названию и описанию - в них же человеческие слова, наполненные смыслом, а не бездушные инопланетные иероглифы.
Полагаю из слов, которые в названии и описании можно понять подход файл или нет.
в разделе Информационная безопасность #
Согласен! Но, согласитесь и Вы, что если стандарты по информационной безопасности были бы в разделе соответствующем, было не так уж и плохо. Жаль, что невозможно реализовать присутствие в двух местах.
в разделе Информационная безопасность #
Я уже рассказывал о тематических подборках.
в разделе Информационная безопасность #
А что делать в случае, если:
1. Методические материалы не относятся к "Учебно-методическим материалам"?
2. Рефераты и доклады, презентации не относятся к "Студенческим работам"?
в разделе Информационная безопасность #
Приведите примеры таких файлов.
в разделе Информационная безопасность #
Например:
1. /files/informatics/security/hacking/ft.presentation/ - это презентация компании "Lieberman Software", вице-президента Смородинского Льва Исааковича, состоявшаяся на "VII Уральском форуме «Информационная безопасность банков»"
Далее, практически все мои выложенные презентации, они не студенческие, а практически все или топ-менеджмента компаний или руководителей государственный структур, поэтому как-то переводить их в ранг студентов ну как-то нелепо.
Поэтому, может все-таки пусть это будут презентации (общие или еще какое название), а не презентации, которые попадают в случае применения фильтра по выбору типа файла в "Студенческие работы-Презентации".
То есть по идее я должен установить тип файла, я применяю "Презентации" и он попадает в раздел Студенческие работы. В котором есть подраздел презентации.
Еще один пример презентации всеми уважаемого начальника управления ФСТЭК России Лютикова Виталия Сергеевича:
Развитие нормативно-правовых и методических документов ФСТЭК России в области защиты конфиденциальной информации, которую я размещал в раздел "Организационно-правовое обеспечение ИБ".
Ввиду того, что это презентация, состоявшаяся в рамках V Конференция "Актуальные вопросы защиты информации" на ТФ Форуме-2015, то я естественно, применил фильтр Типа файла - Презентация.
В итоге, это файл попал в подраздел Студенческие работы, а там соответственно в "Презентации".
Поэтому, парадигма, применяя правильно "фильтр типа файлов", файл начальника управления ФСТЭК России Лютикова Виталия Сергеевича, попадает в "Студенческие работы".
А Если выбирать тип файла "другое", то по сути презентация не находит своего должного соответствия.
Прошу разъяснить, как поступать в дальнейшем при выборе " Фильтра типа файлов" в таких случаях.
в разделе Информационная безопасность #
В итоге, это файл попал в подраздел Студенческие работы, а там соответственно в "Презентации".
Ну не ставьте на такие файлы тип Презентация, поставьте Другое и оформите по формату книги, делов то.
в разделе Информационная безопасность #
Стал оформлять файлы по Вашей рекомендации! Файлы, несколько дней назад были приняты. А сегодня 17 моих файлов приобрели статус "ожидают проверки" со следующем комментарием:
Уточните тип файла
При добавлении студенческой работы следует правильно указывать ее тип в соответвующем поле.
Для книг, методичек и учебных пособий в поле "название" следует указать автора (или авторов) и заголовок, а в качестве типа файла указать «Другое».
Например:
Сидоров К.П., Зенцова А.Ю. Теоретические основы электротехники
Петров В.И. Методические указания по Экономике
А вообще, правила и примеры оформления файлов можно посмотреть в специальном разделе FAQ.
Задать вопрос модератору по поводу данного замечания вы можете через комментарии на странице вашего файла.
Если данное замечание не будет исправлено, то файл будет автоматически удален через 13 дней и 22 часа
Что делать?
в разделе Информационная безопасность #
Стоит привести заголовок файла формату книги.
Тем более что автора вы и так указываете.
в разделе Информационная безопасность #
Вот и получается на практике: "Не верь глазам своим!". Презентация - это не презентация, а другое. Интересно, а по статистике из выложенных презентаций, все ли презентации относятся к студенческим работам? Я заметил, что некоторые выложенные презентации принадлежат не студентам, а преподавателям. При этом, выбирая тип файла, который больше соответствует по содержанию, типу и форме, никто ведь не подозревает, что реферат, доклад, презентация попадают в разряд студенческих работ.
Может просто убрать Студенческие работы и станет всё в соответствие.
в разделе Информационная безопасность #
Я уже дважды написал свое мнение по этому вопросу.
Дальнейшее обсуждение не считаю целесообразным.
Dixi.
В этом разделе нет комментариев.