Учебник по информационно-аналитической работе. — М.: Яуза, 2001. — 318 с. В учебнике рассматривается широкий круг проблем по работе с разными по форме и содержанию источниками информации, обеспечению процесса подготовки и ведения информационно-аналитической работы. Подробно раскрываются основные понятия, выбор методов исследования, структура и содержание этапов информационной и...
Учебное пособие. — 2-е изд., стереот. — М.: МГИУ, 2005. — 215 с. — ISBN 5-276-00641-5
В учебном пособии приводятся основные сведения, необходимые для начального понимания сущности информационной безопасности личности, общества и государства. Дается характеристика компьютерных систем как наиболее распространенных и достаточно уязвимых объектов информационной безопасности...
М.: Академия безопасности и выживания, 2014. — 161 с. Информатизация социально-политической, экономической и военной деятельности страны и, как следствие, бурное развитие информационных систем сопровождаются существенным ростом посягательств на информацию как со стороны иностранных государств, так и со стороны преступных элементов и граждан, не имеющих доступа к ней....
Учебник. — Омск: Изд-во Омского института (филиала) РГТЭУ, 2011. – 426 с. Учебник «Защита информации и информационная безопасность» предназначен для курсантов высших военно-учебных заведений сухопутных войск, обучающихся по всем специальностям. В учебнике отражен полный комплекс проблем по вопросам информационной безопасности и защиты информации, методы оценки работоспособности...
Автор не известен / Учебное пособие. — Ростов-на-Дону: 2004. — 82 с. В учебном пособии представлены основные понятия и принципы информационной безопасности в рамках учебных дисциплин «Информационная безопасность», «Защита информации». Пособие состоит из введения и 5 глав. В Главе 1 изложены вопросы, связанные с доктриной информационной безопасности Российской Федерации,...
Packt Publishing, 2018. — 510 p. — ISBN: 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical...
Под ред. В.А. Садовничего и В.П.Шерстюка — М.: МЦНМО, 2002 — 86 с. ISBN: 5-94057-061-5;Тираж 1000 экз. В работе изложена система понятий и закономерностей, раскрывающая содержание проблемы "обеспечение информационной безопасности России" и составляющую теоретическую основу ее исследования. Предложена концепция информации, раскрывающая это явление как свойство отражать движение...
Учебное пособие. — М.: НЦ ЭНАС, 2007. — 336 с. — ISBN 978-5-93196-814-8. В учебном пособии рассмотрены основные понятия, история, проблемы и угрозы информационной безопасности, наиболее важные направления ее обеспечения, включая основы защиты информации в экономике, внутренней и внешней политике, науке и технике. Обсуждаются вопросы правового и организационного обеспечения...
No Starch Press, 2021. — 379 p. — ISBN 9781718501881. A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial...
Москва Форум, Инфра-М, 2002. — 243 с. — ISBN: 5-8199-0060-Х, 5-16-001155-2 В учебном пособии рассматриваются вопросы информационной безопасности и защиты данных, в том числе в информационно-вычислительных системах и сетях. Дано введение в общие проблемы безопасности, определены роль и место информационной безопасности в системе обеспечения национальной безопасности государства....
Учебное пособие. 2001. Инфра-М. М: 2001.
Учебное пособие предназначено для всех, интересующихся вопросами практического решения проблем информационной безопасности офисной и предпринимательской деятельности. В настоящее время, несмотря на актуальность и практическую значимость этих проблем, не существует достаточно полной и современной учебной литературы в указанной области....
Учебно-методическое пособие. – Перм. нац. исслед. политехн. ун-т. – Пермь, 2011. - 68 с. В издании рассмотрены вопросы информационной безопасности, проанализированы угрозы информации и основные направления ее защиты в современных условиях, этапы и принципы создания комплексных систем безопасности предприятия. Даны рекомендации по обеспечению сохранности конфиденциальной...
СПб.: БХВ-Петербург, 2024. — 224 с.: ил. — (Глазами хакера). — ISBN: 978-5-9775-1995-3. В книге рассматриваются вопросы безопасности компьютерных сетей. Даны практические рекомендации по проведению пентеста сетей Cisco, приведены полезные сведения о протоколе DTP от компании Cisco Systems, представлено подробное руководство по пентесту канального уровня сети, тестированию...
М.: Вильямс, 2002. — 208 с. — ISBN:5-8459-0323-8. Правила информационной безопасности играют ключевую роль в обеспечении защиты систем и сети. Продуманные, реализованные и внедренные правила информационной безопасности помогут почувствовать разницу между наметками безопасности и организованной системой безопасности, которая эффективно функционирует. Эта книга поможет понять,...
Учебное пособие. – СПб.: НИУ ИТМО, 2012. – 120 с. Состоит из трёх разделов: Раздел 1 - Лекционный материал. В доступной форме излагаются знания научных основ по экономическим проблемам защиты и страхования информации; раздел 2 - Практические занятия. Задачей данного раздела является привитие навыков применения теоретических знаний при решении экономических задач; в разделе 3...
Addison-Wesley Professional, 2018. — 1436 p. — ISBN: 0321712331. In this updated guide , University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition...
СПб.: Питер, 2021. — 272 с. В этой книге говорится о сфере ИБ в целом. Она адресована тем, кому интересно, что вообще значит «информационная безопасность», а также тем, кто не знает, с чего начать. Автор приводит четкие и при этом не усложненные техническими подробностями объяснения того, как работает ИБ и как применять ее принципы в своей работе. Вы узнаете основы, и вам не...
McGraw-Hill, 2013. — 898 p. — 2nd ed. — ISBN: 9780071784368
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral...
Учеб. пособие. — М.: Инфра-М, 2001. — 304 с. ISBN 5-16-000491-2 В учебном пособии рассматриваются вопросы обеспечения информационной безопасности и защиты информации в офисной деятельности и предпринимательских структурах различного типа, работы, с персоналом, обладающим сведениями ограниченного распространения, функционирования защищенного документооборота и специализированной...
Учебное пособие.– СПб: Университет ИТМО, 2015. – 93с.
В учебном пособии приводится математический аппарат, который может использоваться для формального проектирования систем защиты информационных систем, реализуемого с целью определения требований к оптимальному набору решаемых задач защиты и расчета значений параметров и характеристик безопасности проектируемой системы защиты....
Учебное пособие. — Магнитогорск: ГОУ ВПО «МГТУ», 2007. — 137 с. — ISBN: 978-5-89514-930-0 Рассмотрены существующие угрозы безопасности компьютерных систем, указана роль существующих стандартов и критериев безопасности. Приведены существующие криптографические методы защиты информации. На основе обзора отечественных и зарубежных методов аутентификации и контроля целостности,...
Саратов: УЦ «Новые технологии в образовании». - 121 с.
Введение в информационную безопасность.
Принципы построения защищенной АИС.
Модели безопасности.
Введение в криптографию. Симметричное шифрование.
Шифрование с открытым ключом. ЭЦП.
Криптографические протоколы.
Парольная защита.
Компьютерные вирусы и борьба с ними.
Средства защиты сети.
Список литературы....
М.: Горячая линия. – Телеком, 213. — 216 с. — ISBN: 978-5-9912-0274-9. Рассмотрены технические аспекты управления информационной безопасностью (ИБ), включая управление логическим доступом пользователей к активам организации, управление защищенной передачей данных и операционной деятельностью, разработку и обслуживание информационных систем с учетом требований к их ИБ,...
Packt Publishing, 2016. — 298 p. — ISBN: 978-1-78528-458-8. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Web penetration testing is a growing, fast-moving, and absolutely critical field in information security. This book executes modern web application attacks and utilises cutting-edge hacking techniques...
Исследование подготовлено группой независимых авторов под руководством Евгения Царёва, независимого эксперта по информационной безопасности. Список авторов и разделов: Рынок систем сетевой безопасности, аппаратных средств двухфакторной аутентификации и инструментальных средств анализа защищенности (Михаил Романов) Рынок систем контентной фильтрации (Сергей Трещалин) Рынок...
Apress, 2020. — 984 p. — ISBN: 9781484261927. Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that...
CreateSpace Independent Publishing Platform, 2018. — 260 p. — ISBN13: 978-1091493896. Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases is having an amazing impact on Security Operations worldwide. BTHb:SOCTH is the go to guiding book for new staff at a top 10 MSSP, integrated into University curriculum, and cited in top ten courses from a major information security...
Syngress, 2014. — 602 p. — 2nd ed. — ISBN: 9780124105263 Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT...
Springer, 2010. — 862 pp. At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called Y2K issue. The Y2K scare was the fear that computer networks and the systems that are controlled or operated by software would...
М.: РЭУ им. Г.В. Плеханова, 2017. — 207 c. — ISBN: 978-5-7307-1148-8. Специалистам в области информационной безопасности в настоящее время невозможно обойтись без знания международных и национальных стандартов. Необходимость применения требований криптографических стандартов, Руководящих документов Гостехкомиссии России закреплена законодательно. Помимо этого, во всех...
Springer, 2020. — 957 p. — ISBN: 978-3-030-22276-5. This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to...
Springer International Publishing AG — 2016. — 299 p. Part I Introduction Chapter 1 - OSINT as an Integral Part of the National Security Apparatus Chapter 2 - Open Source Intelligence and the Protection of National Security Chapter 3 - Police Use of Open Source Intelligence: The Longer Arm of Law Chapter 4 - OSINT as Part of the Strategic National Security Landscape Chapter 5 -...
CRC Press, 2016. — 426 p. — ISBN10: 1498719708. — ISBN13: 978-1498719704 Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by...
М.: ДМК Пресс, 2012. — 476 с.
В литературе по информационной безопасности (ИБ) в настоящее время не наблюдается недостатка. Однако в большинстве книг на эту тему приводится лишь малая часть тех сведений, которые необходимы для комплексного обеспечения информационной безопасности на предприятии. Например, в некоторых учебниках по ИБ основное внимание уделяется нормативным актам...
John Wiley & Sons, Inc., 2014. — 590 p. — ISBN: 9781118809990. This book describes the useful models you can employ to address or mitigate these potential threats. People who build software, systems, or things with software need to address the many predictable threats their systems can face. Threat modeling is a fancy name for something we all do instinctively. If I asked you...
Омск: ОмГТУ, 2009. — 17 с.
Учебное пособие по дисциплине «Информационная безопасность» предназначено для оказания помощи студентам при выполнении курсовой работы.
Настоящее учебное пособие курсовой работе по дисциплине «Информационная безопасность» предназначено для студентов дневного и заочного обучения по специальности 080801 «Прикладная информатика в экономике».
Учебное...
Теплов Э.П., Гатчин Ю.А., Нырков А.П., Сухостат В.В. — Учебное пособие. – СПб: Университет ИТМО, 2016. – 120 с.
Учебное пособие посвящено гуманитарным аспектам информационной безопасности. В работе определяется суть поиска истины. Рассмотрены характеристики и возможности законов и принципов формальной логики, способствующих защищенности личности, ее понятийного логического...
2-е изд., перераб. и доп. — СПб.: BHV-СПб, 2024. — 208 с.: ил. — ISBN: 978-5-9775-1880-2. Книга рассматривает используемые современными киберпреступниками методы социальной инженерии и способы защиты от нее — как организационные, так и технические. Приведено 130 практических примеров атак, даны примеры фишинговых писем, раскрыты применяемые мошенниками психологические приемы и...
Учебное пособие. — Томск: ТПУ, 2009. — 95 с. Учебное пособие по курсу "Информационная безопасность и защита информации" составлено профессором, доктором философских наук, действительным членом (академиком) международной академии наук высшей школы Э.Н. Камышевым по программе подготовки студентов в Томском политехническом университете. Оно предназначено для студентов...
2nd ed. — Addison-Wesley Professional, 2018. — 2065 p. — ISBN: 0321712331, 9780321712332. In his extensively updated Computer Security: Art and Science, 2nd Edition, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers a clear, rigorous, and thorough introduction to the entire modern field of computer security. Bishop covers access...
2nd ed. — CreateSpace Independent Publishing Platform, 2017. — 45 p. — (TOR). — ISBN10: 1974216780, 13 978-1974216789. Best-selling author, Bruce Rogers, presents a remarkable beginners' guide made simple and easy to understand to help all aspiring hackers learn and master the fundamentals of hacking and IT security. In Part 1: TOR - Beginners to Expert Guide to Accessing the...
Учебное пособие. — М.: Мир науки, 2022. — 100 с. — ISBN 978-5-907603-38-7. В учебном пособии подробно рассматриваются проблемы обеспечения информационной безопасности сетей, понятным языком излагаются базовые понятия криптографической защиты информации, детально обсуждаются понятия идентификации, аутентификации и авторизации пользователей при работе в информационных сетях,...
Packt Publishing, 2015. - 118p.
Nmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility.
This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap,...
Addison-Wesley, 2007. - 513 p. - ISBN: 0-32-144611-9 Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. In this book, renowned fuzzing experts show...
OpensSource. — 19 с. (Автор и выходные данные не указаны). В этом курсе я постараюсь рассказать всю самую основную и ценную информацию по анонимности и безопасности при работе в сети. Данный курс не является призывом к каким-либо плохим действиям. Курс будет free (бесплатным) для всех желающих, потому что не вижу смысла продавать информацию, которая собрана и переделана из...
М.: МЦНМО, 2002.— 296 с. — ISBN: 5-94057-061-5 Изложена система понятий и закономерностей, раскрывающая содержание проблемы "обеспечения информационной безопасности России". Предложена концепция информации как свойства организмов отражать движение объектов материального мира. Показано, что в обществе информация обращается в форме сведений и сообщений. Раскрыта сущность таких...
Пособие. Экспресс-курс по основам ИБ. NetSkills, 2022 г. — 77 стр. Кто-бы что ни говорил, но ИБ делится на две большие категории: “Бумажная безопасность” и Техническая безопасность”. Причем по личному опыту могу сказать, что там где лучше “прокачана” бумажная - в упадке находится техническая. И наоборот. Хотя весьма часто бывает, когда в безобразном состоянии находится и то и...
Independently published, 2023. — 222 p. Кодовая книга OSINT: взлом стратегий разведки с открытым исходным кодом The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced...
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create...
ДМК Пресс, 2012. — 476 p. — ISBN: 9785940746478
В литературе по информационной безопасности (ИБ) в настоящее время не наблюдается недостатка. Однако в большинстве книг на эту тему приводится лишь малая часть тех сведений, которые необходимы для комплексного обеспечения информационной безопасности на предприятии. Например, в некоторых учебниках по ИБ основное внимание уделяется...
Уфа: Изд-во БГПУ, 2010. — 168 с. — ISBN: 978-5-87978-588-3 В учебном пособии в соответствии с действующими нормативными и руководящими документами подробно раскрыты основные термины и определения в области защиты информации, рассмотрены виды уязвимости информации, причины и условия образования каналов утечки информации и способы их нейтрализации. Также здесь показана роль...
Учебное пособие для студентов ВУЗов, обучающихся по специальностям в области информационной безопасности. М.: Гелиос АРВ, 2005 - 224с. Изложены основы системного анализа как средства исследования и решения проблем адекватных оценок ситуаций, проектов и внедряемых систем. Содержание учебного пособия соответствует программе курсов "Основы системного анализа" и "Основы системного...
М.: Cisco Russia, 2015. — 53 с. Годовой отчет Cisco по безопасности за 2015 год. Краткий обзор. Аналитика угроз. Сведения об угрозах, представленные в отчете, отражают результаты работы ведущих экспертов Cisco. Злоумышленники против разработчиков систем безопасности: продолжающаяся гонка Веб-эксплойты: создатели эксплойт-китов считают, что высшая строчка в рейтинге не...
How the FBI, Media, and Public Identified the January 6, 2021 U.S. Capitol Rioters. Independently published, 2022. — 740 p. Nowhere to Hide: Open Source Intelligence Gathering provides practical insight into the investigative tools and open source intelligence gathering (commonly known as “OSINT”) used by law enforcement, the media, and the general public to identify...
Manning Publications, 2021. — 506 p. — ISBN 978-1617296598. In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you’ll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. In a world of changing privacy regulations, identity theft, and online anonymity,...
В.П. Мельников, С.А. Клейменов, А.М. Петраков. — Учебное пособие для студ. высш. учеб. заведений. — 3-е изд., стер. — М.: Академия, 2008. — 336 с. — ISBN: 978-5-7695-4884-0. Представлены основные положения, понятия и определения обеспечения информационной безопасности деятельности общества, его различных структурных образований, организационно-правового, технического,...
Учебное пособие. — Иркутск : Изд-во БГУЭП, 2015. — 122 с. — ISBN: 978-5-7253-2807-3. Анализируется правовая и техническая характеристики основ обеспечения информационной безопасности в современном обществе, а так-же теория защиты информации. Раскрывается понятие информационной безопасности, дается классификация нормативно-правовых актов, регулирующих общественные отношения в...
Wiley, 2014. — 648 p. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become...
No Starch Press, 2022. — 216 p. — ISBN 9781718501508. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real life...
Prentice Hall, 2011. - 848 pages ISBN: 0132789469 Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur....
No Starch Press, 2018. — 272 p. — ISBN13: 978-1-59327-859-5. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of...
Apress, 2019. — 398 p. — ISBN13: 978-1-4842-5033-4. Explore the adoption of chatbots in business by focusing on the design, deployment, and continuous improvement of chatbots in a business, with a single use-case from the banking and insurance sector. This book starts by identifying the business processes in the banking and insurance industry. This involves data collection from...
Springer, 2020. — 794 p. — (Power Systems). — ISBN: 978-3-030-23722-6. This book presents intuitive explanations of the principles of microgrids, including their structure and operation and their applications. It also discusses the latest research on microgrid control and protection technologies and the essentials of microgrids as well as enhanced communication systems. The...
Apress, 2019. — 377 р. Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal...
Packt Publishing, 2013. — 324 p. — ISBN: 1849685967. На англ. языке. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. Enterprise...
Монография. - М.: Юнити-Дана, 2015. - 239 с. В настоящем издании показан российский опыт защиты детей от информационной продукции, способной нанести вред их здоровью, духовному и нравственному развитию. Представлен обзор результатов психологических исследований влияния различной информационной продукции на здоровье и развитие несовершеннолетних. Дан анализ международных...
Интернет-издание, 2013. — 20 с.
Шоковая информация. Это должен знать каждый. Забудьте о взломах и фишинге. Всего 20 страниц. Без лишней воды.
Простой пароль не трудно взломать, а сложный можно легко забыть. Каким же он должен быть, идеальный пароль и существует ли он? В этой книге мы разберем основополагающие вопросы безопасности, связанные с авторизацией в системах, а также...
2017. — 220 p. Welcome to the second edition of the OWASP Code Review Guide Project. The second edition brings the successful OWASP Code Review Guide up to date with current threats and countermeasures. This version also includes new content refecting the OWASP communities’ experiences of secure code review best practices. The Second Edition of the Code Review Guide has been...
McGraw-Hill Education, 2014. — 464 p. Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides...
СПб.: СПбГИКиТ, 2016. — 396 с. — ISBN: 978-5-94760-181-7 Монография посвящена международно-правовым аспектам обеспечения информационной безопасности государств в сфере массовых коммуникаций. В работе рассмотрены вопросы защиты прав и свобод человека в сфере международного распространения массовой информации, правовое положение субъектов международной журналистики, исследованы...
McGraw-Hill Education, 2015. — 544 p. — ISBN: 978-0-07-182762-1. Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how...
Учебно-методическое пособие. — СПб.: Университет ИТМО, 2019. — 32 с. Учебное пособие разработано для методической помощи бакалаврам, обучающимся по направлению подготовки 10.03.01 – «Информационная безопасность». В пособии рассмотрены вопросы правового обеспечения информационный безопасности в зарубежных странах. Предложены практические задания для изучения законодательства...
16 стр.
(Выходные данные не указаны).
С увеличением парка компьютеров на предприятии все более остро встаёт вопрос о стоимости его управления и содержания. Ручная настройка компьютеров отнимает немало времени у персонала и заставляет, с увеличением количества компьютеров, увеличивать штат обслуживающего их персонала. К тому же при большом количестве машин следить за...
Учебное пособие. – Краснодар: КубГАУ, 2020. – 332 с. ISBN: 978-5-907346-50-5 В пособии рассмотрены базовые положения диалектики экономических открытых систем. Материал ориентирован на выработку у обучающихся способности развивать свои знания, умения, навыки в области информационной безопасности, моделирования коллективной деятельности людей с использованием информационных...
Учебное пособие. — Белгород: БелГУ, 2008. — 207 с.
Учебное пособие по курсу "Информационная безопасность" для студентов заочной формы обучения представляют собой теоретический материал и практикум по тому же курсу. Учебное пособие составлено в соответствии с требованиями по обязательному минимуму содержания и уровню подготовки специалиста с высшим образованием Государственным...
Навч. посібник. - К.: "Корнійчук", 2007. - 256 с. - ISBN 966-7599-37-X. Викладено основи теорії надійності та особливості застосування її основних положень шодо комп'ютерних систем. Описані методи організації і структура засобів контролю функціонування окремих пристроїв комп'ютерів та комп'ютерних систем, метоли прогнозування надійності великих інтегральних схем, приклади...
Chapman and Hall/CRC, 2017. — 232 p. — ISBN: 1498721044, 9781498721042, 9781315353760, 1315353768 The book covers data privacy in depth with respect to data mining, test data management, synthetic data generation etc. It formalizes principles of data privacy that are essential for good anonymization design based on the data format and discipline. The principles outline best...
Минск: БНТУ, 2012. — 91 с. — ISBN: 978-985-525-723-4. Пособие предназначено для студентов высших учебных заведений, обучающихся по специальностям «Программное обеспечение информационных технологий» и «Автоматизированные системы обработки информации», а также будет полезно для студентов других специальностей, изучающих информационные технологии. В части 2 рассмотрены...
М.: ДМК Пресс, 2013. – 656 с. – ISBN: 978-5-94074-885-4. Книга представляет собой курс компьютерной вирусологии, посвященный подробному рассмотрению феномена саморазмножающихся программ. Содержит неформальное и формальное введение в проблему компьютерных вирусов, описание принципов их работы, многочисленные примеры кода, методики обнаружения и удаления, а также лежащие в основе...
Москва: RISA, 2014. — 55 с. Нормативная база ИБ (КВО, КИИ, КСИИ, АСУ) . Прозоров Андрей, CISM. Содержание: Базовые термины. Термин КВО. Термин КИИ. Термин КСИИ. Термин АСУ КВО. Базовые документы. Особенности документов ИБ. Принципы гос.политики. ФЗ. ПП РФ. Документы Совета Безопасности РФ. ФСТЭК России про. УК РФ и КоАП. Международный опыт.
Hoboken: Wiley. 2011. - 456p. A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes...
Springer, 2019. — 808 p. — ISBN: 978-3030158866, 3030158861. This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking...
Wiley-IEEE Press, 2023. — 516 p. — ISBN 9781119892144. IoT для обороны и национальной безопасности Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest...
Apress, 2019. — 243 p. — ISBN: 148424852X. Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices . This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network security, storage security, unified security management through Azure Security Center, and many more. Beginning...
5th Edition. — Prentice Hall, 2015. — 944 p.
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare.
Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic...
Packt Publishing, 2016. — 336 p. This book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies
Auerbach Publications, 2019. — 266 р. This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government...
СПб.: Институт электронного обучения Санкт-Петербургского университета технологий управления и экономики, 2011. — 269 с. — ISBN: 978-5-94047-394-7. В электронном курсе рассмотрены основные понятия, проблемы и угрозы информационной безопасности и наиболее важные подходы к ее комплексному обеспечению: организационно-технический и правовой. Особое внимание уделяется вопросам...
Учебное пособие. — М.: МИСиС, 2019. — 59 с. — ISBN 978-5-906953-94-0. Рассмотрены вопросы применения криптографических алгоритмов с открытым и секретным ключом, требования к криптографическим хэш-функциям и средствам формирования электронной подписи. Даются основы стеганографических алгоритмов применительно к вопросам защиты интеллектуальной собственности путем внедрения...
Учебно-методическое пособие. — СПб.: Университет ИТМО, 2019. — 36 с. Учебное пособие разработано для методической помощи бакалаврам, обучающимся по направлению подготовки 10.03.01 – «Информационная безопасность». В пособии рассмотрены вопросы обеспечения информационной безопасности в зарубежных странах на национальном уровне. Предложены практические задания для изучения систем...
Минск: БНТУ, 2010. — 86 с. — ISBN: 978-985-525-134-8. Рассмотрены методы и средства защиты информации в компьютерных системах за исключением криптографических, а также надежность компьютерной техники. Особое внимание уделено защите от утечки информации по техническим каналам и от несанкционированного доступа. Приведены общие сведения по надежности компьютерной техники и методам...
Учебное пособие. — Омск: СибАДИ, 2011. — 80 с. Кратко изложены основы теории случайных процессов и их применение для решения прикладных задач по обработке и защите информации в технических системах. Предназначено для студентов вузов, обучающихся по направлениям «Информатика и вычислительная техника» и «Информационная безопасность». Понятие случайного процесса. Плотность...
Красноярск : ИПЦ КГТУ, 2005. - 60 с. Изложены математические модели и методы, обеспечивающие конфиденциальность, целостность, доступность информации, достаточные для безопасной работы компьютерных сетей. Представлена характеристика и классификация составляющих информационной безопасности, описаны потенциально опасные причины и характеристики передаваемой в компьютерные сети...
Cisco, 2018. — 68 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
McGraw-Hill Education, 2015. — 544 р. — ISBN: 978-0071819749. Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware. After explaining malware architecture and...
Syngress, 2017. — 283 p. — ISBN: 978-0-12-803773-7. This Handbook presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them....
Springer, 2017. - 147p. - ISBN: 3319674498 This work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of...
CRC Press, 2010. — 870 p. — ISBN: 1420078542, 9781420078541 Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are...
Учебное пособие. — Ростов-на-Дону; Таганрог: Южный федеральный университет, 2018. — 120 с. — ISBN 978-5-9275-2742-7. В учебном пособии дается представление о методологии и нормативном обеспечении процедур управления безопасностью. Рассмотрены современные инструментальные средства, применяемые на практике при оценке безопасности предприятия. Учебное пособие предназначено для...
Springer, 2021. — 262 p. — (Advances in Information Security 84). — ISBN 978-3-030-60617-6. This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity,...
3rd ed. — Springer, 2025. — 2863 p. — ISBN 3030715205. A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make...
CRC Press, 2022. — 270 p. This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging...
BPB Publications, India, 2022. — 376 p. — ISBN 9355511973. Практическое руководство по обнаружению, оценке и устранению уязвимостей в Интернете, сети, мобильных устройствах и беспроводных сетях. Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless...
CRC Press, 2015. — 800 p. Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and...
Pearson Education, 2020. — 527 p. — ISBN 978-0-13-530215-6. The Comprehensive Guide to Engineering and Implementing Privacy Best Practices As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC...
O’Reilly Media, 2011. — 108 p. Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been...
Syngress, 2017. — 260 p. — ISBN: 978-0-12-809316-0. Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common...
Коллектив авторов журнала "Хакер". — СПб.: БХВ-Петербург, 2025. — 112 с.: ил. — (Библиотека журнала «Хакер»). — ISBN 978-5-9775-2046-1. Эта книга — сборник лучших, тщательно отобранных статей из легендарного журнала «Хакер». Рассмотрены современные подходы к использованию искусственного интеллекта в области информационной безопасности. Описаны методы обхода ограничений ChatGPT,...
М. : Русский журнал, 2011. — 329 с.
В пособии рассматриваются теоретические и практические аспекты обеспечения информационной безопасности личности, общества, государства. Значительное место уделяется социальным аспектам информационной безопасности, влиянию информации на жизнь и деятельность людей. Пособие соответствует требованиям примерной Основной образовательной программы...
М.: Cisco, 2014. — 40 с. Содержание: Замшелые тренды. Облачные технологии Невидимые тенденции ИБ Теневые технологии Распределенность CERTы Проверки регуляторов Железный занавес Рост влияния ИБ внутри
Учебное пособие. — Самара: Самарский университет, 2018. — 92 с. — ISBN: 978-5-7883-1269-9. В данном пособии рассмотрены теоретические основания информационно-психологического противоборства, основные понятия, технологии и методы информационно-психологического воздействия. В учебное пособие включены планы семинарских занятий, тематика докладов (рефератов) и контрольных вопросов,...
Теплов Э.П., Гатчин Ю.А., Нырков А.П., Коробейников А.Г., Сухостат В.В. – СПб: Университет ИТМО, 2016. – 120 с.
Учебное пособие посвящено гуманитарным аспектам информационной безопасности. В основе работы лежит вывод о том, что информационными агрессорами в число важнейших атак включается подрыв понятийного логического мышления, которое является защитным барьером от многих...
Пер. с англ.: Экслер Алекс. ― М.: Et Cetera Publishing, 2004. ― 160 с. ― (Mенеджeр Mафии. Pуковoдcтва для Бoльшиx Босcoв). ― ISBN: 5-94983-030-Х. Ну да, ну да, я в курсе, что ты — Большой Босс. Что ты не делаешь сам те вещи, которые другие могут сделать за тебя, получив за это деньги. Поэтому ты не моешь свою машину, не ходишь сам по магазинам (за исключением бутиков и...
Syngress, 2017. — 267 p. — ISBN: 978-0-12-804629-6. This book provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and...
CRC Press, 2014. — 296 p. — ISBN10: 1482205394, ISBN13: 978-1-4822-0540-4. Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support...
CRC Press, 2019. — 350 p. The book is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry. The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored...
Elsevier Science, 2007. - 887 p. - ISBN: 0444516085
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
Packt Publishing, 2019. — 358 p. — ISBN: 978-1789531732. Get hands-on experience of using Burp Suite to execute attacks and perform web assessments Key Features Use tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp extensions to assist with various technologies commonly found in...
2nd Edition. — Jones & Bartlett Learning, 2023. — 500 р. — ISBN 978-1284251470. This text will provide you with an overview of information and cybersecurity and offer a summary of security topics that are addressed in more detail in the Jones & Bartlett Learning “New Information Systems Security & Assurance” series. Cybersecurity is an aspect of information security....
СПб.: Издательство С.-Петербургского университета, 1999. — 212 с. Учебное пособие подготовлено по материалам работ участников неформального инициативного творческого коллектива из числа сотрудников Санкт-Петербургского университета и Института проблем управления РАН (Москва). Основное внимание в нем уделено ключевым проблемам идеологии и методологии информационного управления:...
Amazon Digital Services LLC, 2018. — 1362 р. With new parts dedicated to such current subjects as Reasoning Protection, Cyber-Physical Protection, and Critical Facilities Protection, the book now has 100 sections written by leading experts in their areas, as well as 12 modified appendices and an extended guide. It continues its successful format of offering problem-solving...
2nd Edition. — O’Reilly Media, Inc., 2023. — 480 p. — ISBN 978-1-098-12068-9. Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber-threat...
IMPERVA Whitepaper. Авторство и выходные данные не приведены.
DDoS 101 – The Basics.
Building the Right DDoS Protection Strategy.
Responding To an Attack.
Post-Attack Steps.
DDoS Glossary.
Fullstack.io, 2020. — 131 p. — ISBN: n/a. Revision 7 – 2020-04-17 Most of the marketing employed by the security industry tends to rely on a bit of fear-mongering. It’s easy to sell sensationalism — to say that “everything is broken” and cause a sense of alarm and hopelessness. The goal of this book is not to impart fear, but knowledge. Informed individuals are less likely to...
Independently published, 2021. — 168 p. — ISBN B08Y8HDG27. The book is designed to introduce fundamental concepts of information systems security by providing you with an understanding of the importance of information security and several techniques of planning and managing information systems security methods, frameworks and ethics. The book provides details of key information...
Chapman and Hall/CRC, 2022. — 227 p. — (Chapman & Hall/CRC Cyber-Physical Systems). — ISBN 978-1-032-26526-1. The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of...
CRC Press, 2012. — 488 p. — ISBN: 1439862613, 9781439862612 With annual cost in excess of $150 billion from workplace related illnesses and injuries, any knowledge that can reduce this burden contributes to the overall welfare of the work force and business performance. Yet, there are many key areas of opportunities that have not yet been discussed in the literature, such as...
CreateSpace Independent Publishing Platform, 2018. — 176 р. Cyber Security has become an absolute necessity. Today no device can be connected to the Internet without proper security in place. Every year millions of users fall victim of malware and cyber attacks. How should we ensure our cyber security then? The best way to prevent an attack is to understand how the attack...
Издательство: Idea Group Reference; 2008. - 4145 с., english, ISBN10: 1599049376, ISBN13: 978-1599049373, Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information processing and management technologies. As technology continues to advance, the need for strong responses to these challenges, well centered on reliable...
Packt Publishing, 2013. — 142 p.
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Cuckoo Malware Analysis is a hands-on guide that will provide...
Packt, 2022. — 304 p. — ISBN 9781801070331. Memory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack....
Artech House, 2003. — 446 p. As magnetic stripe cards are being replaced by chip cards that offer consumers and businesses greater protection against fraud, a new standard for this technology is being introduced by Europay, MasterCard, and Visa (EMV). This cutting-edge, new book provides you with a comprehensive overview of the EMV chip solution and explains how this technology...
CRC press, 2022. - 524p. - ISBN: 0367374676 In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion...
Boca Raton, USA: CRC Press, Taylor & Francis Group, 2018. — 443 p. — ISBN: 1138054216. This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image...
CRC Press, 2013. — 244 p. — ISBN: 1439879095, 9781439879092 With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people. Managing Risk and Security in Outsourcing IT...
Elsevier, 2015. — 172 p.
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information Security Analytics dispels the myth that analytics within the information...
Morgan Kaufmann, 2009. — 878 p. — ISBN: 978-0-12-374354-1. Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including...
Morgan Kaufmann, 2013. — 1394 p. — ISBN13: 978-0-12394612-6. The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores...
Apress Media LLC., 2021. — 134 p. — ISBN: 978-1-4842-6903-9. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to...
Packt Publishing, 2013. — 324 p. — ISBN: 1849685967. На англ. языке. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. Enterprise...
Москва: КУДИЦ-Образ, 2004. — 512 с. — (Специалисту по компьютерной безопасности). Книга посвящена вопросам информационной безопасности при осуществлении электронных платежей. В книге рассматриваются архитектура существующих электронных платежных систем (ПС), типы электронных средств платежа. Характерной особенностью ПС является многообразие их устройства и принципов работы,...
Учебно-методическое пособие. — Минск: БГУИР, 2013. — 243 с. — ISBN: 978-985-488-811-8. В пособии рассмотрены правовые, организационные и технические методы защиты информации. Приводится описание технических каналов утечки информации и организационно-технического комплекса мер по предотвращению утечки информации посредством данных каналов. Рассмотрены инженерно-технические...
М.: Горячая линия. – Телеком, 213. — 216 с. — ISBN: 978-5-9912-0274-9. Рассмотрены технические аспекты управления информационной безопасностью (ИБ), включая управление логическим доступом пользователей к активам организации, управление защищенной передачей данных и операционной деятельностью, разработку и обслуживание информационных систем с учетом требований к их ИБ,...
Навчальний посібник. — Київ: Державний університет телекомунікацій, 2019. — 131 с. У навчальному посібнику розглянуто концептуальні засади інформаційної безпеки держави, зокрема наведено основні терміни й визначення у сфері інформаційної безпеки, з’ясовано сутність та класифікації національних інтересів та загроз інформаційній безпеці, відслідковано історію розвитку...
Учебное пособие. — Владимир: Владимирский государственный университет им. А.Г. и Н.Г. Столетовых (ВлГУ), 2023. — 212 с. — ISBN 978-5-9984-1783-2. Излагаются цели и задачи, подходы и методы, охватывающие основные теоретические и прикладные аспекты информационной безопасности в бизнесе, а также вопросы, связанные с освоением программных средств, используемых для преодоления...
6th Edition. — Black Dog Media, 2020. — 195 p. — ISSN: 2044-4060. We'll help you secure your computer, network and devices against threats and with easy to follow tutorials, help arm you against potential threats and attacks. For parents and guardians, we also cover looking out for your children when online, together with guides on how best to protect them and advice from...
Apress, 2024. — 518 p. — ISBN 979-8868804311, ASIN B0D3FYJWVQ. Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your...
De Gruyter, 2017. — 314 p. — (Advances in Computer Science). — ISBN10: 3110476045, 13 978-3110476040. The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies...
Packt Publishing, 2017. — 350 p. — ISBN: 978-1787288683. Digital Forensics and Incident Response will guide you through the entire spectrum of tasks associated with incident response, starting with preparatory activities associated with creating an incident response plan and creating a digital forensics capability within your own organization. You will then begin a detailed...
Springer, 2015. — 453 pp. This book presents the research work done under the auspices of the ARES Project (CSD2007-00004). ARES, which stands for Advanced Research in Privacy and Security, has been one of the most ambitious research projects on computer security and privacy funded by the Spanish Government. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a...
6th Edition. — Addison-Wesley/Pearson, 2024. — 1026 р. — ISBN-13: 978-0-13-789121-4. The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing. Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information...
CRC Press, 2018. — xiv+962 p. — ISBN: 978-1-1385-6384-1. This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application examples in fields including...
Apress, 2017. — 76 p. — ISBN13: 978-1-4842-2834-0. Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This...
CRC Press, 2016. — 406 p. — ISBN: 978-1482236880. Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not...
Boca Raton: CRC Press, 2021. — 252 p. — ISBN 9780367486129. Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods....
Apress, 2020. — 241 p. — ISBN13: 978-1-4842-5607-7. Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you...
No Starch Press, Inc., 2024. — 416 р. — ISBN 13: 978-1098168780. Welcome to the world of locksport, the sport of defeating locks. Whether you’re new to the challenge of lockpicking or aiming for championship gold, this book serves as your definitive guide, packed with practical advice from a team of experts. DIVE INTO THE ESSENTIALS WITH LOCKSPORT FOUNDATIONS How various locks...
3rd edition. — Cengage Learning, 2021. — 406 p. — ISBN 978-0-357-50832-9. Learn how to identify vulnerabilities within computer networks and implement countermeasures that mitigate risks and damage with Whitman/Mattord's Principles of Incident Response & Disaster Recovery, 3rd Edition. This edition offers the knowledge you need to help organizations prepare for and avert system...
Электронное учебное издание. — М.: МГТУ имени Н.Э. Баумана, 2013. — 108 с.
Издание содержит методы и модели противодействия компьютерным атакам, предусмотренные учебным планом МГТУ им. Н.Э.Баумана. Изложен обобщенный метод распознавания компьютерных атак. Представлены алгоритм и модель динамических процессов противодействия компьютерным атакам. Рассмотрены методы...
Лекция заместителя руководителя ФСТЭК в СЗФО Шведа Виктора Григорьевича Академика академии Геополитических наук Академик РАВН Член-корреспондента РАЕН доктора технических наук ВУЗ ИТМО г. Санкт-Петербург 2014 г. В лекции рассматриваются вопросы классификации информации, управления её активами, и ответственность должностных лиц хозяйствующих субъектов
AARP, 2019. — 263 p. Former con artist and bestselling author of #1 New York Times bestseller "Catch Me If You Can" Frank Abagnale shows you how to stop scammers in their tracks. In this book, author reveals the latest tricks that today's scammers, hackers, and con artists use to steal your money and personal information--often online and over the phone. Using plain language...
Independently published, 2020. — 83 p. — ISBN10: 1670903036, 13 978-1670903037. This book has been written in a way that makes it easy for you to understand this very important subject in today’s world. If you’re a beginner, then this is the book for you. The world is increasingly heading in a digital direction and automation is now becoming the norm; this means that...
O’Reilly Media, 2017. — 268 p. — ISBN: 978-1491960387. — conv. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a...
2nd ed. — Addison-Wesley Professional, 2018. — 2865 p. — ISBN13: 978-0-321-71233-2. The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer...
3rd Edition. — Prentice Hall, 2012. — 689 p. — ISBN10: 0132145359; ISBN13: 978-0132145350. A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace. This edition is more...
2nd. ed. - John Wiley & Sons, 2021. - 690 p. - ISBN 1119582423. A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field. As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure...
Gistrup (Denmark): River Publishers, 2022. — 323 p. — (River Publishers Series in Digital Security and Forensics). — ISBN 9788770224079. Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure...
McGraw-Hill Education, 2010. — 396 p. ISBN10: 0071713409 ISBN13: 978-0071713405 IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those...
Manning Publications, 2024. — 337 p. — ISBN 9781633438224. Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine Learning teaches you how to apply cutting...
CRC Press, 2023. — 330 p. — ISBN 978-1-032-36159-8. The book Software Security: Concepts and Practices aims to build software security principles and techniques that will assist developers in detecting and measuring security early in the software development life cycle, resulting in secure software. It is clear that security issues arise as a result of a lack of built-in...
O’Reilly, 2013. — 164 p. Who Should Read This Book The main audience of this book are system operators, those who fight the daily battle of delivering the best performance at lowest cost as well as those who use monitoring as a means and not an end. Read it if you work extensively with monitoring and plan alerting configurations. If keeping high availability and continuity of...
Addison-Wesley Professional/Pearson Education, 2021. — 751 p. — (Final). — ISBN-13 978-0-13-561985-8. Современный центр управления безопасностью: люди, процессы и технологии для оказания услуг SOC The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services. This completely new, vendor-neutral guide brings together all the knowledge you need to...
Springer, 2014. — 147 p. Contemporary science is clearly interdisciplinary in nature. Combining the knowledge and scientific experience gained in independent research domains and areas now allows new and astounding solutions to be developed. These, thanks to the development of computational techniques and computer infrastructure, make it possible to execute tasks which were...
O’Reilly Media, 2017. — 284 p. — ISBN: 978-1-491-93494-4. True PDF Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this...
Packt Publishing, 2024. — 238 p. Key Features: Prepare to participate in a bug bounty program Discover your first bug and claim your reward upon successful detection Go through core security concepts as well as advanced techniques for vulnerability identification Book Description: Bug bounty programs help to enhance cybersecurity by incentivizing ethical hackers to discover...
O’Reilly Media, Inc., — 2009. — 260 p. — ISBN: 978-0-596-52302-2. If you think computer security has improved in recent years, «The Myths of Security» will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and...
Ростов-на-Дону; Таганрог: Южный федеральный университет, 2020. — 173 с. Пособие содержит описание основных понятий информационной безопасности; угроз и уязвимостей информационных систем; стандартов защиты данных; методов и средств аутентификации, контроля доступов; политик и моделей безопасности; технической защиты информации; организационно-правового обеспечения информационной...
Учебное пособие для студентов специальности «Искусственный интеллект» специализации «Интеллектуальные компьютерные технологии защиты информации». — В 3-х частях. — Минск: БГУИР, 2005. — 86 с. Учебное пособие написано по материалам лекций, практических и лабораторных работ, проводимых для студентов БГУИР, в рамках учебных курсов «Теоретические основы защиты информации»,...
Минск : БГУИР, 2017. — 100 с. — ISBN: 978-5-905392-07-8. Рассмотрены роль и место информационно-психологической безопасности в современном обществе, дана классификация угроз информационно-психологических воздействий на общество и методов противодействия их реализации, включая вопросы государственного регулирования в сфере обеспечения социально-психологической информационной...
Cham: Springer, 2022. — 548 p. This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and...
Mohiuddin Ahmed, Abu S.S M. Barkat Ullah, Al-Sakib Khan Pathan. — CRC Press, 2020. — 273 p. — ISBN13: 978-0-367-44092-3. Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber...
Packt Publishing, 2024. — 252 p. Key Features: Benefit from a holistic approach and gain practical guidance to align security strategies with your business goals Derive actionable insights from real-world scenarios and case studies Demystify vendor claims and make informed decisions about cybersecurity solutions tailored to your needs Book Description: If you are a...
Manning Publications, 2022. — 384 p. — ISBN-13 978-1617298998. Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy...
CRC Press; Auerbach Publications, 2017. — 203 p. This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and...
Sybex, John Wiley & Sons, Inc., 2021. — 307 p. — ISBN 978-1-119-75546-3. полное руководство по подготовке к экзамену CIPP / US Your ultimate guide to preparing for the CIPP/US exam. The IAPP CIPP / US Certified Information Privacy Professional Study Guide is your one-stop resource for complete coverage of the challenging CIPP/US exam. This Study Guide covers 100% of the CIPP/US...
London: Rowman & Littlefield Publishers, 2022. — 192 p. — ISBN 1538155087. Sheds light on the ability to hack AI and the technology industry’s lack of effort to secure vulnerabilities . We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is...
Springer, 2021. — 305 p. — (Algorithms for Intelligent Systems). — ISBN 978-981-15-8710-8. This book is a collection of outstanding content written by experts working in the field of multimedia security. It provides an insight about various techniques used in multimedia security and identifies its progress in both technological and algorithmic perspectives. In the contemporary...
Springer, 2025. — 416 p. — (Advances in Information Security 91). — ISBN 978-3-031-66244-7. This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpacking real-world malware and dissecting...
Springer, 2020. — 957 p. — ISBN: 978-3-030-22276-5. This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to...
CRC Press, 2010. — 568 p. — 2nd ed. — ISBN: 1439815453, 9781439815458 Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective...
John Wiley & Sons, 2024. — 400 р. — ISBN 13: 978-1394222544. It is commonly understood that social engineering is one of the biggest challenges modern society faces. Highly orchestrated social engineering campaigns target corporate workers with credential harvesting attacks, wire fraud, and business opportunity scams. It even plagues our personal lives, from calls about your...
American Mathematical Society, 2019. — 344 p. — (Pure and applied undergraduate texts 40). — ISBN: 9781470450557. This book provides a compact course in modern cryptography. The mathematical foundations in algebra, number theory and probability are presented with a focus on their cryptographic applications. The text provides rigorous definitions and follows the provable...
CRC Press, 2013. — 222 p. — ISBN: 9781439850572
Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains how to secure the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. With comprehensive...
Springer, 2019. — 665 p. — (Computer Communications and Networks). — ISBN 978-3-319-73511-5. Руководство по автомобильной связи и кибербезопасности: тенденции, технологии, инновации и приложения This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and...
Addison-Wesley, 2021. — 1501 p. — ISBN 9780135619773. This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The...
Packt Publishing, 2024. — 494 p. — ISBN: 978-1803235844. Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it requires both upskilling and a fundamental shift in the way you view cybersecurity altogether. Cybersecurity Architect’s Handbook is an all-encompassing guide, introducing the essential skills for aspiring CSAs, outlining a path for...
Elsevier, 2018. — 203 p. — ISBN: 978-0-12-811818-4. Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port...
Springer, 2010. — 425 p. — ISBN: 978-3-642-14451-6. Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal...
7th edition. — Buttwrqorth-Heinemann, 2020. — 392 p. — ISBN: 978-0128147948. Effective Security Management, Seventh Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald and Curtis Baillie bring common sense, wisdom and humor to this bestselling introduction to security management. For...
Amazon Digital Services LLC, 2015. — 28 p. — ASIN: B019U17G06 A virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the computer system. This will cause the computer to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted. What Is...
New York: Springer, 2016. — 194 p. This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of...
Pragmatic Bookshelf, 2019. — 144 p. — ISBN10: 168050634X, 13 978-1680506341. Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have...
Учебное пособие. — М.: Российский университет транспорта (МИИТ). 2018. — 106 с. В учебном пособии изложены методы анализа подлинности изображения. Отдельный раздел посвящен методам стеганографической защиты информации с использованием графических контейнеров. Учебное пособие содержит примеры реализации и практического применения методов встраивания и извлечения секретной...
Монография. — М.: Буки Веди, 2019. — 160 с. — ISBN: 978-5-4465-2493-8. Настоящее монографическое исследование посвящено вопросам информационной безопасности медиаорганизации в информационно-сетевой экономике XXI века. В работе рассмотрены теоретические и методологические основы разработки стратегии информационной безопасности медиаорганизации. Особое внимание авторами уделено...
М.: Энергия, 2010. — 238 с. В словаре приводится около 2000 терминов, встречающихся в новейшей литературе, посвященной информационной безопасности технических средств различного назначения. Содержатся статьи (определения), посвященные проблемам защиты промышленной и коммерческой информации, обеспечения информационной безопасности военных средств и техники народнохозяйственного...
2-е изд. — Новосибирск: Новосибирский государственный университет (НГУ), 2020. — 306 с. Представлен курс лекций «Проблемы безопасности в информационных технологиях», читаемый магистрантам физического факультета НГУ. Лекции могут быть использованы при обучении студентов других технических факультетов. Цель представленного материала — попытка охватить по возможности все аспекты...
М.: ИМЭПИ РАН, 2006. — 234 с. : ил., табл. — ISBN: 5-89519-134-7. Курс лекций для студентов специальности 220100. Издание 2-е. Издание содержит главы: в книге изложены основные методы атак на компьютеры и сети; методы защиты от них. Рассмотрены основные задачи и возможности криптографии, приведены примеры современных алгоритмов. Отсканировано, на каждом листе по 2 страницы.
Юбилейный: Инфосистемы Джет, 2015. — 12 с.
Форум «Информационная безопасность банков»
Содержание:
аутсорсинг ИБ
Что же такое аутсорсинг
Зачем передают на аутсорсинг
Новосибирск : СибГУТИ, 2021. — 89 с. Материал пособия содержит основные термины и определения предметной области защиты информации, дает описание некоторых технологий, способов и механизмов защиты информации в инфокоммуникационных системах. Издание будет полезно для студентов, обучающихся по укрупненным группам специальностей и направлений 10.00.00 «Информационная безопасность»...
СПб.: Изд-во СПбГЭУ, 2017. — 65 c. В учебном пособии представлены основные положения теории информационно-психологического воздействия на человека (группу людей), рассматривается история изучения воздействия СМИ, примеры манипуляции сознанием, предлагается формальная теория, позволяющая обнаруживать скрытое манипуляционное воздействие. Предназначено для направления подготовки...
Лекция заместителя руководителя ФСТЭК в СЗФО Шведа Виктора Григорьевича Академика академии Геополитических наук Академик РАВН Член-корреспондента РАЕН доктора технических наук ВУЗ ИТМО г. Санкт-Петербург 2014 г. В лекции рассматриваются вопросы обеспечения информационной безопасности при приёме на работу новых сотрудников, организации работы с сотрудниками по вопросам...
CRC Press, 2021. — 235 p. — ISBN 9780367334390. This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT security and privacy issues. This...
2nd Edition. — O’Reilly Media, Inc., 2024. — 417 p. — ISBN 978-1-098-12724-4. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook...
2nd Edition. — O’Reilly Media, Inc., 2024. — 417 p. — ISBN 978-1-098-12724-4. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook...
Springer, 2021. — 250 p. — ISBN 978-3-030-69173-8. This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities,...
CRC Press, 2023. — 189 p. — ISBN 978-1-032-20608-0. What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once...
Cisco, 2017. — 110 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
Addison-Wesley Professional/Pearson Education, 2024. — 448 p. — (Final) — ISBN-13 978-0-13-807373-2. An all-encompassing guide to securing your database andapplications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified databaseadministrators and software professionals. Hackers are...
Apress, 2016. — 181 p. — ISBN10: 148422180X. — ISBN13: 978-1484221808. Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for...
John Wiley & Sons, Inc., 2015. — 480 p. — ISBN: 1118987055. The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and...
McGraw-Hill Education, 2015. — 416 p. — ISBN13: 978-0071846776. Minimize risk, protect corporate assets, and avoid catastrophic cybersecurity incidents by adopting a program philosophy that stresses the human element of security. People-Centric Security: Transforming Your Enterprise Security Culture shows, step-by-step, how to analyze and articulate your organization’s cultural...
IT Governance Publishing, 2022. – 206 p. – ISBN 978-1-78778-367-6. This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu’s The Art of War. So why is the reporting of cyber attacks so low? Why...
Wiley, 2022. — 287 p. — ISBN-13 9781119895183. Если Это Сообразительно, Это Уязвимо Reimagine the future of the internet All our devices and gadgets—from our refrigerators to our home security systems, vacuum cleaners, and stereos—are going online, just like our computers did. But once we’ve successfully connected our devices to the internet, do we have any hope of keeping...
India: Vayu Education of India, 2022. — 389 p. This Computer Based Numerical and Statistical Techniques Book Covers Each And Every Topic Of The Core Computer Based Numerical and Statistical Techniques. With The Help Of This Book, You Can Learn Techniques Very Easily, You Don't Need To Learn Computer Based Numerical and Statistical Techniques The Hard Way. This Is One Of The...
John Wiley & Sons, Inc., 2025. — 416 p. — ISBN: 978-1394171705. Unlock the power of secure coding with this straightforward and approachable guide! Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples,...
Manning Publications, 2023. — 83 p. Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine Learning teaches you how to apply cutting edge ML to identify fraud,...
Chapman and Hall/CRC, 2013. — 239 p. — ISBN 9781032069753. Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. This book is aimed primarily...
Packt Publishing, 2023. — 198 p. Key Features: Get to grips with QRadar architecture, components, features, and deployments Utilize IBM QRadar SIEM to respond to network threats in real time Learn how to integrate AI into threat management by using QRadar with Watson This comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat...
Third Edition. — CyberEdge Group, LLC, 2020. — 164 p. Security intelligence is the most powerful weapon defenders have against their adversaries. The latest edition of our popular book paints a clear picture of security intelligence, as well as actionable guidance for disrupting the threat actors targeting your organization right now — and in the future. "The Security...
Springer, 2016. — 216 p. — (Springer Topics in Signal Processing). — ISBN10: 9811020949. — ISBN13: 978-9811020940. This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent...
Cham: Springer International Publishing, 2018. — 377 p. — ISBN: 978-3-319-76451-1. In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data...
Springer, 2010. — 248 p. — (Advances in Information Security 49). — ISBN: 978-1-4419-7132-6. Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior...
Springer, 2019. — 819 p. — ISBN: 3030299589. The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in...
Springer, 2019. — 640 p. — ISBN: 3030299619. The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-11382-7. Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our...
Springer, 2023. — 356 p. — ISBN 978-3-031-19184-8. This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to...
Payhip.com, 2019. — 212 p. Do you like hacking ? Do you like security ? Do you want to make a living doing what you love? Do you want to find vulnerabilities and get paid to do so? If you answered YES to any of these questions then this book is for you. The sole purpose of this book is to teach you the skills needed to successfuly make a living hunting for vulnerabilities and...
Springer, 2017. — 279 p. — (Studies in Big Data). — ISBN10: 331957356X, ISBN13: 978-3319573564. This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background),...
CRC Press, 2024. — 310 p. — ISBN-13: 978-0815382386. Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and...
Wiley-ISTE, 2022. — 201 p. — (Computer Engineering Series). — ISBN 1786307553. This book serves as a guide to help the reader develop an awareness of security vulnerabilities and attacks , and encourages them to be circumspect when using the various computer resources and tools available today. For experienced users, Computer Science Security presents a wide range of tools to...
Монография. — М.: Буки Веди, 2019. — 160 с. — ISBN: 978-5-4465-2491-4. Настоящее монографическое исследование посвящено вопросам информационной безопасности медиаорганизации в современных условиях. В работе рассмотрены теоретические и методологические основы разработки стратегии информационной безопасности организации. Особое внимание авторами уделено проведению аудита...
М.: ДМК Пресс, 2013. — 656 с. — ISBN: 9785940748854 Книга представляет собой курс компьютерной вирусологии, посвященный подробному рассмотрению феномена саморазмножающихся программ. Содержит неформальное и формальное введение в проблему компьютерных вирусов, описание принципов их работы, многочисленные примеры кода, методики обнаружения и удаления, а также лежащие в основе этих...
Пер. с англ. – М.: Компания АйТи: ДМК Пресс: ТЕТРУ, 2004. — 552 с. Автор: Райан Рассел, Марк Мерков, Робин Уолшоу, Тери Бидвел, Майкл Кросс, Оливер Стойдлер, Кевин Цайсе. Безопасность в виртуальном мире Internet - более запутанная вещь, чем безопасность в обычном ее понимании. Даже несмотря на то, что программное обеспечение постоянно модернизируется, специалисты утверждают:...
Учебное пособие к выполнению курсовой работы. — Владимир: Владимирский государственный университет им. А.Г. и Н.Г. Столетовых (ВлГУ), 2023. — 235 с. — (Комплексная защита объектов информатизации. Кн. 35). — ISBN 978-5-9984-1791-7. Изложен систематизированный материал для написания курсовой работы в рамках учебного курса «Управление информационной безопасностью», посвященный...
СПб.: Питер, 2021. — 336 с.: ил. — (Бестселлеры O’Reilly). — ISBN 978-5-4461-1786-4. Среди огромного количества информации по сетевой и ИТ-безопасности практически не найти книг по безопасности веб-приложений. Познакомьтесь на практике с разведкой, зашитой и нападением! Вы изучите методы эффективного исследования и анализа веб-приложений, даже тех. к которым нет прямого...
Учебное пособие по курсу «Информационно-аналитические системы и модели». — Ростов-на-Дону; Таганрог: Южный федеральный университет, 2017. — 127 с. — ISBN 978-5-9275-2588-1. В работе рассматриваются вопросы внедрения и применения информационных технологий в процессы расследования финансовых махинаций в сфере торговли и социальных сетях. В работе акцентируется внимание на...
Учебное пособие. — Саратов: СГУ, 2012. — 32 с. В учебном пособии раскрыты основные термины и определения в области защиты информации, рассмотрены виды уязвимости информации, причины и условия образования каналов утечки информации и способы их нейтрализации. Теоретические основы защиты информации. Основные концептуальные положения системы защиты информации. Концептуальная модель...
Springer, 2025. — 328 p. — ISBN 978-981-96-0554-5. Образование и обучение кибербезопасности This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The...
Packt Publishing, 2024. — 240 p. Key Features: Create automated CI/CD pipelines for testing and implementing threat detection use cases Apply implementation strategies to optimize the adoption of automated work streams Use a variety of enterprise-grade tools and APIs to bolster your detection program Book Description: Today's global enterprise security programs grapple with...
O’Reilly Media, Inc., 2024. — 200 р. — ISBN-13: 978-1-098-13370-2. Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as...
Elsevier, 2015. — 46 p. How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end...
Springer, 2025. — 381 p. This book highlights a collection of state-of-the-art research on Safe Artificial General Intelligence (AGI), highlighting the crucial role of cybersecurity, smart applications, and sustainable technologies in ensuring a secure AI future. It illustrates the latest trends in AI safety, exploring the potential risks and dangers associated with AGI...
Syngress, 2006. — 662 p. — ISBN 1-59749-997-8, 978-1-59749-997-2. Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding...
Springer, 2020. — 290 p. — ISBN: 3030420507 This book constitutes the refereed post-conference proceedings of the Second International Workshop on Information & Operational Technology (IT & OT) security systems, IOSec 2019 , the First International Workshop on Model-driven Simulation and Training Environments, MSTEC 2019, and the First International Workshop on Security for...
3rd edition. — Jones & Bartlett Learning, 2022. — 550 p. — ISBN 9781284207811. Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are...
Apress, 2021. — 230 p. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a...
The Institution of Engineering and Technology, 2023. — 453 p. The role of data and information and communication technology (ICT) is growing in all areas of transport, with autonomous vehicles among the most advanced examples. This opens up opportunities for malevolent interference, such as remote-control of vehicles for criminal or terrorist purposes or interruption of...
Springer, 2024. — 516 p. This textbook provides an all-in-one approach for learning about hardware security of cryptographic systems. It gives the necessary background on mathematics that is used for the construction of symmetric and public-key cryptosystems. Then, it introduces the most commonly used encryption algorithms that can be found on a wide variety of embedded devices...
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68735-1. Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
Springer, 2013. — 447 p.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and...
Apress Media LLC., 2024. — 179 p. — ISBN-13: 979-8-8688-0869-2. In today’s digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all...
Springer, 2019. — 62 p. — ISBN: 978-3-030-28568-5. In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The book will be interesting for computer security...
No Starch Press, 2020. — 800 p. — ISBN: 9781718500648. Volume 3 of the PoC || GTFO collection–read as Proof of Concept or Get the Fuck Out–continues the series of wildly popular collections of this hacker journal. Contributions range from humorous poems to deeply technical essays bound in the form of a bible. The International Journal of Proof-of-Concept or Get The Fuck Out is...
Wiley, 2025. — 261 p. — ISBN 1394217277. Understand the fundamentals of network coding from an engineering perspective with this accessible guide Network Coding is a method of increasing network throughput and efficiency by encoding and decoding transmitted data packets instead of simply forwarding them. It was mainly a body of information theory until the rise of random linear...
Packt Publishing, 2018. — 510 p. — ISBN: 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical...
Packt Publishing, 2020. — 378 p. — ISBN 9781789806298. Build a resilient network and prevent advanced cyber attacks and breaches Key Features - Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats - Prevent cyber attacks by using robust cybersecurity strategies - Unlock the secrets of network security Book Description With advanced...
Springer, 2015. — 193 p.
This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC...
Wiley, 2023. — 354 p. Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a...
Packt Publishing, 2023. — 430 p. Key Features: Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systems Develop advanced open source intelligence capabilities to find sensitive information Explore automated reconnaissance and vulnerability assessment tools to profile systems and networks Book Description: This book explores...
University Of Chicago Press, 2007. — 274 p. Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes...
Payhip.com, 2020. — 250 p. The first version of the Bug Bounty Playbook I went over the recon and fingerprinting phase. This version is all about the exploitation phase. I show you exactly how I go about exploiting fortune 500 companies, start ups, and everything else inbetween. If you havnt already make sure to read the first version of the book where I discuss the recon and...
Packt, 2024. — 270 p. — ISBN 183763503X. Venture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructure. This book will help you get to grips with core infrastructure cybersecurity concepts through real-world accounts of common assaults on critical infrastructure. - You'll gain an understanding of vital systems, networks, and assets...
2nd Edition. — Apress Media LLC., 2024. — 289 p. — ISBN: 979-8-8688-0344-4. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your...
Artech House, 2009. — 259 p. — ISBN: 1596931906, 9781596931909
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning...
Учебное пособие. — Челябинск: ФГБОУ ВО «Южно-Уральский государственный гуманитарно-педагогический университет», 2023. – 122 с. — ISBN 978-5-93162-774-4 Учебное пособие включает в себя кейсы по информационной безопасности. Кейсы сгруппированы по критериям возможных вариантов их решения: от самых общих подходов и организационно-правовых мер до исследовательских и эвристических...
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
Geneva (Switzerland): IEC, 2021. — 86 с. (ru) Поскольку все больше устройств интегрируется в процессы автоматизации производства и материально-технического обеспечения, а также в процессы мобильности и оказания медицинской помощи, повышается необходимость обеспечения безопасных процедур для людей, работающих с такими устройствами. Интернет вещей (IoT), Большие данные (Big...
Учебник по информационно-аналитической работе. — М.: Яуза, 2001. — 318 с. В учебнике рассматривается широкий круг проблем по работе с разными по форме и содержанию источниками информации, обеспечению процесса подготовки и ведения информационно-аналитической работы. Подробно раскрываются основные понятия, выбор методов исследования, структура и содержание этапов информационной и...
Учебное пособие. — Владимир: Владимирский государственный университет им. А.Г. и Н.Г. Столетовых (ВлГУ), 2023. — 367 с. — ISBN 978-5-9984-1611-8. Представлен систематизированный материал по основам планирования экспериментов, обработке и анализу экспериментальных данных в задачах управления показателями информационной безопасности информационных систем в условиях противостояния...
СПб.: Питер, 2008. — 320 с.: ил. — ISBN 978-5-91180-855-6. Книга предназначена для директоров и специалистов IT-департаментов и отделов IT-безопасности, руководителей предприятий. Подробно изложены суть угроз внутренней IT-безопасности и существующие способы защиты от этих угроз. Таким образом, используя представленный в книге материал, читатель сможет на практике значительно...
Воронеж: Воронежский институт МВД России, 2008. — 163 с.
Даётся математическое описание моделей информационных процессов, определяющих безопасность социальной системы: прогностические модели динамики криминальных процессов, динамики электоральных процессов, имитационная модель формирования массового поведения.
Для специалистов и преподавателей высших учебных заведений в...
Учебное пособие. — Красноярск: Красноярский государственный аграрный университет, 2018. — 188 с. Охватывает теоретический и практический курс учебной дисциплины «Информационные технологии обеспечения конфиденциальности и сохранности данных». Проблема обеспечения информационной безопасности рассмотрена на различных уровнях. Значительное внимание уделено основным угрозам...
O’Reilly Media, 2024. — 223 p. Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many...
Springer, 2016. — 629 p. 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented...
O’Reilly Media, 2017. — 268 p. — ISBN: 978-1491960387. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101...
2nd ed. — O’Reilly Media, 2024. — 358 p. — ISBN 1098127242. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools,...
Published by John Wiley & Sons, Inc., 2019. — 305 p. Essays on security and privacy topics that are ripped from today’s headlines We Have Root is the latest collection of essays by security and privacy expert Bruce Schneier. He explores a wide range of cybersecurity, privacy, and real-world security issues that are as current as today’s headlines. Written in clear and...
O’Reilly Media, 2016. — 75 p. — ISBN: 1491952121. — ISBN13: 978-1491952122. Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical...
Apress, 2024. — 611 p. — ISBN 9798868805059. This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls , which are vital actions for protecting organizations...
Oxford: Oxford University Press, 2022. — 259 p. A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand...
Chapman & Hall/CRC Press, 2011. — 356 p. The book has four parts. Part I discusses the fundamentals of privacypreserving data publishing. Part II presents anonymization methods for preserving information utility for some specific data mining tasks. The data publishing scenarios discussed in Part I and Part II assume publishing a single data release from one data holder. In...
Apress, 2023. — 253 p. — ISBN 979-8-8688-0255-3. Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure...
No Starch Press, 2021. — 376 p. — ISBN 978-1-7185-0187-4. A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial...
Zed Books, 2019. — 288 p. — ISBN: 978-1786995353. Once little more than a glorified porn filter, China’s ‘Great Firewall’ has evolved into the most sophisticated system of online censorship in the world. Even as the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and any attempts to organize outside the official Communist Party are...
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68739-9 (ebk). Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
CRC Pres, 2011. — 340 p. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens,...
CRC Press, 2024. — 350 p. — ISBN 978-1032628356, 1032628359, ASIN B0CW3HSVR8. This book delves into the very core of our digital existence, unearthing the essence of a digital persona. It's a realm where authenticity meets multiplicity, as we decipher the nuanced art of crafting and managing our online identities. We confront issues of privacy and ethics, exploring the profound...
Geneva (Switzerland): IEC, 2021. — 86 p. As more and more machines are integrated into the factory automation and logistic automation, mobility and healthcare processes, the need to ensure safe procedures for people working with machines is increasing. The Internet of Things (IoT), big data, advanced robotics and especially artificial intelligence (AI) are all transforming the...
Springer, 2020. — 270 S. Dieses Buch behandelt das Management der Informationssicherheit auf der Basis der Norm ISO/IEC 27001. Mit der 2. Auflage wurden die Inhalte des Fachbuches umfassend aktualisiert und den Neuerungen der Norm angepasst. Die Autoren erläutern kompetent den Standard und seine organisatorisch-technische Umsetzung. Dies betrifft die Anforderungen an das...
CRC Press, 2021. — 238 p. — ISBN 978-0-367-70217-5. It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more...
World Scientific Publishing, 2023. — 343 p. — (World Scientific Series in Digital Forensics and Cybersecurity: Volume 2). — ISBN 9789811273193. Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will...
Leanpub, 2017. — 167 p. The Mobile Security Testing Guide (MSTG) Summit Preview is a proof-of-concept for an unusual security book. It is the result of an open, crowd-sourced effort, made of the contributions of dozens of authors and reviewers from all over the world. With the MSTG, we aim to create best practices for mobile security, along with a comprehensive set of security...
Addison-Wesley, 2021. — 1501 p. — ISBN 9780135619773. The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible....
Leanpub, 2020. — 161 p.— ISBN 1670062449, 9781670062444. As software engineers, we often think of security as an afterthought: build it, then fix it later. Truth is, knowing a few simple browser features can save you countless hours banging your head against a security vulnerability reported by a user. This book is a solid read that aims to save you days learning about security...
Apress Media LLC, 2024. — 213 p. — ISBN-13: 979-8-8688-0460-1. This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it...
6th Edition. — Addison-Wesley/Pearson, 2024. — 1417 р. The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing. Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core...
Wiley-IEEE Press, 2023. — 387 p. — ISBN 9781119875406. 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and...
Kogan Page Business Books, 2005. — 224 р. — ISBN: 978-0749444259. Published in association with the Institute of Directors* Provides effective strategies for managing online risks and defenses against them * "Best practice" advice from leading advisers and case studies from successful firms * Case studies from successful firms* Of interest to managers in organizations of all...
O’Reilly Media, 2017. — 173 p. — ISBN10: 1491917628, 13 978-1491917626. Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management...
CRC Press, 2024. — 210 p. — ISBN 978-1-032-52769-7. Intelligent Approach to Cyber Security provides details on the important cyber security threats and its mitigation and the influence of Machine Learning, Deep Learning and Blockchain technologies in the realm of cyber security. As the internet is a very open and unprotected method of communication, it has attracted numerous...
Springer, 2023. — 144 p. — ISBN 978-3-031-24215-1. This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the...
Mercury Learning and Information, 2021. — 468 p. — ISBN 978-1-68392-682-5. This book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy...
Apress Media LLC, 2024. — 559 p. — ISBN-13: 979-8-8688-0798-5. Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to...
Citrix.com, 2013. — 12 p.
(Автор и выходные данные не указаны).
This paper describes how desktop virtualization can help regain control and reduce risk without sacrificing business productivity and growth.
New ways of working call for new ways of managing risk. Mobility, flexwork, Bring-Your-Own Device (BYOD) and increased collaboration across organizations have changed the...
3rd edition. — Morgan Kaufmann, 2017. — 1724 p. — ISBN: 978-0-12-803843-7. Computer and Information Security Handbook, Third Edition provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the...
Apress, 2022. — 375 p. Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the...
(NATO Science for Peace and Security) IOS Press. 2007. — 107 pages. ISBN: 1586037560 Von Knop Jan, Salnikov Alexey A., Yaschenko Valeriy V. (Editors). For the last years there are tendencies of growing numbers of cyber attacks and the scale of casualties has been growing as well. Cyber attacks against critically important segments of informational infrastructure including the...
Cambridge University Press, 2018. — 219 p. — ISBN: 978-1-107-18600-2. It seems like there is no such thing as privacy anymore. But the truth is that privacy is in danger only because we think about it in narrow, limited, and outdated ways. In this transformative work, Ari Ezra Waldman, leveraging the notion that we share information with others in contexts of trust, offers a...
No Starch Press, 2025. — 376 p. — ISBN-13: 978-1-7185-0379-3. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these...
Routledge; Taylor & Francis, 2024. — 183 р. — ISBN: 978-1032524498. The field of cybersecurity and cybercrime is a critical and rapidly evolving area of study. As our society becomes more and more reliant on technology, the risks of cybercrime increase. This book provides a comprehensive introduction to the field, covering both cybercrime and cybersecurity. The book starts by...
Springer, 2018. — 187 p. — ISBN10: 3319779648, ISBN13: 978-3319779645. With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and...
Monograph. — Kharkiv, Ukraine: PC Technology Center, 2021. — 176 p. — ISBN 978-617-7319-31-2. The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing...
Учебное пособие. — СПб.: Балтийский государственный технический университет (БГТУ) имени Д.Ф. Устинова "Военмех", 2019. — 113 с. — ISBN 978-5-907054-82-0. Описываются различные методы защиты компьютерной информации, приводятся классификация угроз и систем обнаружения атак, модели шифрования и сетевой защиты. Предназначено для студентов технических вузов в качестве курса при...
Москва: Изд. Дом НИТУ МИСиС, 2018. — 31 с. — ISBN 978-5-906053-53-7. В учебном пособии рассмотрены вопросы зашиты информации в компьютерных сетях. Изучено одно из направлений защиты - защита от вирусов, классификация вирусов и антивирусов и их использование для защиты информации. Рассмотрено второе направление зашиты информации, касающееся защиты при передаче информации по...
Навчальний посібник. –Київ:Державнийуніверситет телекомунікацій, 2020.- 126 с. В умовах конкурентної боротьби на міжнародному ринку масштаби промислової розвідки різко зростають. Все ширше використовуються плоди науково-технічного прогресу. Промислова розвідка стає більш гнучким і витонченим засобом отримання інформації. Держава своїми законами і підзаконними актами визначила...
М.: Cisco, 2014. — 33 с.
Научно-практическая конференция «РусКрипто’2014»
Содержание:
"Глупые" устройства в корпоративной сети
Как идентифицировать устройства
NAC
IDS/IPS
Обнаружение аномалий
М.: ВМиК МГУ, 2014. — 10 с.
Научно-практическая конференция «РусКрипто’2014»
Содержание:
Бытовое представление IoT
Технологическое представление IoT
Примеры из IoT
Технологии IoT, подробнее
Навчальний посібник. – Київ : КПІ ім. Ігоря Сікорського, 2020. – 78 с. Викладено основні поняття сучасного підходу до інформаційної безпеки та захисту даних в комп’ютерних технологіях і мережах. Наведено моделі загроз інформації та основні механізми і протоколи її захисту. Викладено математичні засади криптографічного перетворення даних та, засновані на теорії чисел,...
Учебно-методическое пособие. — Воронеж: Воронежский институт МВД России, 2008. — 121 с.
В учебно-методическом пособии, разработанном на основании действующего федерального законодательства и ведомственных нормативно-правовых актов, рассматриваются проблемы защиты персональных данных в оперативно-розыскной деятельности.
Предназначено для преподавателей, адъюнктов, слушателей,...
Монографія. Книга 7
Науковий керівник Р.М.Літнарович. МЕГУ, Рівне, 2012. – 90с
Розглянуті особливості комп’ютерної безпеки, засоби та методи захисту комп’ютерних систем. Особлива увага приділяється шкідливим програмам, а саме комп’ютерним вірусам, черв’якам, троянським програмам. Подано методи їх виявлення та боротьби з ними. Докладно розглянуто віруси-вимагачі, їх види,...
Юбилейный: ОИБ Российский национальный коммерческий банк (ОАО), 2015. — 9 с.
Форум «Информационная безопасность банков»
Содержание:
постановка задачи по развертыванию инфраструктуры
Развитие Крыма, 21 век
Сложности развития и взаимодействия, как следствие болезни роста
Где «нашли себя» аутсорсеры и где имеются перспективы расширения услуг?
6
Этап совершенствования,...
John Wiley & Sons, Inc., 2014. — 648 p. — ISBN: 978-1-118-66209-0. The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of...
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-19-5. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
Springer, 2016. — 613 p. 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented...
5th Edition. — Pearson Education, Inc., 2021. — 264 р. — ISBN 978-0135822784. "The IT security industry has seen dramatic changes in the past decades. Security breaches, data theft, cyber attacks, and information warfare are now common news stories in the mainstream media. IT security expertise that was traditionally the domain of a few experts in large organizations has now...
London: The Institution of Engineering and Technology, 2020. — 446 p. Frontiers in Hardware Security and Trust provides a comprehensive review of emerging security threats and privacy protection issues, and the versatile state-of-the-art hardware-based security countermeasures and applications proposed by the hardware security community. The footprint and power constraints...
O’Reilly Media, Inc., 2024. — 200 р. — ISBN-13: 978-1-098-13370-2. Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as...
Wiley-Scrivener Publishing, 2021. — 261 p. — ISBN 1119558638. The scope of Security Issues, Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader...
Springer, 2024. — 102 p. — ISBN 978-3031637803, 3031637801, ASIN B0D64WTYW5. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to...
Lioncrest Publishing, 2020. — 270 p. To defend against attackers, you must think like them. As a leader of ethical hackers, Ted Harrington helps the world’s foremost companies secure their technology. Hackable teaches you exactly how. You’ll learn how to eradicate security vulnerabilities, establish a threat model, and build security into the development process. You’ll build...
Springer, 2020. — 271 p. This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia...
O’Reilly Media, 2023. — 342 p. — ISBN 1098129466. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building...
Springer, 2018. — 415 p. This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including...
Newnes, 2012. — 404 p. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides: A broad understanding of security principles, concerns, and technologies Proven techniques for the efficient development of safe and secure embedded software A study of the system architectures, operating systems and hypervisors, networking,...
Boca Raton: CRC Press, 2025. — 113 p. This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semantic annotation of domain-specific source documentation. By combining principles from Computer Science, document management, and semantic data...
Leanpub, November 2022. — 433 p. This Guide is intended to provide you the information required to efficiently and safely navigate the Dark Web. A how-to book on how to safely navigate and survive the Dark Web. Appendices include information regarding online history, philosophy, anonymity, and privacy in general. Following the chapters, you will find appendices, which provide...
Syngress 2014. — 177 p. — ISBN13: 978-0128021453. As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs...
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create...
CRC Press, 2024. — 318 p. — (Security, Audit and Leadership Series). — ISBN 9781032185163. The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity, and Ledger.This book is based on a good understanding and experience of new and old technologies,...
McGraw-Hill, 2020. — 480 p. — ISBN: 978-1-26-046007-0. HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide Prepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resource. Written by a healthcare information security and...
Apress Media LLC, 2024. — 384 p. — ISBN-13: 979-8-8688-0837-1. This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud,...
Apress, 2015. — 744 p. Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with...
Independently published, 2024. — 101 p. — ISBN-13 979-8864650370. Сценарии Bash для кибербезопасности: освоение Bash для операций безопасности следующего поколения Are you ready to supercharge your cybersecurity skills and become a scripting master?Introducing "Bash Scripting for Cybersecurity." This comprehensive guide is your key to unlocking the full potential of Bash...
CRC Press, 2022. — 317 p. — ISBN 978-0-367-68175-3. This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social...
Wiley-Scrivener, 2022. — 320 p. Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing...
Manning Publications, 2021. — 506 p. — ISBN 978-1617296598. In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you’ll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. In a world of changing privacy regulations, identity theft, and online anonymity,...
Springer, 2021. — 148 p. — (Data Analytics). — ISBN 9811637490. Персонализированная защита конфиденциальности в больших данных This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data...
Springer, 2016. — 203 p. — ISBN: 331928777X, 9783319287775 This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage and remote storage. The author surveys related...
World Scientific Publishing, 2023. — 377 p. Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies are generating both privacy and security...
Oxford University Press, 2021. — 305 p. — ISBN-13 9780190939052. Почему важна конфиденциальность Крайне необходимое уточнение о том, что такое конфиденциальность, почему она важна и как мы можем защитить в эпоху, когда так много людей считают, что эта концепция мертва. This is a book about what privacy is and why it matters. Governments and companies keep telling us that...
Springer, 2003. — 304 p. Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond...
Secure Anchor Consulting, 2017. — 247 p. This course will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. You will learn tips and tricks designed to help you win the battle against the wide range of cyber adversaries that want to harm your environment. Organizations are...
John Wiley & Sons, 2022. — 307 p. — ISBN 9781119515364. Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security capabilities work? Are they scaling, accelerating, or...
Packt Publishing, 2013. — 242 p. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be...
IGI Global, 2017. — 305 р. — ISBN: 978-1522524861. In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on...
Routledge, 2019. — 447 p. The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage communication-based concepts and theories to illuminate...
5th ed. — Papercut Limited, 2021. — 108 p. — ISBN 978-1-912847-25-9. Advanced Security Tips . Windows 10 Privacy Settings. How to Check which Apps are Sending Informatior. What is a firewall? Improving the Windows 10 Firewall. Creating a Security Plan. Windows Security Checklist. What is a Sandbox? Running Windows 10 as a Sandbox. Installing VirtualBox. Installing Windows 10 in...
4th Edition. — John Wiley & Sons, Inc., 2024. — 272 p. — ISBN: 978-1394233724. Instructional guide applying “prevention through design” concepts to the design and redesign of work premises, tools, equipment, and processes Basic Guide to System Safety provides guidance on including prevention through design concepts within an occupational safety and health management system;...
No Starch Press, 2022. — 320 p. — ISBN-13: 978-1-7185-0195-9. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's...
HarperCollins Publishers Australia Pty. Ltd., 2019. — 320 p. — ISBN: 978-0-06-279599-1. A former FBI Special Agent, U.S. Army officer and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our...
Monograph. — Kharkiv, Ukraine: PC Technology Center, 2022. — 196 p. — ISBN 978-617-7319-57-2. The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart...
Taylor & Francis Group, 2015. — 332 p. — ISBN13: 978-1-4987-0033-7. Foreword. Fraud and Prevention. About the Author. Fraud. Employee Theft and Fraud. Organizational Fraud. Small Business Fraud. Investment Fraud. Organized Retail Fraud/Theft. Frauds Targeting the Individual. Frauds against the Elderly. Advance Fee Fraud. Identity Theft/Identity Fraud. Internet Fraud. Internet,...
СПб.: Питер, 2021. — 272 с. — (Для профессионалов). — ISBN 978-5-4461-1733-8. Чем авторизация отличается от аутентификации? Как сохранить конфиденциальность и провести тестирование на проникновение? Автор отвечает на все базовые вопросы и на примерах реальных инцидентов рассматривает операционную безопасность, защиту ОС и мобильных устройств, а также проблемы проектирования...
Справочник. — СПб.: СПИИРАН; Анатолия; Полиграфические технологии, 2014. — 96 с. Издание адресовано парламентариям, членам экспертных групп и комиссий, работникам органов СНГ и рабочих органов Межпарламентской Ассамблеи СНГ, Парламентской Ассамблеи ОДКБ и иных интеграционных объединений государств постсоветского пространства. Справочный материал может быть использован в...
Учебное пособие для студентов специализации «Интеллектуальные компьютерные технологии защиты информации» специальности «Искусственный интеллект». — В 3-х частях. — Минск: БГУИР, 2003. — 71 с. Учебное пособие предназначено для студентов вузов, обучающихся по специализации «Интеллектуальные компьютерные технологии защиты информации», специальности «Искусственный интеллект»....
Учебное пособие для студентов специализации «Интеллектуальные компьютерные технологии защиты информации» специальности «Искусственный интеллект». — В 3-х частях. — Минск: БГУИР, 2003. — 71 с. Учебное пособие предназначено для студентов вузов, обучающихся по специализации «Интеллектуальные компьютерные технологии защиты информации», специальности «Искусственный интеллект»....
Selfpub, 2017. — 29 с. Книга адресована собственникам и первым лицам малого и владельцам среднего бизнеса, самозанятым людям, а также всем, кто, "не вникая в технические детали", хочет максимально обезопасить себя, свой бизнес и свой ближний круг. Практическое пособие представляет собой простые и эффективные советы от квалифицированных профессионалов в области ИТ-безопасности с...
М.: Институт системного программирования РАН, 2007. – 36 с.
В данной работе рассматриваются протоколы автоматического установления контекстов безопасности в Интернет. Приводится подробное описание работы протокола первого поколения ISAKMP/IKE. Рассмотрены его основные недостатки, а также способы их преодоления в следующей версии протокола – IKEv2.
Springer, 2019. — 233 p. — ISBN: 3030127850. This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in...
Red Bike Publishing, LLC, 2021. — 249 p.— ISBN 1936800314, 9781936800315. ISP and ISOC Master Exam Prep, gives you insight into test taking and has four 110 question length certification practice exams and a set of essay style questions. Part of Security Clearance and Cleared Defense Contractor series This book is designed to give practice questions to those who are eligible to...
Boca Raton: CRC Press, 2023. — 325 p. The work is a context-oriented analysis and synthesis of complex engineered systems to ensure continuous and safe operations under conditions of uncertainty. The book is divided in four parts, the first one comprises an overview of the development of systems engineering: starting with basics of Systems Science and Single Systems...
Cambridge: Cambridge University Press, 2023. - 268 p. - ISBN 1009299514. Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four...
Springer, 2020. — 476 p. — ISBN 978-3-030-59705-4. Связывание конфиденциальных данных: методы и методы практического обмена информацией с сохранением конфиденциальности This book provides modern technical answers to the legal requirements of pseudonymisation as recommended by privacy legislation. It covers topics such as modern regulatory frameworks for sharing and linking...
Birmingham: Packt Publishing, 2022. — 527 p. — ISBN 1800209401. Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisions. Key Features Build the analytics skills and practices you need for analyzing, detecting, and preventing...
Springer, 2022. — 216 p. — (Advanced Technologies and Societal Change). — ISBN 978-981-19-3044-7. Конфиденциальные вычисления: аппаратная защита памяти Confidential computing is a cloud computing technology that isolates sensitive data during processing in a protected CPU enclave. The contents of the enclave—the data being processed and the techniques used to process it—are...
2nd ed. — Synthypnion Press LLC, 2017. — 326 p. — ISBN: 1944373098. How does one ensure information security for a computer that is entangled with the structures and processes of a human brain - and for the human mind that is interconnected with it? The need to provide information security for neuroprostheses grows as more people utilize cochlear implants, retinal prostheses,...
Wiley, 2024. — 288 p. — ISBN: 9781394221202. Эффективное управление уязвимостями: управление рисками в уязвимой цифровой экосистеме. Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management. Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and...
Springer, 2023. — 352 p. — (Advanced Sciences and Technologies for Security Applications). — ISBN 978-3-031-33630-0. In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications...
CRC Press, 2024. — 428 p. — ISBN 1032684038, 978-1032684031. A computer that imbibes human characteristics is considered to have a digital personality. The character is akin to real-life human with his/her distinguishing characteristics such as history, morality, beliefs, abilities, looks, and sociocultural embeddings. It also contains stable personality characteristics;...
New York: Springer, 2022. — 397 p. This book presents state-of-the-art research results from leading electronic design automation (EDA) researchers on automated approaches for generating cyber-secure, smart hardware. The authors first provide brief background on high-level synthesis principles and motivate the need for secure design during behavioral synthesis. Then they...
23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings. — Springer, 2018. — 571 p. — ISBN: 978-3319989884. The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September...
Springer, 2017. — 139 p. This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the...
Apress, 2020. — 984 p. — ISBN: 9781484261927. Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that...
London: Artech House, 2003. — 416 p. A comprehensive and broad introduction to computer and intrusion forensics, this practical book helps you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The book presents case studies from around the world, and treats key emerging areas such...
Birmingham: Packt Publishing, 2022. - 450 p. - ISBN 1804618853. Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day. Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security...
Springer, 2019. — 400 p. — ISBN: 3030314995. This book constitutes the refereed conference proceedings of the 14th International Workshop on Data Privacy Management, DPM 2019, and the Third International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2019, held in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019, held in...
Springer, 2015. — 552 p. 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers...
Springer, 2015. — 667 p. 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers...
HackLikePro Publishing, 2020. — 143 p. This book will empower you with knowledge in a simplified and easily graspable manner. In the training, we teach our students how hackers break into the systems, network, mobiles, and websites to make them aware of the possible loopholes and therefore, making them proficient in reverse-penetration. By doing so, they can create a virtual...
Springer. — 461 p. — ISBN 0387003118. Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these...
Syngress 2011. — 958 p. — ISBN13: 978-1597492270. The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those...
Springer, 2022. — 158 p. — ISBN 978-3-030-77763-0. This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing...
CRC Press, 2025. — 284 р. — (Security, Audit and Leadership Series). — ISBN: 978-1-032-48770-0. In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain–computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come...
EPFL Press, Taylor and Francis Group, 2011. — 212 p. — (Management of Technology Series). — ISBN13: 978-1-4398-7916-0. Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the...
Springer, 2021. — 665 p. — ISBN 978-981-16-3149-8. This book constitutes the refereed proceedings of the Second International Conference on Big Data and Security, ICBDS 2020, held in Singapore, Singapore, in December 2020. The 44 revised full papers and 8 short papers were carefully reviewed and selected out of 153 submissions. The papers included in this book are orfanized...
CRC Press, 2024. — 310 p. — ISBN-13: 978-0815382386. Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and...
Cambridge University Press, 2021. — 378 р. In Industry Unbound, Ari Ezra Waldman exposes precisely how the tech industry conducts its ongoing crusade to undermine our privacy. With research based on interviews with scores of tech employees and internal documents outlining corporate strategies, Waldman reveals that companies don't just lobby against privacy law; they also...
No Starch Press, 2022. — 320 p. — ISBN-13: 978-1-7185-0195-9. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's...
Springer, 2023. — 142 p. — (Digital Privacy and Security). — ISBN 978-981-19-8691-8. Безопасность и конфиденциальность в федеративном обучении In this book, the authors highlight the latest research findings on the security and privacy of Federated Learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference,...
Edited By Mounia Zaydi, Youness Khourdifi, Bouchaib Nassereddine, Justin Zhang. — CRC Press, 2025. — 242 p. — ISBN: 978-1-032-76490-0. In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a...
Барнаул : АлтГТУ, 2011. — 252 с. — ISBN: 978-5-7568-0867-4. Изложены теоретические основы информационной безопасности на уровне Российской Федерации, организации, технической системы. Приведены объекты обеспечения информационной безопасности, угрозы объектам, политики и структуры систем обеспечения информационной безопасности. Рассмотрены понятия и классификации защищаемой...
Ульяновское региональное отделение Ассоциации юристов России. — Ульяновск: Центр коммуникаций Поволжья, 2017. — 36 с. Введение. Ответственность за правонарушения в сети Интернет. Персональные данные. Мошенничество в Сети Интернет. Защита технических устройств от вредоносных программ. Интернет и ребенок. Памятка родителю. Основные правила безопасного поведения в сети «Интернет».
Минск : БГУИР, 2017. — 100 с. — ISBN: 978-5-905392-07-8. Рассмотрены роль и место информационно-психологической безопасности в современном обществе, дана классификация угроз информационно-психологических воздействий на общество и методов противодействия их реализации, включая вопросы государственного регулирования в сфере обеспечения социально-психологической информационной...
СПб.: БХВ-Петербург, 2006. — 256 с.: ил. — ISBN 5-94157-889-Х. Подробно изложены современные основные методики зашиты программного обеспечения, начиная с составления программ и заканчивая их отладкой. Рассмотрены примеры взлома стандартных защит и даны рекомендации для предотвращения такого взлома. Приведено большое количество рабочих примеров, которые должны помочь...
Syngress 2011. — 1223 p. — ISBN13: 978-1597492195. Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features...
Springer, 2021. — 564 p. — ISBN 978-3-030-69459-3. This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain. The latter includes protection of critical...
13th Edition. — Papercut Ltd., 2022. — 100 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
Manning Publications Co., 2022. — 365 p. — ISBN: 978-1617298998. Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free...
Apress, 2024. — 262 p. — ISBN-13 979-8-8688-0849-4. CyberDynamx: искусство и наука создания упрощенной программы цифровой безопасности This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical...
Pluto Press, 2019. — 273 p. Acknowledgements. Preface: Completely Monitored. Monitored Subjects, Unaccountable Capitalism. The Growing Threat of Digital Control. Surveilling Ourselves. Smart Realities. Digital Salvation. Planning Your Life at the End of History. Totalitarianism 4.0. The Revolution Will Not Be Monitored. Notes.
Hoboken: Wiley, 2021. — 355 p. Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s...
Sybex, John Wiley & Sons, Inc., 2025. — 352 p. — ISBN: 978-1-394-28491-7. Полное руководство по подготовке к экзамену CIPP / US Your ultimate guide to preparing for the CIPP/US exam. Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the current CIPP...
Sybex, 2023. — 208 p. — ISBN-13: 978-1-394-19655-5. Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud....
Apress Media LLC, 2025. — 518 p. — ISBN-13: 979-8-8688-0432-8. Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your...
CRC Press, 2023. — 299 p. With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector. E-Learning is slowly replacing traditional methods of teaching and security in e-learning is an important issue in this educational context. With this book, you will be familiarized...
Independently published, 2023. — 56 p. — ASIN: B0C1KVRH2K. Need experience to land that new job role as an SOC Analyst? Get that experience from the comfort of your home and ace that job interview using the experiences gained by simulating everyday real-life situations faced by an SOC Analyst. Welcome to “SOC Workflow and Procedures: Streamlining Security Operations for Optimal...
Princeton University Press, 2019. — 248 p. We live in an interconnected world, where security problems like terrorism are spilling across borders, and globalized data networks and e-commerce platforms are reshaping the world economy. This means that states' jurisdictions and rule systems clash. How have they negotiated their differences over freedom and security? Of Privacy and...
Springer, 2018. — 188 p. — (Studies in Space Policy 16). — ISBN 978-3-319-90337-8. Космическая безопасность и правовые аспекты активного удаления мусора The book analyzes the various legal and political concepts?to resolve the problem of the existing space debris in outer space?and which measures have been taken?to avoid space debris or to reduce potential space debris in the...
Zed Books, 2019. — 288 p. — ISBN: 978-1786995353. Once little more than a glorified porn filter, China’s ‘Great Firewall’ has evolved into the most sophisticated system of online censorship in the world. Even as the Chinese internet grows and online businesses thrive, speech is controlled, dissent quashed, and any attempts to organize outside the official Communist Party are...
Apress, 2018. — 363 p. Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data. Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to...
Intelliz Press, 2019. — 354 p. Information has become the most important asset that a person, organization or business needs, and its security is what makes us the best at what we do, that is why the Information Security will always be on the headlines. Every organisation uses information, most are dependent on it. Information is an asset that, like other important business...
Wiley, 2023. — 332 p. Discover the new cybersecurity landscape of the interconnected software supply chain. In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how...
New York: Morgan and Claypool Publishers, 2010. — 164 p. Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher...
Springer, 2021. — 448 p. — ISBN 978-3-030-78119-4. This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical...
Apress Media LLC, 2025. — 548 p. — ISBN-13 979-8-8688-1028-2. Обеспечение безопасности предприятия: максимальное использование цифровых технологий за счет усиления мер безопасности Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing....
Sybex, 2025. — 496 p. The ideal prep guide for earning your CCST Cybersecurity certification. CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam is the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach,...
2nd Edition. – bookboon.com, 2022. — 297 p. — ISBN 978-87-403-3948-2. Cyberspace touches practically everything and everyone when many everyday communications depend on information communication technologies. This new wave of connectivity is going beyond tablets and laptops; to connected cars and buildings; TVs and game consoles; and smart meters and traffic control. As we are...
Springer, 2016. — 103 p. — ISBN10: 3319209930. — ISBN13: 978-3319209937 This book discusses the emerging topic of Smart TV security, including its implications on consumer privacy. The author presents chapters on the architecture and functionality of Smart TVs, various attacks and defenses, and associated risks for consumers. This includes the latest attacks on...
Rome: CRC Press, 2011. — 342 p. List of Figures List of Tables Security Electronics Public Key Cryptography Cryptographic Hash Functions Quantum Cryptography Cryptographic Protocols Public Key Distribution Wireless Network Access Mobile Security A Lightweight Approach to Secure Software Engineering ICT Security Evaluation ICT and Forensic Science Risk Assessment Information...
RAND, 1996. — 115 p. Strategic Information Warfare reports on the findings of an exercise-based analysis of the information warfare problem. The RAND team was joined in this study effort by senior exercise participants from the national security community and the information system and telecommunications industries. Multiple groups of participants went through a series of...
Apress Media LLC, 2023. — 158 p. — ISBN-13: 978-1-4842-9360-7. Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with...
Artech House, 2014. — 282 p. This book offers a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information needed to use OpenPGP and S/MIME-compliant software. It explores the conceptual and technical approaches followed by the developers of both OpenPGP and S/MIME, and gives a thorough treatment of the latest and...
New York: Morgan & Claypool, 2021. — 100 p. Person re-identification is a very fast-growing field of research. This book considers a specific aspect of this problem, i.e., how to learn re-identification models with limited supervision. This is related to research in Machine Learning (ML) on developing unsupervised to weakly supervised approaches, given the huge effort required...
Prentice Hall, 2006. - 880 pages. 4th Edition. ISBN: 0132390779. На рус. языке. A sweeping revision of the classic computer security text. This book provides end-to-end, detailed coverage of the state of the art in all aspects of computer security. Starting with a clear, in-depth review of cryptography, it also covers specific options for securing software and data against...
Packt Publishing, 2024. — 392 p. Key Features: Explore decentralized identities and blockchain technology in depth Gain practical insights for leveraging advanced digital identity management tools, frameworks, and solutions Discover best practices for integrating decentralized identity solutions into existing systems Book Description: Looking forward to mastering digital...
IGI Global, 2022. — 269 p. — ISBN 9781668439937. Методы, реализация и применение разведки и аналитики кибербезопасности Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can...
Cisco Press, 2010. — 251 p. — ISBN: 978-1-58705-264-4. The practical guide to building and running incident response and product security teams. Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed and effectiveness with which a company can respond to incidents has a direct impact on how...
Packt Publishing, 2018. — 346 p. Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging...
No Starch Press, 2018. — 272 p. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In...
No Starch Press, 2018. — 272 p. — ISBN13: 978-1-59327-859-5. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of...
ITexLi, 2025. — 113 p. — ISBN 1837696756 9781837696758 1837696764 9781837696765 1837696772 9781837696772. This volume offers a comprehensive look at the critical aspects of protecting data in today’s interconnected world. This book is designed for professionals, researchers, and students eager to understand how privacy can be maintained without compromising data utility. As...
ITexLi, 2023. — 155 p. — ISBN 1837681961 9781837681969 1837699801 9781837699803 183768197X 9781837681976. In the era of generative artificial intelligence and the Internet of Things (IoT) and while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges have arisen in identifying spurious and fake...
2nd Edition. — Syngress, 2007. — 1123 p. The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an...
Syngress, 2014 .-- 602 p. - 2nd ed. - ISBN: 9780124105263 Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT...
Edited by John Soldatos, University of Glasgow and INNOV-ACTS LIMITED, UK, James Philpot, European Organization for Security, UK, Gabriele Giunta, Engineering Ingegneria Informatica S.p. A., Italy, Delft, Netherlands, now Publishers Inc., 2020 - 450 p. Description Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such can be...
Учебное пособие. — Барнаул: Алтайский государственный педагогический университет, 2017. — 313 с. — ISBN 978-5-88210-898-3. Учебное пособие состоит из краткого теоретического материала, тестовых заданий и заданий к лабораторным работам, предусмотренным в изучении указанных дисциплин. Теоретический материал представлен в виде краткого изложения лекции. Пособие предназначено для...
Минск: Академия МВД, 2015. — 5 с. Учебный процесс в сетевой академии должен быть ориентирован на использование самых прогрессивных методик обучения и контроля уровня знаний, в частности, широкое использование технологий дистанционного обучения. Представленный перечень проблем является открытым, его полнота и непротиворечивость подлежат дальнейшему рассмотрению.
Учебно-методическое пособие. — СПб: Университет ИТМО, 2021. – 69 с. Учебно-методическое пособие «Экономика защиты информации» предназначено для помощи обучающимся по направлению подготовки 10.04.01 «Информационная безопасность» (магистратура). Пособие содержит полный набор лабораторных работ с соответствующей краткой теоретической частью, примерами заполнения, а также с...
Учебное пособие. – Краснодар: КубГАУ, 2020. – 332 с. ISBN: 978-5-907346-50-5 В пособии рассмотрены базовые положения диалектики экономических открытых систем. Материал ориентирован на выработку у обучающихся способности развивать свои знания, умения, навыки в области информационной безопасности, моделирования коллективной деятельности людей с использованием информационных...
Учебное пособие — 3 -е изд., стер. — СПб.: Лань, 2017. — 324 с.— (Учебники для вузов. Специальная литература) — ISBN: 978- 5- 8114 -2290 -6 Системно излагаются теоретические основы информационной безопасности и описываются практические аспекты, связанные с их реализацией. В пособии рассматриваются теоретические основы защиты информации, основы криптографии, защита информации в...
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-19-5. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
11th Edition. — Papercut Ltd., 2022. — 98 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
12th Edition. — Papercut Ltd, 2022. — 109 p. If you want to improve your Windows security further, then this section looks at more advanced ways and means in which you can achieve that goal. We cover firewalls, sandboxing and virtual environments and how to tell which programs are communicating beyond your home network. Our easy to follow tutorials will help you create a...
4Th Edition. — Papercut Limited. — 108 p. — ISBN 978-1-912847-66-2. Advanced Security Tips . Windows 10 Privacy Settings. How to Check which Apps are Sending Informatior. What is a firewall? Improving the Windows 10 Firewall. Creating a Security Plan. Windows Security Checklist. What is a Sandbox? Running Windows 10 as a Sandbox. Installing VirtualBox. Installing Windows 10 in...
Second Edition. — O’Reilly Media, 2022. — 282 p. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Manning Publications, 2022. — 384 p. — ISBN-13 9781617298998. Конфиденциальность данных: руководство для инженеров Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to Classify data based on privacy risk Build technical tools to catalog and discover data in...
2nd ed. — Addison-Wesley Professional, 2018. — 2865 p. — ISBN13: 978-0-321-71233-2. The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer...
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu. — Apress Media LLC, 2023. — 292 p. — ISBN-13: 978-1-4842-8296-0. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a...
2nd Edition. — O’Reilly Media, Inc., 2023. — 480 p. — ISBN 978-1-098-12068-9. Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber-threat...
Wiley, 2021. — 286 p. — ISBN 978‐1‐119‐75546‐3. IAPP CIPP / US Certified Information Privacy Professional STUDY GUIDE Your ultimate guide to preparing for the CIPP/US exam The IAPP CIPP / US Certified Information Privacy Professional Study Guide is your one-stop resource for complete coverage of the challenging CIPP/US exam. This Study Guide covers 100% of the CIPP/US domain...
Cisco, 2017. — 90 с. Содержание: Краткий обзор. Ландшафт атак. Эволюция вредоносного ПО. Зашифрованный вредоносный веб-трафик. Угрозы для электронной почты. Тактики обхода песочницы. Неправомерное использование облачных сервисов и других легитимных ресурсов. IoT и DDoS-атаки. Уязвимости и исправления. Ландшафт защитников. Цена атак. Трудности и препятствия. Сложности, создаваемые...
Independently published, 2023. — 222 p. Кодовая книга OSINT: взлом стратегий разведки с открытым исходным кодом The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced...
Springer, 2017. — 182 S. Aus dem Alltag eines digitalen Ersthelfers Der IT-Sicherheitsexperte Alexander Dörsam entführt Sie mit seinem Buch in die spannende Welt von Hacking, Unternehmenserpressung, Spionage und digitalem Vandalismus. Anhand von realen IT-Sicherheitsvorfällen erfahren Sie, wie Angreifer in Firmenstrukturen eindringen, welche Methoden dafür eingesetzt werden und...
Wiley-IEEE Press, 2023. — 516 p. — ISBN 9781119892144. IoT для обороны и национальной безопасности Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest...
17th European Symposium on Research in Computer Security. Pisa, Italy, September 10-12, 2012. Proceedings. — Springer-Verlag Berlin Heidelberg, 2012. — 911 p. — ISBN 978-3-642-33166-4, e-ISBN 978-3-642-33167-1 This volume contains the papers selected for presentation at the 17th European Symposium on Research in Computer Security (ESORICS 2012), held during September 10–12,...
IGI Global, 2024. — 319 p. — ISBN 9798369314319. Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their...
Ibrahim Habli, Mark Sujan, Simos Gerasimou, Erwin Schoitsch, Friedemann Bitsch. — Springer, 2021. — 335 p. — ISBN 978-3-030-83905-5. This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the 40th International Conference on Computer Safety, Reliability and Security, which took place in York, UK, in September 2021. The 26 regular papers...
Harvard University Press, 2018. — 384 p. Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves―even when the odds are...
Springer International Publishing, 2019. — 192 p. This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4)...
2nd Edition. — Packt Publishing, 2020. — 432 p. — ISBN: 978-1-83864-900-5. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks....
Pegasus Books, 2022. — 626 р. — ISBN: 978-1-63936-256-1 A fresh exploration into the 'human nature versus technology’ argument, revealing an unexpected advantage that humans have over our future robot masters: we’re actually good at mathematics. There’s so much discussion about the threat posed by intelligent machines that it sometimes seems as though we should simply surrender...
Wiley-Scrivener, 2025. — 407 p. — ISBN 978-1-394-24214-6. This book explores the core principles, technological advancements, and legal challenges of Industry 5.0’s digital transformation. Industry 5.0 has enhanced the operational efficiency of the entire manufacturing process by incorporating multiple emerging technologies; however, high-tech cybercrimes have prompted legal...
Springer Vieweg, 2024. — xv, 268 S. — ISBN 10 3658422432; ISBN 13 9783658422431. Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter "Wegweiser" zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein wichtiger Wettbewerbsfaktor. Auch...
CRC Press, 2024. — 476 p. Congratulations! Perhaps you have been appointed as the Chief Privacy Officer (CPO) or the Data Protection Officer (DPO) for your company. Or maybe you are an experienced CPO/DPO, and you wonder – "what can I learn from other successful privacy experts to be even more effective?" Or perhaps you are considering a move from a different career path and...
Novinka, 2016. — 89 p. Persistent weaknesses at 24 federal agencies illustrate the challenges they face in effectively applying information security policies and practices. Most agencies continue to have weaknesses in (1) limiting, preventing, and detecting inappropriate access to computer resources; (2) managing the configuration of software and hardware; (3) segregating...
Manning Publications, 2021. — 506 p. — ISBN 978-1617296598. In Self-Sovereign Identity: Decentralized digital identity and verifiable credentials, you’ll learn how SSI empowers us to receive digitally-signed credentials, store them in private wallets, and securely prove our online identities. In a world of changing privacy regulations, identity theft, and online anonymity,...
Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate School of Binghamton University State University of New York, – Binghamton University, Binghamton, 2020. - 151 p. Traditional software development favors a one-size-fits-all mentality which results in software with incremental complexity and packed...
ITexLi, 2024. — 255 p. — ISBN 0854661484 9780854661480 0854661492 9780854661497 0854661506 9780854661503. In today's digital age, having a strong online identity has become more important than ever. This book aims to explore the many facets of this topic, from the importance of building a positive digital presence to managing one's online reputation and privacy. We want to...
Springer, 2021. — 616 p. — ISBN 978-3-030-85792-9. This book provides a comprehensive coverage of hardware security concepts, derived from the unique characteristics of emerging logic and memory devices and related architectures. The primary focus is on mapping device-specific properties, such as multi-functionality, runtime polymorphism, intrinsic entropy, nonlinearity, ease...
Packt Publishing, 2018. — 346 p. Gain practical experience of creating security solutions and designing secure, highly available, and dynamic infrastructure for your organization Solutions in the IT domain have been undergoing massive changes. There was a time when bringing your own devices to work was like committing a crime. However, with an evolving IT industry comes emerging...
O’Reilly Media, 2017. — 284 p. — ISBN: 978-1-491-93494-4. Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this...
Time Room, 2016. — 222 p. Millions of people around the worlds wants to learn hacking, that's a fact. The sad part comes in when there is very few information compiled in one spot. Not to mention step by step. This book contains everything a beginner or a professional would like to put to practice everyday. Subjects that would be broken down in step by steps are like. Finishing...
No publisher, 2023. — 107 p. Welcome to ISO 27001 Foundation Practice Tests! This comprehensive e-book contains 150 multiple-choice practice questions designed to help you pass the ISO 27001 foundation exam. The ISO 27001 standard is an internationally recognized standard for information security management systems (ISMS). This exam tests your knowledge of the standard and its...
No publisher, 2023. — 90 p. ISO 27001 Foundation - Study Guide is a comprehensive guide that provides an in-depth understanding of the ISO 27001 standard for information security management systems. This study guide is designed to help individuals pass the ISO 27001 foundation exam and gain a solid understanding of the standard's requirements and best practices. The guide...
Apress, 2019. — 377 р. Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack. The most common culprit of the largest hacks has been bad personal...
Springer, 2024. — 452 p. This book provides an introduction to the basic ideas involved in cybersecurity, whose principal aim is protection of IT systems against unwanted behaviour mediated by the networks which connect them. Due to the widespread use of the Internet in modern society for activities ranging from social networking and entertainment to distribution of utilities...
Springer-Verlag Berlin Heidelberg, 2012. — 110 p. — ISBN 978-3-642-31970-9, e-ISBN 978-3-642-31971-6 Graphical data, such as images or video streams, are of growing importance in several disciplines of IT security. Examples range from biometric authentication over digital image forensics to visual passwords and CAPTCHAs. Consequently, methods of image analysis and pattern...
Springer, 2016. — xv, 324 p. This book constitutes the refereed proceedings of the 35th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2016, held in Trondheim, Norway, in September 2016. The 24 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on fault injection,...
CRC Press, 2017. — 401 p. Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors—two renowned...
CRC Press, 2022. — 474 p. Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. Personal information has become an increasingly valuable...
Penguin Books, 2012 — 368 p.
From the New York Times’s veteran foreign policy editorialist, a lucid analysis of the harm caused by America’s increasingly misdirected national security state
America is trapped in a state of war that has consumed our national life since before Pearl Harbor. Over seven decades and several bloody wars, Democratic and Republican politicians alike...
CRC Press, 2025. — 211 p. — ISBN 9781032863641. ManusCrypt: Разработано для человечества – антропоцентрическа я информационная безопасность Information security primarily serves these six distinct purposes—authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon...
2nd Edition. — Apress Media LLC., 2024. — 289 p. — ISBN: 979-8-8688-0345-1. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your...
Apress Media LLC., 2021. — 134 p. — ISBN-13 (electronic): 978-1-4842-6904-6. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start...
No Starch Press, 2025. — 376 p. — ISBN-13: 978-1-7185-0378-6. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these...
Springer, 2023. — 124 p. This book studies the security of Physical Unclonable Functions (PUFs) based on the Arbiter PUF design, with a focus on so-called modeling attacks. The author shows the insecurity of several designs and proposes a novel construction that is proven to be immune against attacks known in scientific literature. The book explores designs of variants and...
Учебное пособие. — М.: МИСиС, 2019. — 59 с. — ISBN 978-5-906953-94-0. Рассмотрены вопросы применения криптографических алгоритмов с открытым и секретным ключом, требования к криптографическим хэш-функциям и средствам формирования электронной подписи. Даются основы стеганографических алгоритмов применительно к вопросам защиты интеллектуальной собственности путем внедрения...
Учебное пособие. — Ростов-на-Дону; Таганрог: Южный федеральный университет, 2019. — 147 с. — ISBN 978-5-9275-3212-4. Пособие содержит описание подходов, методов и средств аппарата искусственных иммунных систем в информационной безопасности. Ориентировано на специалистов, аспирантов и студентов, работающих и обучающихся по направлениям и специальностям в области информационной...
Навчальний посібник. — Одеса : ОНАЗ ім. О. С. Попова, 2013. — 217 c. У навчальному посібнику розглянуто основні положення, теоретичні основи та практичні аспекти методик оцінки інформаційної захищеності. Пояснюються моделі та принципи оцінки ефективності технічного захисту інформації. Описані теорія та методи інструментальної оцінки у дослідженні систем безпеки інформаційних...
М.: Издательские решения, 2018. — 249 с.: ил. — ISBN: 978-5-4493-0690-6. Книга рассказывает о семействе международных стандартов ISO/IEC 27k, определяющих требования и правила СУИБ (системы управления информационной безопасностью), порядок разработки СУИБ и алгоритмы управления рисками информационной безопасности и инцидентами информационной безопасности.
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
М.: Энергия, 2010. — 238 с. В словаре приводится около 2000 терминов, встречающихся в новейшей литературе, посвященной информационной безопасности технических средств различного назначения. Содержатся статьи (определения), посвященные проблемам защиты промышленной и коммерческой информации, обеспечения информационной безопасности военных средств и техники народнохозяйственного...
Santa Monica: RAND, 2021. — 115 p. In the first two decades of the 21st century, the coevolutionary adaptation of cyber threat actors and technology has been akin to an escalatory arms race between cyber offense and cyber defense. Paradigm-shifting technology advancement, transparent unclassified reporting on cyber incidents, and the proliferation of open-source hacking tools...
Selfpub, 2017. — 29 с. Книга адресована собственникам и первым лицам малого и владельцам среднего бизнеса, самозанятым людям, а также всем, кто, "не вникая в технические детали", хочет максимально обезопасить себя, свой бизнес и свой ближний круг. Практическое пособие представляет собой простые и эффективные советы от квалифицированных профессионалов в области ИТ-безопасности с...
Учебное пособие. – Санкт-Петербург: Изд-во Политехнического университета, 2009. – 126 с. Системно излагаются теоретические основы информационной безопасности и описываются практические аспекты, связанные с их реализацией. Пособие состоит из трех разделов: «Теоретические основы защиты информации», «Основы криптографии», «Защита информации в IP-сетях». Предназначено для...
К. : МАУП, 2006. — 134 с. У посібнику з позиції системного аналізу розглядаються напрями комплексного вирішення проблеми забезпечення інформаційної безпеки підприємництва за умов ринкових відносин та негласного збирання відомостей, що становлять комерційну таємницю. Висвітлюються джерела відтоку інформації у сфері використання електронно-обчислювальних машин, комп’ютерних...
Учебно-методическое пособие. — Тольятти: Тольяттинский государственный университет, 2024. — 135 с. — ISBN 978-5-8259-1612-5. Учебно-методическое пособие «Информационная безопасность» разработано в соответствии с требованиями Федерального государственного образовательного стандарта по направлению подготовки «Прикладная информатика». Составлено в соответствии с государственными...
Москва: Символ-Плюс, 2009. — 525 с. — ISBN: 978-5-93286-147-9 Sutton M., Green A., Amini P. Fuzzing: Brute Force Vulnerability Discovery Переводчик: Коробейников А. Фаззинг - это процесс отсылки намеренно некорректных данных в исследуемый объект с целью вызвать ситуацию сбоя или ошибку. Настоящих правил фаззинга нет. Это такая технология, при которой успех измеряется...
СПб.: Символ-Плюс, 2009. — 556 с., ил. — ISBN: 9785932861479
Фаззинг – это процесс отсылки намеренно некорректных данных в исследуемый объект с целью вызвать ситуацию сбоя или ошибку. Настоящих правил фаззинга нет. Это такая технология, при которой успех измеряется исключительно результатами теста. Для любого отдельно взятого продукта количество вводимых данных может быть...
СПб.: БХВ-Петербург, 2004. — 288 с.: ил. — ISBN 5-94157-331-6. Защита информации — очень сложная наука, но начинать ее изучение можно с простых вещей. Именно так и задумана эта книга. Читателю предстоит узнать, чем занимается информационная безопасность и какие методы она использует для решения своих задач. Особое внимание уделяется криптографии — пожалуй, самому мощному...
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-20-1. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
7Th Edition. — Papercut Limited. — 108 p. — ISBN 978-1-912847-25-9. Welcome back... Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry...
11th Edition. — Papercut Ltd, 2022. — 109 p. If you want to improve your Windows security further, then this section looks at more advanced ways and means in which you can achieve that goal. We cover firewalls, sandboxing and virtual environments and how to tell which programs are communicating beyond your home network. Our easy to follow tutorials will help you create a...
10th Edition. — Papercut Ltd, 2022. — 110 p. If you want to improve your Windows security further, then this section looks at more advanced ways and means in which you can achieve that goal. We cover firewalls, sandboxing and virtual environments and how to tell which programs are communicating beyond your home network. Our easy to follow tutorials will help you create a...
Manning Publications Co., 2022. — 365 p. — ISBN: 978-1617298998. Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free...
Springer, 2021. — 250 p. — ISBN 978-3-030-69173-8. This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities,...
2nd ed. — Addison-Wesley Professional, 2018. — 2865 p. — ISBN13: 978-0-321-71233-2. The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer...
2nd Edition. — O’Reilly Media, Inc., 2023. — 480 p. — ISBN 978-1-098-12068-9. Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber-threat...
IT Governance Publishing, 2023. — 88 p. — ISBN: 9781787784369 Understand how your organisation can implement Cyber Essentials and Cyber Essentials Plus with this guide!
Springer, 2016. — 213 p. — (Law, Governance and Technology Series). — ISBN10: 3319391976, ISBN13: 978-3319391977. This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better...
Independently published, 2023. — 222 p. Кодовая книга OSINT: взлом стратегий разведки с открытым исходным кодом The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced...
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 31 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all...
Apress, 2024. — 585 p. — ISBN-13 979-8-8688-0505-9. This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations...
Wiley-ISTE, 2021. — 277 p. By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments...
Springer, 2024. — 102 p. — ISBN 978-3031637803, 3031637801, ASIN B0D64WTYW5. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to...
Wiley, 2014. — 914 p. — ISBN10: 1118825098. — ISBN13: 978-1118825099. Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring...
Hart Publishing, 2021. — 279 p. This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence. It is one of the results of the thirteenth annual International Conference on Computers, Privacy and Data Protection (CPDP) held in Brussels in January 2020....
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
Cybellium Ltd, 2023-11-17. — 308 p. — ASIN: B0CNMZWJG4. Unlock Your Expertise in Incident Handling with the "GCIH Certification Guide" In today's ever-changing digital landscape, where cyber threats are constantly evolving, mastering the art of incident handling is critical. The GIAC Certified Incident Handler (GCIH) certification is your beacon of expertise in incident...
Cybellium Ltd, 2023-11-16. — 405 p. — ASIN: B0CNKHDHMH. Elevate Your Cybersecurity Career with the "GSEC Certification Guide" In the realm of cybersecurity, knowledge is power, and the GIAC Security Essentials (GSEC) certification is the key to unlocking your potential as a cybersecurity expert. "GSEC Certification Guide" is your essential companion on the journey to mastering...
Fullstack.io, 2020. — 131 p. — ISBN: n/a. Revision 7 – 2020-04-17 Most of the marketing employed by the security industry tends to rely on a bit of fear-mongering. It’s easy to sell sensationalism — to say that “everything is broken” and cause a sense of alarm and hopelessness. The goal of this book is not to impart fear, but knowledge. Informed individuals are less likely to...
John Wiley & Sons, Inc., 2023. — 336 p. — ISBN: 978-1-394-15850-8. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll...
John Wiley & Sons, 2024. — 400 р. — ISBN 13: 978-1394222544. It is commonly understood that social engineering is one of the biggest challenges modern society faces. Highly orchestrated social engineering campaigns target corporate workers with credential harvesting attacks, wire fraud, and business opportunity scams. It even plagues our personal lives, from calls about your...
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68735-1. Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
John Wiley & Sons, Inc., 2025. — 416 p. — ISBN: 978-1394171705. Unlock the power of secure coding with this straightforward and approachable guide! Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples,...
John Wiley & Sons, Inc., 2025. — 416 p. — ISBN: 978-1394171705. Unlock the power of secure coding with this straightforward and approachable guide! Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples,...
Manning Publications, 2023. — 83 p. — (MEAP v2). Борьба с мошенничеством с помощью машинного обучения Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine...
Manning Publications, 2024. — 337 p. — ISBN 9781633438224. Financial and corporate fraud happen every day, and the fraudsters inevitably leave a digital trail. Machine learning techniques, including the latest generation of LLM-driven AI tools, help identify the telltale signals that a crime is taking place. Fight Fraud with Machine Learning teaches you how to apply cutting...
Packt Publishing , 2017. — 350 p. — ISBN: 978-1787288683. Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident...
2nd Edition. — Packt Publishing, 2020. — 548 p. — ISBN: 978-1-83864-900-5. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks....
Packt Publishing , 2017. -350p. - ISBN: 978-1787288683 Key Features Learn incident response fundamentals and create an effective incident response framework Master forensics investigation utilizing digital investigative techniques Contains real-life scenarios that effectively use threat intelligence and modeling techniques Book Description Digital Forensics and Incident...
Apress Media LLC., 2024. — 179 p. — ISBN-13: 979-8-8688-0870-8. In today’s digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all...
Springer, 2022. — 105 p. This Springer book contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot...
New York: IGI Global, 2014. — 380 p. Information security systems have become more popular due to the prevalence of criminal activity over benign attacks. Because computer systems are constantly changing, it is important to explore new security measures and unconventional approaches to solving issues. Information Security in Diverse Computing Environments provides the latest...
Apress Media LLC, 2024. — 384 p. — ISBN-13: 979-8-8688-0838-8. This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud,...
Springer, 2022. — 302 p. — (Studies in Big Data 116). — ISBN 978-3-031-16126-1. Практический подход к криминалистике баз данных Adopting an experimental learning approach, this book describes a practical forensic process to acquire and analyze databases from a given device and/or application. Databases hold important, sensitive, and/or confidential information and are a crucial...
O’Reilly Media, Inc., 2021. — 346 p. — ISBN: 978-1-492-07573-8. Fairness is becoming a paramount consideration for data scientists. Mounting evidence indicates that the widespread deployment of machine learning and AI in business and government is reproducing the same biases we're trying to fight in the real world. But what does fairness mean when it comes to code? This...
O’Reilly Media, Inc., 2021. — 346 p. — ISBN: 978-1-492-07573-8. Fairness is becoming a paramount consideration for data scientists. Mounting evidence indicates that the widespread deployment of machine learning and AI in business and government is reproducing the same biases we're trying to fight in the real world. But what does fairness mean when it comes to code? This...
Apress Media LLC, 2023. — 158 p. — ISBN-13: 978-1-4842-9361-4. Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with...
Apress Media LLC, 2024. — 213 p. — ISBN-13: 979-8-8688-0461-8. This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it...
18th Edition. — Papercut Ltd., 2024. — 100 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
14th Edition. — Papercut Ltd., 2023. — 97 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
16th Edition. — Papercut Limited, 2023-2024. — 108 p. — ISBN 978-1-912847-66-2. Online Security Tricks and Tips is the perfect digital publication for the user that wants to take their skill set to the next level. Do you want to enhance your user experience? Or wish to gain insider knowledge? Do you want to learn directly from experts in their field? Learn the numerous short...
Syngress 2016. — 49 p. — ISBN: 978-0-12-802864-3. The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new...
2nd ed. — CreateSpace Independent Publishing Platform, 2017. — 45 p. — (TOR). — ISBN10: 1974216780, 13 978-1974216789. Best-selling author, Bruce Rogers, presents a remarkable beginners' guide made simple and easy to understand to help all aspiring hackers learn and master the fundamentals of hacking and IT security. In Part 1: TOR - Beginners to Expert Guide to Accessing the...
CRC Press, 2021. — 191 p. — (Internet of Everything (IoE): Security and Privacy Paradigm). — ISBN 1119558638. This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and...
John Wiley & Sons, Inc., 2008. — 336 p. — ISBN: 978-0-470-50562-5. Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay - figuratively and literally - when security fails....
Springer, 2023. — 144 p. — ISBN 978-3-031-24215-1. This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the...
Apress, 2019. — 149 p. — ISBN13: (electronic): 978-1-4842-5034-1. Explore the adoption of chatbots in business by focusing on the design, deployment, and continuous improvement of chatbots in a business, with a single use-case from the banking and insurance sector. This book starts by identifying the business processes in the banking and insurance industry. This involves data...
Academic Press, 2020. — 340 p. — ISBN 0128195118, 9780128195116 E-health applications such as tele-medicine, tele-radiology, tele-ophthalmology, and tele-diagnosis are very promising and have immense potential to improve global healthcare. They can improve access, equity, and quality through the connection of healthcare facilities and healthcare professionals, diminishing...
Syngress, 2014 .-- 602 p. - 2nd ed. - ISBN: 9780124105263 Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT...
Edited by John Soldatos, University of Glasgow, UK and INNOV-ACTS LIMITED, Isabel Praça, Institute of Engineering of the Polytechnic of Porto (ISEP), Aleksandar Jovanović, Steinbeis Advanced Risk Technologies Group Delft, Netherlands, now Publishers Inc., 2021 - 602 p. Description Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS)....
Edited by John Soldatos, INTRASOFT International S.A., Greece Delft, Netherlands, now Publishers Inc., 2020 - 288 p. Description In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk...
CRC Press, 2025. — 284 р. — (Security, Audit and Leadership Series). — ISBN: 978-1-003-39069-5. In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain–computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come...
Payhip.com, 2019. — 212 p. Do you like hacking ? Do you like security ? Do you want to make a living doing what you love? Do you want to find vulnerabilities and get paid to do so? If you answered YES to any of these questions then this book is for you. The sole purpose of this book is to teach you the skills needed to successfuly make a living hunting for vulnerabilities and...
Apress, 2020. — 221 p. — ISBN13: (electronic): 978-1-4842-5608-4. Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you...
CRC Press, 2025. — 211 p. — ISBN 9781032863641. ManusCrypt: Разработано для человечества – антропоцентрическа я информационная безопасность Information security primarily serves these six distinct purposes—authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation. The entire gamut of infosec rests upon...
Morgan Kaufmann, 2013. — 1394 p. — ISBN13: 978-0-12394612-6. The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores...
John Wiley & Sons, 2022. — 291 p. Make security a priority on your team. Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible...
Syngress, 2015. — 449 c. — ISBN13: 978-1597490184. This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity...
Auerbach Publications, 2004. — 240 p. — ISBN: 0849320410. This text integrates the importance of sound security policy with the strategic goals of an organization and provides IT professionals and management with insight into the issues surrounding the goal of protecting valuable information assets.
М.: Издательские решения, 2018. — 249 с.: ил. — ISBN: 978-5-4493-0690-6. Книга рассказывает о семействе международных стандартов ISO/IEC 27k, определяющих требования и правила СУИБ (системы управления информационной безопасностью), порядок разработки СУИБ и алгоритмы управления рисками информационной безопасности и инцидентами информационной безопасности.
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
Таганрог: Таганрогский технологический институт ЮФУ, 2012. — 33 с. Работа посвящена рассмотрению методов и средств защиты информации. В ней приводится классификация средств защиты информации. Описан каждый класс этих средств. Перечислены и подробно описаны методы защиты информации. В первой части работы рассматриваются технические и программные средства защиты информации,...
НТУ «ДП», 2019. – 177 с. Навчальний посібник містить відомості про основні положення формальної логіки у її застосуванні до прийомів методики критичного мислення Подано перелік деяких особливостей сприйняття інформації, наведено теорію статистичного аналізу достовірності отриманих даних ЛОГІЧНИЙ АНАЛІЗ ТВЕРДЖЕНЬ Елементи формальної логіки Поняття логіки, як науки Логічна форма...
Пер. с англ. – М.: Компания АйТи: ДМК Пресс: ТЕТРУ, 2004. — 552 с. Автор: Райан Рассел, Марк Мерков, Робин Уолшоу, Тери Бидвел, Майкл Кросс, Оливер Стойдлер, Кевин Цайсе. Безопасность в виртуальном мире Internet - более запутанная вещь, чем безопасность в обычном ее понимании. Даже несмотря на то, что программное обеспечение постоянно модернизируется, специалисты утверждают:...
Пер. с англ. А.В. Снастина. — Москва: ДМК Пресс, 2020. — 388 с. — ISBN: 978-5-97060-713-8. Способна ли технология машинного обучения решить проблемы компьютерной безопасности? Или надежда на это является лишь следствием повышенного внимания к машинному обучению? С помощью этой книги вы изучите способы применения машинного обучения в задачах обеспечения безопасности, таких как...
De Gruyter Oldenbourg, 2019. — 317 p. — ISBN-13: 978-3110668261. This book outlines key concepts and guidelines for ensuring information security awareness, addressing in detail governance, compliance, and learning processes. From choosing media to integrating new hires, the book provides a comprehensive range of configuration options for raising security awareness. It can...
Independently published, 2020. — 80 p. — ISBN10: 1670903036, 13 978-1670903037. This book has been written in a way that makes it easy for you to understand this very important subject in today’s world. If you’re a beginner, then this is the book for you. The world is increasingly heading in a digital direction and automation is now becoming the norm; this means that...
Manning Publications, 2022. — 384 p. — ISBN-13 978-1617298998. Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy...
Packt Publishing, 2024. — 252 p. Key Features: Create automated CI/CD pipelines for testing and implementing threat detection use cases Apply implementation strategies to optimize the adoption of automated work streams Use a variety of enterprise-grade tools and APIs to bolster your detection program Book Description: Today's global enterprise security programs grapple with...
Sybex, 2023. — 208 p. — ISBN-13: 978-1-394-19655-5. Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud....
Apress Media LLC, 2025. — 518 p. — ISBN-13: 979-8-8688-0432-8. Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your...
O’Reilly Media, Inc., 2024. — 200 р. — ISBN-13: 978-1-098-13370-2. Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as...
Apress, 2023. — 253 p. — ISBN 979-8-8688-0255-3. Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure...
IT Governance Publishing, 2022. — 206 p. — ISBN 978-1-78778-367-6. This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu’s The Art of War. So why is the reporting of cyber attacks so low? Why...
Fullstack.io, 2020. — 131 p. — ISBN: n/a. Revision 7 – 2020-04-17 Most of the marketing employed by the security industry tends to rely on a bit of fear-mongering. It’s easy to sell sensationalism — to say that “everything is broken” and cause a sense of alarm and hopelessness. The goal of this book is not to impart fear, but knowledge. Informed individuals are less likely to...
Springer, 2023. — 352 p. — (Advanced Sciences and Technologies for Security Applications). — ISBN 978-3-031-33631-7. In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications...
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68739-9 (ebk). Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
John Wiley & Sons, Inc., 2021. — 288 p. — ISBN: 978-1-119-68739-9 (ebk). Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software...
O’Reilly Media, Inc., 2023. — 500 p. — (ER). — ISBN 978-1-098-12946-0. Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern...
Springer, 2023. — 372 S. Die Kunst des Cyberkrieges greift die strategischen und taktischen Vorgehensweisen für Angriff und Verteidigung im digitalen Zeitalter auf. Dazu bedient sich der Autor historischer Konflikte (von Sun Tsu bis Carl von Clausewitz) und deren Ausgängen, um aufzuzeigen, dass es ungeachtet der veränderten Bedingungen wie Zeit, Ort, Mittel und Ressourcen –...
Apress Media LLC, 2025. — 548 p. — ISBN-13: 979-8-8688-1029-9. Обеспечение безопасности предприятия: максимальное использование цифровых технологий за счет усиления мер безопасности Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing....
Nonce, 2019. — 635 p. Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how to create...
Київ: Корпорація Microsoft, доповідь, 2019 — 14 с. Зміст Інсайдерські порушення безпеки. Можливі порушення безпеки з боку штатних і віддалених співробітників. Загроза інфраструктурі від зовнішніх джерел зловмисного ПО. найпоширеніших типів кібератак із використанням соціотехніки. Швидко виявляє порушення систем безпеки та усуває їх. Застосуйте комплексний підхід, щоб зміцнити...
Packt Publishing, 2020. — 390 p. — ISBN: 9781789806298. Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats Prevent cyber attacks by using robust cybersecurity strategies Unlock the secrets of network security Book Description With advanced cyber...
Packt Publishing, 2020. — 378 p. — ISBN 9781789806298. Build a resilient network and prevent advanced cyber attacks and breaches Key Features - Explore modern cybersecurity techniques to protect your networks from ever-evolving cyber threats - Prevent cyber attacks by using robust cybersecurity strategies - Unlock the secrets of network security Book Description With advanced...
McGraw-Hill, 2020. — 480 p. — ISBN: 978-1-26-046007-0. HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide Prepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resource. Written by a healthcare information security and...
Leanpub, 2020. — 161 p.— ISBN 1670062449, 9781670062444. As software engineers, we often think of security as an afterthought: build it, then fix it later. Truth is, knowing a few simple browser features can save you countless hours banging your head against a security vulnerability reported by a user. This book is a solid read that aims to save you days learning about security...
O’Reilly Media, Inc., 2021. — 346 p. — ISBN: 978-1-492-07573-8. Fairness is becoming a paramount consideration for data scientists. Mounting evidence indicates that the widespread deployment of machine learning and AI in business and government is reproducing the same biases we're trying to fight in the real world. But what does fairness mean when it comes to code? This...
2011, 1 st edition, Publisher: Jones & Bartlett Learning, 416 p. Language: English. Hacker Techniques, Tools, and Incident Handling, Second Edition begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the...
Apress Media LLC, 2024. — 213 p. — ISBN-13: 979-8-8688-0461-8. This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it...
19th Edition. — Papercut Ltd., 2024. — 96 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
13th Edition. — Papercut Ltd, 2023. — 108 p. If you want to improve your Windows security further, then this section looks at more advanced ways and means in which you can achieve that goal. We cover firewalls, sandboxing and virtual environments and how to tell which programs are communicating beyond your home network. Our easy to follow tutorials will help you create a...
6th Edition. — Addison-Wesley/Pearson, 2024. — 1026 р. — ISBN-13: 978-0-13-789121-4. The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing. Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information...
Boca Raton: CRC Press, 2023. — 261 p. Artificial Intelligence (AI), Machine Learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics. AI and Machine Learning are now giving us new opportunities to use Big Data that we already had, as well as unleash a whole lot of new use cases...
World Scientific Publishing, 2023. — 377 p. Regulating cyber matters is a complex task, as cyberspace is an intricate world full of new threats related to a person's identity, finance, and private information. Algorithm manipulation, hate crimes, cyber-laundering, and data theft are strong menaces in the cyber world. New technologies are generating both privacy and security...
O’Reilly Media, 2017. — 284 p. — ISBN: 978-1-491-93494-4. Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this...
Syngress, 2003. — 1330 p. — ISBN: 1-931836-90-6. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-11382-7. Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our...
O’Reilly Media, Inc., 2023. — 340 р. — ISBN-13: 978-1-098-11382-7. Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Attacks can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our...
Apress, 2019. — 149 p. — ISBN13: (electronic): 978-1-4842-5034-1. Explore the adoption of chatbots in business by focusing on the design, deployment, and continuous improvement of chatbots in a business, with a single use-case from the banking and insurance sector. This book starts by identifying the business processes in the banking and insurance industry. This involves data...
Packt Publishing, 2013. — 242 p. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be...
Addison-Wesley, 2007. — 513 p. — ISBN: 0-32-144611-9 Fuzzing has evolved into one of today’s most effective approaches to test software security. To “fuzz,” you attach a program’s inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it’s your turn. In this book, renowned fuzzing experts show...
Apress Media LLC, 2024. — 559 p. — ISBN-13: 979-8-8688-0799-2. Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to...
Springer, 2023. — 356 p. — ISBN 978-3-031-19184-8. This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to...
Apress, 2020. — 221 p. — ISBN13: (electronic): 978-1-4842-5608-4. Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you...
Morgan Kaufmann, 2009. — 878 p. — ISBN: 978-0-12-374354-1. Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including...
Amazon Digital Services LLC, 2015. — 27 p. — ASIN: B019U17G06 A virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the computer system. This will cause the computer to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted. What Is...
Syngress, 2014. — 210 c. — ISBN13: 978-0128020432. The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted...
Syngress, 2014. — 210 c. — ISBN13: 978-0128020432. The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six domains and is narrowly targeted...
2nd Edition. — Jones & Bartlett Learning, 2023. — 500 р. — ISBN 978-1284251470. This text will provide you with an overview of information and cybersecurity and offer a summary of security topics that are addressed in more detail in the Jones & Bartlett Learning “New Information Systems Security & Assurance” series. Cybersecurity is an aspect of information security....
Springer, 2018. — 261 p. — ISBN10: 3319779648, ISBN13: 978-3319779645. With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and...
Birmingham: Packt Publishing, 2022. — 653 p. — ISBN 180107271X. Improve your organization's security posture by performing routine administration tasks flawlessly. Key Features Get a gradual and practical introduction to Check Point firewalls. Acquire the knowledge and skills necessary for effective firewall administration, maintenance, and troubleshooting. Create and operate a...
Edited By Mounia Zaydi, Youness Khourdifi, Bouchaib Nassereddine, Justin Zhang. — CRC Press, 2025. — 242 p. — ISBN: 978-1-003-47867-6. In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a...
Учебное пособие. М.: Интернет-ун-т информ. технологий; БИНОМ. Лаборатория знаний, 2010., — 176 с., ISBN: 978-5-9963-0237-6 Приводится детальный обзор вопросов менеджмента в сфере информационной безопасности на различных организационных уровнях.Цель данного курса - дать представление обо всем комплексе задач организации и управления в сфере информационной безопасности и заложить...
3-е издание, переработанное и дополненное. — М.: ДМК Пресс, 2023. — 440 с., ил. — ISBN 978-5-93700-219-8. Данная книга выдерживает уже третье издание, предлагая читателю глубокое погружение в практические аспекты реализации конкретных атак и средств защиты. Представлены как актуальная техническая информация, так и советы по организации процесса обеспечения информационной...
Монография. — М.: КноРус, 2015. — 160 с.
В монографии серии «Ligitimitate legem et ordinem» («Законность и правопорядок») раскрываются актуальные проблемы обеспечения информационной безопасности деятельности банков и кредитных организаций как составляющей обеспечения национальной безопасности в экономической сфере. Особое внимание уделяется юридическим аспектам банковской...
Новосибирск: Новосибирский государственный университет (НГУ), 2012. — 259 с. Представлен курс лекций «Проблемы безопасности в информационных технологиях», читаемый магистрантам физического факультета НГУ. Лекции могут быть использованы при обучении студентов других технических факультетов. Цель представленного материала — попытка охватить по возможности все аспекты современных...
Учебник для вузов. — М. : Юрайт, 2022. — 309 с. — (Высшее образование). — ISBN 978-5-534-02574-3. Содержание учебного пособия «Криптографические методы защиты информации» охватывает круг вопросов, связанных с теоретическими и прикладными аспектами криптографической защиты информации. Особенность данного учебного пособия состоит в акцентировании внимания на анализе современных...
К.: Гнозіс, 2015. — 216 с. В підручнику розкриваються особливості сучасного інформаційного розвитку та його вплив на підприємницьку діяльність. Основна увага приділена розгляду загроз та ризиків, які обумовлюються інформаційними взаємовідносинами суб’єктів підприємництва, організації їх інформаційної безпеки, використанню інформаційних переваг в бізнесі, діяльності з...
М.: Юрайт, 2022. — 312 с. — (Высшее образование). — ISBN: 978-5-9916-9043-0. В учебнике и практикуме изложены теоретические и практические основы защиты программного обеспечения информационных систем от различных непреднамеренных и злоумышленных действий. Рассмотрены объекты защиты, уязвимости, угрозы безопасности, современные методы и средства защиты программного обеспечения,...
Навчальний посібник. –Київ:Державнийуніверситет телекомунікацій, 2020.- 126 с. В умовах конкурентної боротьби на міжнародному ринку масштаби промислової розвідки різко зростають. Все ширше використовуються плоди науково-технічного прогресу. Промислова розвідка стає більш гнучким і витонченим засобом отримання інформації. Держава своїми законами і підзаконними актами визначила...
Навчальний посібник. — Житомир : Житомирська політехніка, 2025. — 290 с. — ISBN 978-966-683-694-9. Навчальний посібник націлений на те, щоб надати чітке розуміння основ веббезпеки та озброїти читача знаннями для створення більш захищених вебдодатків. Розглянуто базові принципи безпеки вебсистем, механізми контролю доступу, найпоширеніші вразливості, атаки на відмову в...
К.: Альтерпрес, 2006. - 192 с. ІБВХ 966-542-321-5 У монографії на основі широкої джерельної бази здійснено комплексний аналіз та узагальнено досвід ведення інформаційної боротьби у воєнних конфліктах другої половини XX століття, схарактеризовано її форми та засоби, проаналізовано взаємозв'язок з інформаційною війною та інформаційною безпекою. Для фахівців з національної безпеки...
М.: Эксмо, 2023. — 439 с. Перед вами руководство по поиску и измерению рисков в кибербезопасности вашей компании. Устаревшим практикам оценки сетевых угроз автор противопоставляет методы, в основе которых лежат математические вычисления и специальные метрики. С помощью набора инструментов, описанных в его книге, вы сможете не только защититься от возможных угроз, но и...
М.: Эксмо, 2023. — 439 с. Перед вами руководство по поиску и измерению рисков в кибербезопасности вашей компании. Устаревшим практикам оценки сетевых угроз автор противопоставляет методы, в основе которых лежат математические вычисления и специальные метрики. С помощью набора инструментов, описанных в его книге, вы сможете не только защититься от возможных угроз, но и...
М.: Прометей, 2009. — 180 с. Рецензент: кандидат технических наук Гусев Д.М. Учебное пособие (3-е изд. — 2009 г.) представляет собой курс лекций по технологии построения виртуальных защищенных сетей ViPNet. Пособие посвящено теоретическим вопросам использования технологии ViPNet . Рассмотрена терминология, концепции, формы, методы и средства, применяемые в технологии построения...
Пер. с англ. А.В. Снастина. — Москва: ДМК Пресс, 2020. — 388 с. — ISBN: 978-5-97060-713-8. Способна ли технология машинного обучения решить проблемы компьютерной безопасности? Или надежда на это является лишь следствием повышенного внимания к машинному обучению? С помощью этой книги вы изучите способы применения машинного обучения в задачах обеспечения безопасности, таких как...
М.: ДМК Пресс, 2014. — 712 с. — ISBN: 9785940747680 Книга посвящена методам комплексного обеспечения информационной безопасности, технологиям и средствам многоуровневой защиты информации в компьютерных системах и сетях. Анализируются угрозы информационной безопасности в информационных системах и сетях. Обсуждаются принципы политики информационной безопасности. Рассмотрены...
Пер. с англ.: Экслер Алекс. ― М.: Et Cetera Publishing, 2004. ― 160 с. ― (Mенеджeр Mафии. Pуковoдcтва для Бoльшиx Босcoв). ― ISBN 5-94983-030-Х. Увы, друг мой, защита твоей информации – или хотя бы четкое понимание того, что это такое и как подобная защита должна строиться – это Твое Личное Дело! Не Cosa Nostra (хотя твои проблемы могут стать и Нашим Делом тоже), а Cosa Roba –...
Пер. с англ.: Экслер Алекс. ― М.: Et Cetera Publishing, 2004. ― 160 с. ― (Mенеджeр Mафии. Pуковoдcтва для Бoльшиx Босcoв). ― ISBN 5-94983-030-Х. Увы, друг мой, защита твоей информации – или хотя бы четкое понимание того, что это такое и как подобная защита должна строиться – это Твое Личное Дело! Не Cosa Nostra (хотя твои проблемы могут стать и Нашим Делом тоже), а Cosa Roba –...
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-21-8. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
3rd Еdition. — Alexander David, Finch Amanda, Sutton David, Taylor Andy. — BCS, The Chartered Institute for IT, 2020. — 271 р. — ISBN 978-1-780175-21-8. Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information...
De Gruyter Oldenbourg, 2019. — 317 p. — ISBN-13: 978-3110668261. This book outlines key concepts and guidelines for ensuring information security awareness, addressing in detail governance, compliance, and learning processes. From choosing media to integrating new hires, the book provides a comprehensive range of configuration options for raising security awareness. It can...
De Gruyter Oldenbourg, 2019. — 317 p. — ISBN-13: 978-3110668261. This book outlines key concepts and guidelines for ensuring information security awareness, addressing in detail governance, compliance, and learning processes. From choosing media to integrating new hires, the book provides a comprehensive range of configuration options for raising security awareness. It can...
De Gruyter Oldenbourg, 2019. — 317 p. — ISBN-13: 978-3110668261. This book outlines key concepts and guidelines for ensuring information security awareness, addressing in detail governance, compliance, and learning processes. From choosing media to integrating new hires, the book provides a comprehensive range of configuration options for raising security awareness. It can...
Independently published, 2020. — 64 p. — ISBN10: 1670903036, 13 978-1670903037. This book has been written in a way that makes it easy for you to understand this very important subject in today’s world. If you’re a beginner, then this is the book for you. The world is increasingly heading in a digital direction and automation is now becoming the norm; this means that...
Red Bike Publishing, LLC, 2021. — 249 p.— ISBN 1936800314, 9781936800315. ISP and ISOC Master Exam Prep, gives you insight into test taking and has four 110 question length certification practice exams and a set of essay style questions. Part of Security Clearance and Cleared Defense Contractor series This book is designed to give practice questions to those who are eligible to...
Red Bike Publishing, LLC, 2021. — 249 p.— ISBN 1936800314, 9781936800315. ISP and ISOC Master Exam Prep, gives you insight into test taking and has four 110 question length certification practice exams and a set of essay style questions. Part of Security Clearance and Cleared Defense Contractor series This book is designed to give practice questions to those who are eligible to...
2nd Edition. — O’Reilly Media, Inc., 2024. — 417 p. — ISBN 978-1-098-12724-4. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook...
2nd Edition. — O’Reilly Media, Inc., 2024. — 417 p. — ISBN 978-1-098-12724-4. Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook...
Springer, 2025. — 328 p. — ISBN 978-981-96-0554-5. Образование и обучение кибербезопасности This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The...
Manning Publications Co., 2022. — 365 p. — ISBN: 978-1617298998. Data Privacy teaches you to design, develop, and measure the effectiveness of privacy programs. You’ll learn from author Nishant Bhajaria, an industry-renowned expert who has overseen privacy at Google, Netflix, and Uber. The terminology and legal requirements of privacy are all explained in clear, jargon-free...
Manning Publications, 2022. — 384 p. — ISBN-13 978-1617298998. Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy...
Manning Publications, 2022. — 384 p. — ISBN-13 978-1617298998. Engineer privacy into your systems with these hands-on techniques for data governance, legal compliance, and surviving security audits. In Data Privacy you will learn how to: Classify data based on privacy risk Build technical tools to catalog and discover data in your systems Share data with technical privacy...
Apress, 2024. — 262 p. — ISBN-13 979-8-8688-0850-0. CyberDynamx: искусство и наука создания упрощенной программы цифровой безопасности This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical...
Apress, 2024. — 262 p. — ISBN-13 979-8-8688-0850-0. CyberDynamx: искусство и наука создания упрощенной программы цифровой безопасности This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical...
Apress, 2024. — 262 p. — ISBN-13 979-8-8688-0850-0. CyberDynamx: искусство и наука создания упрощенной программы цифровой безопасности This book simplifies the process of formalizing your cybersecurity program into something you can easily understand. Breaking down complex concepts into clear, manageable steps, the concepts are accessible even to those without a deep technical...
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu. — Apress Media LLC, 2023. — 292 p. — ISBN-13: 978-1-4842-8297-7. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a...
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu. — Apress Media LLC, 2023. — 292 p. — ISBN-13: 978-1-4842-8297-7. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a...
Jody Booth, Werner Metz, Anahit Tarkhanyan, Sunil Cheruvu. — Apress Media LLC, 2023. — 292 p. — ISBN-13: 978-1-4842-8297-7. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a...
2nd Edition. — O’Reilly Media, Inc., 2023. — 480 p. — ISBN 978-1-098-12068-9. Cyber-threat intelligence isn’t a new concept, simply a new name for an old approach: applying a structured analytical process to understand an attack and the adversary behind it. The application of threat intelligence to network security is more recent, but the basics haven’t changed. Cyber-threat...
2nd Edition. — Sybex, John Wiley & Sons, Inc., 2025. — 352 p. — ISBN: 978-1-394-28492-4. Полное руководство по подготовке к экзамену CIPP / US Your ultimate guide to preparing for the CIPP/US exam. Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the...
2nd Edition. — Sybex, John Wiley & Sons, Inc., 2025. — 352 p. — ISBN: 978-1-394-28492-4. Полное руководство по подготовке к экзамену CIPP / US Your ultimate guide to preparing for the CIPP/US exam. Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the...
Sybex, 2023. — 208 p. — ISBN-13: 978-1-394-19655-5. Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud....
Apress Media LLC, 2025. — 518 p. — ISBN-13: 979-8-8688-0432-8. Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your...
O’Reilly Media, Inc., 2024. — 200 р. — ISBN-13: 978-1-098-13370-2. Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as...
Addison-Wesley Professional/Pearson Education, 2024. — 448 p. — ISBN-13 978-0-13-807373-2. An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative...
Addison-Wesley Professional/Pearson Education, 2024. — 448 p. — ISBN-13 978-0-13-807373-2. An all-encompassing guide to securing your database and applications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative...
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 117 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all...
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 83 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all...
PCI DSS 3.2 edition. — Amazon Digital Services LLC, 2017. — 84 p. — ASIN: B073WRTJNL. Volume in the series explaining the PCI DSS. This volume tries to provide actual real-life examples of how to address PCI DSS. They remain hypothetical since none of the fictitious companies are clients of mine. But the information is nonetheless based on experience serving clients of all...
Independently published, 2023. — 56 p. — ASIN: B0C1KVRH2K. Need experience to land that new job role as an SOC Analyst? Get that experience from the comfort of your home and ace that job interview using the experiences gained by simulating everyday real-life situations faced by an SOC Analyst. Welcome to “SOC Workflow and Procedures: Streamlining Security Operations for Optimal...
Independently published, 2023. — 56 p. — ASIN: B0C1KVRH2K. Need experience to land that new job role as an SOC Analyst? Get that experience from the comfort of your home and ace that job interview using the experiences gained by simulating everyday real-life situations faced by an SOC Analyst. Welcome to “SOC Workflow and Procedures: Streamlining Security Operations for Optimal...
IGI Global, 2024. — 319 p. — ISBN 9798369314319. Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their...
Apress, 2021. — 230 p. Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels. The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a...
Springer, 2024. — 102 p. — ISBN 978-3031637803, 3031637801, ASIN B0D64WTYW5. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to...
Springer, 2024. — 102 p. — ISBN 978-3031637803, 3031637801, ASIN B0D64WTYW5. This book delves into the transformative concept of Zero Trust, challenging traditional notions of network security and advocating for a paradigm shift in cybersecurity strategies. Beginning with an exploration of the fundamentals behind Zero Trust and its core principles, the book progresses to...
Ibrahim Habli, Mark Sujan, Simos Gerasimou, Erwin Schoitsch, Friedemann Bitsch. — Springer, 2021. — 335 p. — ISBN 978-3-030-83905-5. This book constitutes the proceedings of the Workshops held in conjunction with SAFECOMP 2021, the 40th International Conference on Computer Safety, Reliability and Security, which took place in York, UK, in September 2021. The 26 regular papers...
Packt Publishing, 2017. — 1045 p. — ASIN: B01N35OHY0. Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Pentest Android apps and perform various attacks in the real world using real case studies Who This Book Is For This course is for...
IT Governance Publishing, 2022. — 206 p. — ISBN 978-1-78778-367-6. This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu’s The Art of War. So why is the reporting of cyber attacks so low? Why...
Fullstack.io, 2020. — 131 p. — ISBN: n/a. Revision 7 – 2020-04-17 Most of the marketing employed by the security industry tends to rely on a bit of fear-mongering. It’s easy to sell sensationalism — to say that “everything is broken” and cause a sense of alarm and hopelessness. The goal of this book is not to impart fear, but knowledge. Informed individuals are less likely to...
John Wiley & Sons, Inc., 2023. — 336 p. — ISBN: 978-1-394-15850-8. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll...
John Wiley & Sons, Inc., 2023. — 336 p. — ISBN: 978-1-394-15850-8. Discover the new cybersecurity landscape of the interconnected software supply chain In Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll...
John Wiley & Sons, 2024. — 400 р. — ISBN 13: 978-1394222544. It is commonly understood that social engineering is one of the biggest challenges modern society faces. Highly orchestrated social engineering campaigns target corporate workers with credential harvesting attacks, wire fraud, and business opportunity scams. It even plagues our personal lives, from calls about your...
John Wiley & Sons, Inc., 2025. — 416 p. — ISBN: 978-1394171705. Unlock the power of secure coding with this straightforward and approachable guide! Discover a game-changing resource that caters to developers of all levels with Alice and Bob Learn Secure Coding. With a refreshing approach, the book offers analogies, stories of the characters Alice and Bob, real-life examples,...
2nd Edition. — Packt Publishing, 2020. — 548 p. — ISBN: 978-1-83864-900-5. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks....
2nd Edition. — Packt Publishing, 2020. — 548 p. — ISBN: 978-1-83864-900-5. Build your organization’s cyber defense system by effectively implementing digital forensics and incident management techniques An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization’s infrastructure from attacks....
Springer, 2021. — 448 p. — ISBN 978-3-030-78119-4. This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.* The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical...
Independently published, 2021. — 168 p. — ISBN B08Y8HDG27. The book is designed to introduce fundamental concepts of information systems security by providing you with an understanding of the importance of information security and several techniques of planning and managing information systems security methods, frameworks and ethics. The book provides details of key information...
Independently published, 2021. — 168 p. — ISBN B08Y8HDG27. The book is designed to introduce fundamental concepts of information systems security by providing you with an understanding of the importance of information security and several techniques of planning and managing information systems security methods, frameworks and ethics. The book provides details of key information...
Apress Media LLC, 2025. — 548 p. — ISBN-13: 979-8-8688-1029-9. Обеспечение безопасности предприятия: максимальное использование цифровых технологий за счет усиления мер безопасности Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing....
Apress Media LLC, 2025. — 548 p. — ISBN-13: 979-8-8688-1029-9. Обеспечение безопасности предприятия: максимальное использование цифровых технологий за счет усиления мер безопасности Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing....
Apress Media LLC., 2024. — 179 p. — ISBN-13: 979-8-8688-0870-8. In today’s digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all...
Apress Media LLC., 2024. — 179 p. — ISBN-13: 979-8-8688-0870-8. In today’s digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all...
Springer, 2022. — 105 p. This Springer book contains eight chapters and presents an overview of the evolution of the Moroccan Cybersecurity Strategy. It also draws attention to the development of cybersecurity in Morocco and to ensure national security in the context of the current and developing information confrontation in the international community. However, it cannot...
Packt Publishing, 2018. — 510 p. — ISBN 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical...
Packt Publishing, 2018. — 510 p. — ISBN 1788392507. Understand malware analysis and its practical implementation Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical...
McGraw-Hill, 2020. — 480 p. — ISBN: 978-1-26-046007-0. HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide Prepare for the current release of the HealthCare Information Security and Privacy Practitioner (HCISPP) exam using the detailed information contained in this effective self-study resource. Written by a healthcare information security and...
Leanpub, 2020. — 161 p. — ISBN 1670062449, 9781670062444. As software engineers, we often think of security as an afterthought: build it, then fix it later. Truth is, knowing a few simple browser features can save you countless hours banging your head against a security vulnerability reported by a user. This book is a solid read that aims to save you days learning about...
Apress Media LLC, 2024. — 384 p. — ISBN-13: 979-8-8688-0838-8. This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud,...
Apress Media LLC, 2024. — 384 p. — ISBN-13: 979-8-8688-0838-8. This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud,...
Apress Media LLC, 2023. — 158 p. — ISBN-13: 978-1-4842-9361-4. Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with...
Apress Media LLC, 2023. — 158 p. — ISBN-13: 978-1-4842-9361-4. Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with...
Apress Media LLC, 2024. — 213 p. — ISBN-13: 979-8-8688-0461-8. This book will help you comprehend the impact of artificial intelligence (AI) on information security, data privacy, and data security. The book starts by explaining the basics and setting the goals for a complete understanding of how AI, Information Security, Data Privacy, and Data Security all connect. Then, it...
17th Edition. — Papercut Ltd., 2024. — 100 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
16th Edition. — Papercut Ltd., 2023. — 98 p. Having completed our exclusive For Beginners digital guidebook, we have taught you all you need to master the basics of your new device, software or hobby. Yet that's just the start! Advancing your skill set is the goal of all users of consumer technology and our team of long term industry experts will help you achieve exactly that....
Springer, 2004. — 145 p. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework...
6th Edition. — Addison-Wesley/Pearson, 2024. — 1026 р. — ISBN-13: 978-0-13-789121-4. The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing. Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information...
Wiley-IEEE Press, 2023. — 387 p. — ISBN 9781119875420. 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and...
No Starch Press, 2018. — 272 p. — ISBN13: 978-1-59327-859-5. Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a “big data” problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of...
Wiley, 2023. — 354 p. Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a...
Wiley, 2023. — 354 p. Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a...
Springer, 2023. — 144 p. — ISBN 978-3-031-24215-1. This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the...
Apress, 2019. — 149 p. — ISBN13: (electronic): 978-1-4842-5034-1. Explore the adoption of chatbots in business by focusing on the design, deployment, and continuous improvement of chatbots in a business, with a single use-case from the banking and insurance sector. This book starts by identifying the business processes in the banking and insurance industry. This involves data...
Apress Media LLC, 2024. — 559 p. — ISBN-13: 979-8-8688-0799-2. Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to...
Apress Media LLC, 2024. — 559 p. — ISBN-13: 979-8-8688-0799-2. Delve deep into the forefront of technological advancements shaping the future of supply chain safety and resilience. In an era where software supply chains are the backbone of global technology ecosystems, securing them against evolving threats has become mission critical. This book offers a comprehensive guide to...
CRC Press, 2025. — 284 р. — (Security, Audit and Leadership Series). — ISBN: 978-1-003-39069-5. In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain–computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come...
CRC Press, 2025. — 284 р. — (Security, Audit and Leadership Series). — ISBN: 978-1-003-39069-5. In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain–computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate. However, with these advancements come...
Apress, 2020. — 221 p. — ISBN13: (electronic): 978-1-4842-5608-4. Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you...
Amazon Digital Services LLC, 2015. — 14 p. — ASIN: B019U17G06 A virus will function as an element that will constitute damage to the hard disk contents or interfere with the normal operational executions of the computer system. This will cause the computer to be unable to function properly until the virus is eliminated and the overall system is overhauled and rebooted. What Is...
2nd Edition. — Apress Media LLC., 2024. — 289 p. — ISBN: 979-8-8688-0345-1. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your...
2nd Edition. — Apress Media LLC., 2024. — 289 p. — ISBN: 979-8-8688-0345-1. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your...
Apress Media LLC., 2021. — 134 p. — ISBN-13 (electronic): 978-1-4842-6904-6. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start...
Apress Media LLC., 2021. — 134 p. — ISBN-13 (electronic): 978-1-4842-6904-6. The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start...
No Starch Press, 2025. — 376 p. — ISBN-13: 978-1-7185-0379-3. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these...
No Starch Press, 2025. — 376 p. — ISBN-13: 978-1-7185-0379-3. As renowned Mac security expert Patrick Wardle notes in The Art of Mac Malware, Volume 2, the substantial and growing number of Mac users, both personal and enterprise, has created a compelling incentive for malware authors to ever more frequently target macOS systems. The only effective way to counter these...
No Starch Press, 2022. — 320 p. — ISBN-13: 978-1-7185-0195-9. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's...
No Starch Press, 2022. — 320 p. — ISBN-13: 978-1-7185-0195-9. Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what's...
No Starch Press, Inc., 2024. — 416 р. — ISBN 13: 978-1098168780. Welcome to the world of locksport, the sport of defeating locks. Whether you’re new to the challenge of lockpicking or aiming for championship gold, this book serves as your definitive guide, packed with practical advice from a team of experts. DIVE INTO THE ESSENTIALS WITH LOCKSPORT FOUNDATIONS How various locks...
No Starch Press, Inc., 2024. — 416 р. — ISBN 13: 978-1098168780. Welcome to the world of locksport, the sport of defeating locks. Whether you’re new to the challenge of lockpicking or aiming for championship gold, this book serves as your definitive guide, packed with practical advice from a team of experts. DIVE INTO THE ESSENTIALS WITH LOCKSPORT FOUNDATIONS How various locks...
Springer, 2023. — 142 p. — (Digital Privacy and Security). — ISBN 978-981-19-8691-8. Безопасность и конфиденциальность в федеративном обучении In this book, the authors highlight the latest research findings on the security and privacy of Federated Learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference,...
Edited By Mounia Zaydi, Youness Khourdifi, Bouchaib Nassereddine, Justin Zhang. — CRC Press, 2025. — 242 p. — ISBN: 978-1-003-47867-6. In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a...
Edited By Mounia Zaydi, Youness Khourdifi, Bouchaib Nassereddine, Justin Zhang. — CRC Press, 2025. — 242 p. — ISBN: 978-1-003-47867-6. In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a...
Учебное пособие — 2-е изд., стер. — Москва: КноРус, 2018. — 132 с. — (Бакалавриат). Включает в себя 12 методических описаний лабораторных работ по курсу «Информационная безопасность». Все практические задания снабжены необходимыми теоретическими сведениями и комплектом исполняемых модулей. Материал поделен на три части, чтобы преподаватель в зависимости от количества часов,...
М.: МГТУ им. Н. Э. Баумана, 2016. — 252 с. — ISBN: 978-5-7038-4414-4 Рассмотрена законодательная база информационной безопасности, приведен перечень возможных угроз, отражены основные подходы к созданию систем защиты информации, представлена классификация предупредительных мер, изучены вопросы, связанные с программно-аппаратными механизмами обеспечения информационной безопасности....
SelfPub, 2019. — 270 с. — ISBN: 978-5-5321-0945-2. Появление негласного контроля какого-либо вида связи всегда связано с рождением этого вида связи. Так, несанкционированное вскрытие писем началось вместе с почтовой связью. Книга рассказывает историю рождения и развития спецслужб, занимающихся перлюстрацией почтовой переписки в странах Европы, США, Российской империи, СССР и...
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
Ужгород: Ужгородський національний університет, 2013. — 161 с. Збірник лекцій. Формування вимог, розробка технічного завдання, проектування, впровадження та супровід комплексної системи захисту інформації в інформаційно-телекомунікаційній системі. Головні принципи та етапи захисту від загроз. Номативно-правове забезпечення захисту інформації Етапи створення КСЗІ в ІТС 1-й етап...
М.: ДМК Пресс, 2023. — 226 с. Даже самые продвинутые службы безопасности мало что могут сделать для защиты от вреда, причиняемого простым сотрудником, который перешел по вредоносной ссылке, открыл вложение электронной почты или раскрыл конфиденциальную информацию во время телефонного звонка. Эта книга поможет вам лучше понять методы, лежащие в основе атак социальной инженерии,...
М.: ДМК Пресс, 2020. — 326 с. — ISBN: 9785970607091. Когда ландшафт угроз постоянно расширяется, возникает необходимость иметь надежную стратегию в области безопасности, т.е. усиление защиты, обнаружения и реагирования. На протяжении этой книги вы будете изучать методы атак и шаблоны, позволяющие распознавать аномальное поведение в вашей организации, используя тактические...
М.: Манн, Иванов и Фербер, 2021. — 209 с. Компании тратят огромные средства, чтобы их активы и данные были под надежной защитой, однако киберриски только возрастают, что лишь усугубляет проблему. И никакие новые технологии или раздувание бюджета не в силах переломить эту ситуацию. Томас Паренти и Джек Домет больше 30 лет занимаются вопросами кибербезопасности. В этом...
М.: Манн, Иванов и Фербер, 2021. — 209 с. Компании тратят огромные средства, чтобы их активы и данные были под надежной защитой, однако киберриски только возрастают, что лишь усугубляет проблему. И никакие новые технологии или раздувание бюджета не в силах переломить эту ситуацию. Томас Паренти и Джек Домет больше 30 лет занимаются вопросами кибербезопасности. В этом...
Юрайт, 2022. — 312 c. Учебник и практикум для вузов В учебнике и практикуме изложены теоретические и практические основы защиты программного обеспечения информационных систем от различных непреднамеренных и злоумышленных действий. Рассмотрены объекты защиты, уязвимости, угрозы безопасности, современные методы и средства защиты программного обеспечения, а также нормативные...
Москва: ДМК Пресс, 2020. — 308 с. — ISBN: 978-5-97060-649-0. Эта книга - подробное пошаговое руководство по эффективному использованию доступных инструментов обеспечения безопасности сетей. Её оценят как опытные специалисты по безопасности, так и новички. Подробно рассматриваются процессы сбора и организации данных, инструменты для их анализа, а также различные аналитические...
Москва: ДМК Пресс, 2020. — 308 с. — ISBN: 978-5-97060-649-0. Эта книга - подробное пошаговое руководство по эффективному использованию доступных инструментов обеспечения безопасности сетей. Её оценят как опытные специалисты по безопасности, так и новички. Подробно рассматриваются процессы сбора и организации данных, инструменты для их анализа, а также различные аналитические...
М.: Юрайт, 2023. — 112 c. — (Высшее образование). — ISBN 978-5-534-12769-0. В настоящем учебном пособии исследуются актуальные вопросы информационной безопасности, ее уголовно-правовой охраны с учетом последних изменений законодательства. Рассматривается значение информации и информационного обмена в жизни современного общества как значимой социальной ценности, подлежащей...
Учебно-методическое пособие. — Красноярск: Сибирский федеральный университет, 2014. — 17 с. Приведены основные термины по дисци-плине «Информационная безопасность и защита информации», а также список необходимой литературы для самостоятельной подготовки студента. Предназначено для студентов-бакалавров направления 034700 «Документоведение и архивоведение». Введение....
С-Пет.; «Питер», 2024. — 272 c. — ISBN 978-5-4461-4120-3. Чем выше поднимается уровень благосостояния и власти человека, тем больший возникает соблазн у окружающих его нечестных людей воспользоваться знакомством с влиятельной персоной, а также его имуществом для собственного обогащения и продвижения по карьере. В книге разбираются собственные точки уязвимости состоятельного...
С-Пет.; «Питер», 2024. — 272 c. — ISBN 978-5-4461-4120-3. Чем выше поднимается уровень благосостояния и власти человека, тем больший возникает соблазн у окружающих его нечестных людей воспользоваться знакомством с влиятельной персоной, а также его имуществом для собственного обогащения и продвижения по карьере. В книге разбираются собственные точки уязвимости состоятельного...
М.: ДМК Пресс, 2018. — 226 с.: ил. Материал книги помогает разобраться в том, что обычно скрывается за терминами и шаблонными фразами «взлом электронной почты», «кибершпионаж» и «фишинг». Автор старался показать информационную безопасность как поле битвы с трех сторон: со стороны преступного сообщества, использующего информационные технологии, со стороны законодательства и...
Навчальний посібник. – Київ : КПІ ім. Ігоря Сікорського, 2020. – 78 с. Викладено основні поняття сучасного підходу до інформаційної безпеки та захисту даних в комп’ютерних технологіях і мережах. Наведено моделі загроз інформації та основні механізми і протоколи її захисту. Викладено математичні засади криптографічного перетворення даних та, засновані на теорії чисел,...
Прометей, 2020. - 522 с. В книге рассматриваются вопросы, связанные как с обеспечением кибербезопасности в условиях применения систем электронного банкинга, так и с анализом источников рисков, возникающих при использовании технологии дистанционного банковского обслуживания. Описаны основные принципы управления рисками электронного банкинга. Рассмотрены риски, возникающие в...
Прометей, 2020. - 522 с. В книге рассматриваются вопросы, связанные как с обеспечением кибербезопасности в условиях применения систем электронного банкинга, так и с анализом источников рисков, возникающих при использовании технологии дистанционного банковского обслуживания. Описаны основные принципы управления рисками электронного банкинга. Рассмотрены риски, возникающие в...
Учебное пособие. — 2-е изд. — СПб.: Питер, 2019. — 306 с. — (Учебник для вузов). — ISBN 978-5-4461-1275-3. В учебном пособии рассмотрено более 230 действующих открытых документов национальной системы стандартизации Российской Федерации, включая международные и межгосударственные стандарты в области информационной безопасности. Учебное пособие предназначено для студентов высших...
К.: Альтерпрес, 2006. - 192 с. ІБВХ 966-542-321-5 У монографії на основі широкої джерельної бази здійснено комплексний аналіз та узагальнено досвід ведення інформаційної боротьби у воєнних конфліктах другої половини XX століття, схарактеризовано її форми та засоби, проаналізовано взаємозв'язок з інформаційною війною та інформаційною безпекою. Для фахівців з національної безпеки...
К.: Альтерпрес, 2006. — 192 с. — ISBN 966-542-321-5. У монографії на основі широкої джерельної бази здійснено комплексний аналіз та узагальнено досвід ведення інформаційної боротьби у воєнних конфліктах другої половини XX століття, схарактеризовано її форми та засоби, проаналізовано взаємозв'язок з інформаційною війною та інформаційною безпекою. Для фахівців з національної...
К.: Альтерпрес, 2006. — 192 с. — ISBN 966-542-321-5. У монографії на основі широкої джерельної бази здійснено комплексний аналіз та узагальнено досвід ведення інформаційної боротьби у воєнних конфліктах другої половини XX століття, схарактеризовано її форми та засоби, проаналізовано взаємозв'язок з інформаційною війною та інформаційною безпекою. Для фахівців з національної...
К.: Альтерпрес, 2006. — 192 с. — ISBN 966-542-321-5. У монографії на основі широкої джерельної бази здійснено комплексний аналіз та узагальнено досвід ведення інформаційної боротьби у воєнних конфліктах другої половини XX століття, схарактеризовано її форми та засоби, проаналізовано взаємозв'язок з інформаційною війною та інформаційною безпекою. Для фахівців з національної...
Прикладной курс. — Пер. с англ. Д. А. Беликова. — М.: ДМК Пресс, 2021. — 436 с.: ил. — ISBN 978-5-97060-484-7. Эта книга написана практиками и для практиков, которым необходимо ежедневно выявлять действия злоумышленников в сетях и сдерживать кибератаки. Опираясь на свой опыт расследования вторжений, а также консультирования глобальных клиентов и разработки средств для цифровой...
Тогда, как найти среди множества стандартов нужный безопаснику? И определить, что он касается безопасности. По поиску, оно понятно — можно. И все же, может какую-нибудь перекрестную ссылку дать? При этом классификации стандартов, могут быть разными, в т.ч. рекомендованные ГОСТ Р.
По названию и описанию - в них же человеческие слова, наполненные смыслом, а не бездушные инопланетные иероглифы. Полагаю из слов, которые в названии и описании можно понять подход файл или нет.
Согласен! Но, согласитесь и Вы, что если стандарты по информационной безопасности были бы в разделе соответствующем, было не так уж и плохо. Жаль, что невозможно реализовать присутствие в двух местах.
А что делать в случае, если: 1. Методические материалы не относятся к "Учебно-методическим материалам"? 2. Рефераты и доклады, презентации не относятся к "Студенческим работам"?
Например: 1. /files/informatics/security/hacking/ft.presentation/ - это презентация компании "Lieberman Software", вице-президента Смородинского Льва Исааковича, состоявшаяся на "VII Уральском форуме «Информационная безопасность банков»" Далее, практически все мои выложенные презентации, они не студенческие, а практически все или топ-менеджмента компаний или руководителей государственный структур, поэтому как-то переводить их в ранг студентов ну как-то нелепо. Поэтому, может все-таки пусть это будут презентации (общие или еще какое название), а не презентации, которые попадают в случае применения фильтра по выбору типа файла в "Студенческие работы-Презентации". То есть по идее я должен установить тип файла, я применяю "Презентации" и он попадает в раздел Студенческие работы. В котором есть подраздел презентации. Еще один пример презентации всеми уважаемого начальника управления ФСТЭК России Лютикова Виталия Сергеевича: Развитие нормативно-правовых и методических документов ФСТЭК России в области защиты конфиденциальной информации, которую я размещал в раздел "Организационно-правовое обеспечение ИБ". Ввиду того, что это презентация, состоявшаяся в рамках V Конференция "Актуальные вопросы защиты информации" на ТФ Форуме-2015, то я естественно, применил фильтр Типа файла - Презентация. В итоге, это файл попал в подраздел Студенческие работы, а там соответственно в "Презентации". Поэтому, парадигма, применяя правильно "фильтр типа файлов", файл начальника управления ФСТЭК России Лютикова Виталия Сергеевича, попадает в "Студенческие работы". А Если выбирать тип файла "другое", то по сути презентация не находит своего должного соответствия. Прошу разъяснить, как поступать в дальнейшем при выборе " Фильтра типа файлов" в таких случаях.
Стал оформлять файлы по Вашей рекомендации! Файлы, несколько дней назад были приняты. А сегодня 17 моих файлов приобрели статус "ожидают проверки" со следующем комментарием:
Уточните тип файлаПри добавлении студенческой работы следует правильно указывать ее тип в соответвующем поле.Для книг, методичек и учебных пособий в поле "название" следует указать автора (или авторов) и заголовок, а в качестве типа файла указать «Другое».Например: Сидоров К.П., Зенцова А.Ю. Теоретические основы электротехники Петров В.И. Методические указания по ЭкономикеА вообще, правила и примеры оформления файлов можно посмотреть в специальном разделе FAQ.Задать вопрос модератору по поводу данного замечания вы можете через комментарии на странице вашего файла.Если данное замечание не будет исправлено, то файл будет автоматически удален через 13 дней и 22 часа
Вот и получается на практике: "Не верь глазам своим!". Презентация - это не презентация, а другое. Интересно, а по статистике из выложенных презентаций, все ли презентации относятся к студенческим работам? Я заметил, что некоторые выложенные презентации принадлежат не студентам, а преподавателям. При этом, выбирая тип файла, который больше соответствует по содержанию, типу и форме, никто ведь не подозревает, что реферат, доклад, презентация попадают в разряд студенческих работ.Может просто убрать Студенческие работы и станет всё в соответствие.
Комментарии
В свою очередь, его разделить на две подрубрики, а именно:
-Государственные (национальные) стандарты РФ
ГОСТ Р 50922-2006 Защита информации. Основные термины и определения
ГОСТ Р 51188-98 Защита информации. Испытания программных средств на наличие компьютерных вирусов. Типовое руководство
ГОСТ Р 51275-2006 Защита информации. Объект информатизации. Факторы, воздействующие на информацию. Общие положения
ГОСТ Р ИСО/МЭК 15408-1-2008 Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 1. Введение и общая модель
ГОСТ Р ИСО/МЭК 15408-2-2008 - Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 2. Функциональные требования безопасности
ГОСТ Р ИСО/МЭК 15408-2-2013 Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 2. Функциональные компоненты безопасности
ГОСТ Р ИСО/МЭК 15408-3-2008. Информационная технология. Методы и средства обеспечения безопасности. Критерии оценки безопасности информационных технологий. Часть 3. Требования доверия к безопасности
ГОСТ Р ИСО/МЭК 17799-2005 Информационная технология. Практические правила управления информационной безопасностью
ГОСТ Р ИСО/МЭК 27002-2012 Информационная технология. Методы и средства обеспечения безопасности. Свод норм и правил менеджмента информационной безопасности
ГОСТ Р 51110-97 Средства защитные банковские. Общие технические требования
ГОСТ Р 51111-97 Средства защитные банковские. Правила приемки и методы испытаний
ГОСТ Р 51624-2000 Автоматизированные информационные системы в защищенном исполнении
и т.д. Международные стандарты
ISO/IEC 27000: 2014 Information technology - Security techniques - Information security management systems - Overview and vocabulary
ISO/IEC 27001. Information technology. Security techniques. Information security management systems: RequirementsВозможно только в один подраздел: стандарты информационной безопасности (защиты информации)
При этом классификации стандартов, могут быть разными, в т.ч. рекомендованные ГОСТ Р.
Полагаю из слов, которые в названии и описании можно понять подход файл или нет.
1. Методические материалы не относятся к "Учебно-методическим материалам"?
2. Рефераты и доклады, презентации не относятся к "Студенческим работам"?
1. /files/informatics/security/hacking/ft.presentation/ - это презентация компании "Lieberman Software", вице-президента Смородинского Льва Исааковича, состоявшаяся на "VII Уральском форуме «Информационная безопасность банков»"
Далее, практически все мои выложенные презентации, они не студенческие, а практически все или топ-менеджмента компаний или руководителей государственный структур, поэтому как-то переводить их в ранг студентов ну как-то нелепо.
Поэтому, может все-таки пусть это будут презентации (общие или еще какое название), а не презентации, которые попадают в случае применения фильтра по выбору типа файла в "Студенческие работы-Презентации".
То есть по идее я должен установить тип файла, я применяю "Презентации" и он попадает в раздел Студенческие работы. В котором есть подраздел презентации.
Еще один пример презентации всеми уважаемого начальника управления ФСТЭК России Лютикова Виталия Сергеевича:
Развитие нормативно-правовых и методических документов ФСТЭК России в области защиты конфиденциальной информации, которую я размещал в раздел "Организационно-правовое обеспечение ИБ".
Ввиду того, что это презентация, состоявшаяся в рамках V Конференция "Актуальные вопросы защиты информации" на ТФ Форуме-2015, то я естественно, применил фильтр Типа файла - Презентация.
В итоге, это файл попал в подраздел Студенческие работы, а там соответственно в "Презентации".
Поэтому, парадигма, применяя правильно "фильтр типа файлов", файл начальника управления ФСТЭК России Лютикова Виталия Сергеевича, попадает в "Студенческие работы".
А Если выбирать тип файла "другое", то по сути презентация не находит своего должного соответствия.
Прошу разъяснить, как поступать в дальнейшем при выборе " Фильтра типа файлов" в таких случаях.
Тем более что автора вы и так указываете.
Дальнейшее обсуждение не считаю целесообразным.
Dixi.