Книги по компьютерной безопасности

Скачать Steve Sinchak - Hacking Windows Vista: ExtremeTech ( книгу / аудиокнигу ) бесплатно

Скачать Steve Sinchak - Hacking Windows Vista: ExtremeTech ( книгу / аудиокнигу ) бесплатно

Steve Sinchak - Hacking Windows Vista: ExtremeTech Год выпуска: 2007 Автор: Стив Синчак / Steve Sinchak Жанр: Руководство Издательство: Wiley ISBN: 0470046876 Формат: CHM Качество: eBook (изначально компьютерное) Количество страниц: 316 Описание: Vista - самое радикальное обновление Windows с 1995. Однако, наряду со всеми усовершенствованиями, есть несколько вещей, которые вероятно вам хотелось изменить. Не волнуйтесь, следуя советам Стива Синчека вы закончите тем, что почувствуете, как если бы Microsoft проектировал Vista только для вас! Он покажет вам, как изменить параметры настройки экрана входа в систему, встроить собственные Sidebar-гаджеты, индивидуализировать Aero Glass с темами и визуальными стилями, превратить Ваш PC в медиа центр HDTV, настроить вашу систему сетевой защиты, и более. Доп. информация: Эта книга предназначена для всех пользователей Windows Vista, которые интересуются настройкой операционной системы... Читать дальше »

Скачать Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks ( книгу / аудиокнигу ) бесплатно

Скачать Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks ( книгу / аудиокнигу ) бесплатно

Written by a well-respected, well-known information security researcher, this fascinating narrative explores some unique, uncommon and often quite elegant security challenges that defy classification and eschew the traditional attacker-victim model. Доп. информация: This is an unconventional book. It is not a compendium of problems or a guide to securing your systems. It begins with an attempt to follow the story of a piece of information, from the moment your hands touch the keyboard, all the way to the remote party on the other end of the wire. It covers the technology and its security implications, focusing on problems that cannot be qualified as bugs, with no attacker, no flaw to be analyzed and resolved, or no detectable attack (or at least not one that we can distinguish from legitimate activity). The goal of this book is to demonstrate that the only way to understand the Internet is to have the courage to go beyond the specifications or read between the lines. Читать дальше »

Скачать Hacking Firefox™. More Than 150 Hacks, Mods, and Customizations ( книгу / аудиокнигу ) бесплатно

Скачать Hacking Firefox™. More Than 150 Hacks, Mods, and Customizations ( книгу / аудиокнигу ) бесплатно

To use this book, all you need to do is have a basic understanding of how Firefox works, how to install it, and how to find files on your computer.As you read, you will begin to unravel the marvels of coding for Firefox using the basics of Cascading Style Sheets (CSS) and JavaScript and then later diving into XML User Interface Language (XUL) and the Cross Platform Component Object Model (XPCOM).The final goal is being able to create extensions that will allow you to customize Firefox to your heart’s content. This book starts by giving you a brief overview of how to hack manually, how to hack with extensions, and then a quick glance at what you will need to do to back up critical files so that you can practice safe hacking. Then it breaks down each of the individual components of Firefox from interface to rendering to privacy and walks you through hacking and modifying key files to apply tons of possible interface and functionality changes. It also includes a great list of pr... Читать дальше »

Скачать Hacking Windows Vista ( книгу / аудиокнигу ) бесплатно

Скачать Hacking Windows Vista ( книгу / аудиокнигу ) бесплатно

Hacking Windows Vista Год выпуска: 2007 Автор: Steve Sinchak Жанр: Практическое пособие Издательство: John Wiley & Sons ISBN:9780470046876 Формат: Обычный текст Качество: OCR без ошибок Количество страниц: 337 Описание: Learn how to personalize and improve your Windows Vista experience! With help from this hands-on guide, you'll discover how to customize, speed up, and secure your Windows Vista computer in no time. Читать дальше »

Скачать Cryptography for Developers ( книгу / аудиокнигу ) бесплатно

Скачать Cryptography for Developers ( книгу / аудиокнигу ) бесплатно

The only guide for software developers who must learn and implement cryptography safely and cost effectively. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the industry standard cryptographic suite of tools called LibTom * A regular expert speaker at industry conferences and events on this development * The book has a companion Web site with over 300-pages of text on implementin... Читать дальше »

Скачать The Best of 2600: A Hacker Odyssey ( книгу / аудиокнигу ) бесплатно

Скачать The Best of 2600: A Hacker Odyssey ( книгу / аудиокнигу ) бесплатно

The Best of 2600: A Hacker Odyssey Год выпуска: 2008 Автор: Emmanuel Goldstein Жанр: Security / Hacking / History Издательство: Wiley Publishing, Inc. ISBN: 978-0-470-29419-2 Формат: PDF Качество: eBook (изначально компьютерное) Количество страниц: 890 Язык: английский Описание: Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer «red box» that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks. It's colorful, controversial, cutting-edge — and you can't ... Читать дальше »

Скачать The Myths of Security ( книгу / аудиокнигу ) бесплатно

Скачать The Myths of Security ( книгу / аудиокнигу ) бесплатно

The Myths of Security Год выпуска: 2009 Автор: John Viega Цена: $23.99 Издательство: O'Reilly ISBN: 9780596523022 Формат: PDF Качество: eBook (изначально компьютерное) Количество страниц: 260 Описание: If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online. Full Description If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the... Читать дальше »

Скачать Defend I.T. Security by Example ( книгу / аудиокнигу ) бесплатно

Скачать Defend I.T. Security by Example ( книгу / аудиокнигу ) бесплатно

What does a cyber security professional do? This is a question often posed by individuals who have heard a lot about security—especially the need to secure their electronic assets—but who are not entirely clear on what is involved. Cyber security involves a variety of things. Although we, the cyber security professionals, understand the various aspects of our jobs, it is often difficult to explain to people outside the profession (even our spouses) what exactly we do, and what exactly needs to be done to secure electronic assets. The details of many professions are difficult to describe, so examples often offer the best means of explanation. Security is no different. In this book we hope to provide some insight into cyber security by using case studies to describe what a cyber security professional does. We hope that this collection of case studies will serve as a tour of many of the issues that cyber security professionals face, not only in their careers but in their day-to-... Читать дальше »

Скачать CISA Review Manual 2008 ( книгу / аудиокнигу ) бесплатно

Скачать CISA Review Manual 2008 ( книгу / аудиокнигу ) бесплатно

CISA Review Manual 2008 Год выпуска: 2008 Автор: ISACA Издательство: isaca.org Формат: PDF Качество: eBook (изначально компьютерное) Количество страниц: много =) Описание: Подготовительные материалы к экзамену CISA. Общий объем 6 разделов (содержание в соответствии с требованиями экзамена). www.isaca.ru Программа сертификации CISA направлена на сертификацию специалистов в области управления информационной безопасностью, но имеют несколько разный фокус внимания. Программа CISA (Certified Information Security Auditor) является одной из старейших и была принята в 1978 году. Она разработана и развивается организацией ISACA (Information System Audit and Control Association). Как ясно из названия, программа направлена на сертификацию аудиторов безопасности информационных систем. Напомним, что в задачу аудитора входит проверка соответствия политик безопасности компании требованиям законодательства, стандартам в области управления безопасность... Читать дальше »

Скачать Hacking Exposed - собрание книг ( книгу / аудиокнигу ) бесплатно

Скачать Hacking Exposed - собрание книг ( книгу / аудиокнигу ) бесплатно

Собрание книг по хакингу из серии Hacking Exposed + 4 книги по хакингу того же издательства. Примеры страниц Серия книг "Hacking Exposed" Hacking Exposed, Web 2.0 Год: 2008 Автор: Cannings R., Dwivedi H., Lackey Z. ISBN: 0-07-159548-1 Формат: PDF Количество страниц: 290 Описание: The purposes of the book are to raise awareness, demonstrate attacks, and offer solutions for Web 2.0 security risks. This introduction will cover some basics on how Web 2.0 works, to help ensure that the chapters in the rest of the book are clear to all individuals. Hacking Exposed, 7 Network Security Secrets (Hacking Exposed Network Security Secrets & Solutions) Год: 2012 Автор: McClure S., Scambray J., Kurtz G. ISBN: 978-0-07-178029-2 Формат: PDF Количество страниц: 1886 Описание: This new edition of Hacking Exposed™ helps you to get smart and take effective action. The lambs may indeed b... Читать дальше »

Скачать Pritchett W., De Smet D. - BackTrack 5 Cookbook [2012, PDF, ENG] ( книгу / аудиокнигу ) бесплатно

Скачать Pritchett W., De Smet D. - BackTrack 5 Cookbook [2012, PDF, ENG] ( книгу / аудиокнигу ) бесплатно

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. "BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks. The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests. We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cr... Читать дальше »

Скачать Certified Ethical Hacker Exam Prep ( книгу / аудиокнигу ) бесплатно

Скачать Certified Ethical Hacker Exam Prep ( книгу / аудиокнигу ) бесплатно

Certified Ethical Hacker Exam Prep Год выпуска: 2006 Автор: Michael Gregg Жанр: Информационная безопасность Издательство: Que ISBN: 0789735318 Формат: CHM Качество: eBook (изначально компьютерное) Количество страниц: 696 Описание: The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll need to score higher on the exam. Along with the most current CEH content, the book also contains the elements that make Exam Preps such strong study aides: comprehensive coverage of exam topics, end-of-chapter review, practice questions, Exam Alerts, Fast Facts, plus an entire practice exam to test your understanding of the material. The book also features MeasureUp's innovative testing software, to h... Читать дальше »

Скачать BSD Hacks 100 Industrial Tip & Tools ( книгу / аудиокнигу ) бесплатно

Скачать BSD Hacks 100 Industrial Tip & Tools ( книгу / аудиокнигу ) бесплатно

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time Читать дальше »

Скачать CISSP Study Guide ( книгу / аудиокнигу ) бесплатно

Скачать CISSP Study Guide ( книгу / аудиокнигу ) бесплатно

CISSP - первая, самая престижная и признаваемая во всем мире ИТ_сертификация, независимая от производителя. Эта книга покрывает весь материал, включенный в экзамен, особо обращая внимание на последние добавления. Описание на английском The CISSP certification is the very first and most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 60,000 professionals are certified worldwide with many more joining their ranks. Our new study guide is aligned to cover all of the material included in the exam complete with special attention to recent updates. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Читать дальше »

Скачать SQL Injection Attacks and Defense ( книгу / аудиокнигу ) бесплатно

Скачать SQL Injection Attacks and Defense ( книгу / аудиокнигу ) бесплатно

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known information about these attacks and significant insight from its contributing team of SQL injection experts. What is SQL injection?-Understand what it is and how it works Find, confirm, and automate SQL injection discovery Discover tips and tricks for finding SQL injection within the code Create exploits using SQL injection Design to avoid the dangers of these attacks Читать дальше »

Рейтинг@Mail.ru Яндекс.Метрика