Название: Информационная безопасность: защита и нападение, 3-е издание Автор: A.A. Биpюкoв Издательство: ДМК Пресс Год: 2023 Страниц: 442 Язык: русский Формат: pdf Размер: 23.1 MB Книги по информационной безопасности (ИБ) преимущественно делятся на две группы: в одних большей частью присутствует нормативная информация и мало сведений о технической реализации угроз и защите от них, в других описываются только технические аспекты (серии «...глазами хакера»). Данная книга выдерживает уже третье издание, предлагая читателю глубокое погружение в практические аспекты реализации конкретных атак и средств защиты. Представлены как актуальная техническая информация, так и советы по организации процесса обеспечения информационной безопасности с соответствующими примерами. В числе рассматриваемых тем: атаки на беспроводные устройства; безопасность облачных систем; выявление уязвимостей; средства обнаружения и предотвращения вторжений; борьба с утечками; обзор методов шифрования; описание пакета Kali Linux; и многое другое.
Название: Основы криптографии (2016) Автор: Коржик В.И., Яковлев В.А. Издательство: СПб.: ИЦ Интермедиа Год: 2016 Формат: pdf Страниц: 296 Размер: 14,3 Мб Язык: русский Настоящее издание предназначено в помощь студентам, изучающим "Основы криптографии" и "Основы криптографии с открытым ключом" по своим специальностям. Пособие также будет полезно для самостоятельного изучения криптографии и всем тем, кто интересуется ее практическими приложениями. При написании данного пособия использовались последние опубликованные научные результаты в области криптографии, а также учитывался опыт преподавания аналогичных курсов в отечественных и зарубежных университетах. Для понимания основного содержания данного пособия достаточно знать основы теории вероятностей в объеме программы технического вуза.
Название: Hardware Security Training, Hands-on! Автор: Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi Издательство: Springer Год: 2023 Страниц: 331 Язык: английский Формат: pdf (true) Размер: 17.1 MB This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards, making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more.
Название: Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense Автор: Lyndon Marshall Издательство: River Publishers Год: 2023 Страниц: 192 Язык: английский Формат: pdf (true) Размер: 10.2 MB This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed. From acquiring software, to the ongoing flaws in email, to the risks of file sharing, and issues surrounding social media and social reputation, Practical Insecurity is the tool you need to maximize your self-protection in the digital world. Everyone has had a brush with cybersecurity?in some way. Our computer has gotten a virus, somebody you know has lost all their company’s data because of ransomware, someone has stolen our identity, a store we do business with has their computer system compromised?including our account?so we are offered free identity protection, and so on. It seems like everyday there is another bit of bad news and it often impacts us. But, the question largely goes what can I do as an individual or as the owner of a small business to protect myself against having my security compromised? Practical Insecurity provides the answers.
Название: Risk Identification by Penetration Testing: A Comprehensive Guide to the PTES Framework Автор: Brandon S. Keath Издательство: Leanpub Год: 2023-05-04 Страниц: 121 Язык: английский Формат: pdf (true) Размер: 10.2 MB Dive into the world of penetration testing with this comprehensive guide by cybersecurity expert, Brandon S. Keath. Explore each stage of the Penetration Testing Execution Standard, learn essential tools and techniques, and gain insights from real-world examples. Master the art of ethical hacking and become a skilled penetration tester. In this section, we will explore post-exploitation with Metasploit, focusing on the main features of Meterpreter and the use of shells outside of Metasploit. Post-exploitation refers to the actions taken after gaining unauthorized access to a system. The goal is to maintain control, gather valuable information, and, in some cases, pivot to other systems within the network. Meterpreter is a powerful post-exploitation tool included in Metasploit. It provides advanced features and functionalities that facilitate information gathering, privilege escalation, maintaining access, and more. Meterpreter runs in memory, making it difficult to detect by antivirus software.
Название: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails Автор: Nicholas Oles Издательство: Apress Год: 2023 Страниц: 153 Язык: английский Формат: pdf, epub Размер: 26.1 MB Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. For cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
Название: Security-First Compliance for Small Businesses Автор: Karen Walsh Издательство: CRC Press Год: 2024 Страниц: 221 Язык: английский Формат: pdf (true) Размер: 10.2 MB Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.
Название: Artificial Intelligence and Cyber Security in Industry 4.0 Автор: Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi Издательство: Springer Год: 2023 Страниц: 374 Язык: английский Формат: pdf (true), epub Размер: 30.2 MB This book provides theoretical background and state-of-the-art findings in Artificial Intelligence and cybersecurity for Industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine Learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in Big Data security relevant sciences, technologies, and applications.
Название: Azure Security (MEAP v10) Автор: Bojan Magusic Издательство: Manning Publications Год: 2023 Страниц: 458 Язык: английский Формат: pdf, epub Размер: 22.4 MB Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud.
Название: Безопасность информационных технологий №02 2023 Издательство: М.: МИФИ Год: 2023 Формат: pdf Страниц: 177 Размер: 10,3 Мб Язык: русский "Безопасность информационных технологий" - рецензируемый научный журнал, охватывающий широкий круг вопросов, связанных с информационной безопасностью, включая технические, организационные, правовые и образовательные аспекты. Концепции журнала, концептуальные основы информационной безопасности автоматизированных систем, методологические подходы к анализу и оценке рисков информационной безопасности, методики поиска уязвимостей программного обеспечения, оценка уровня безопасности автоматизированных систем, программно-аппаратные методы и средства, и другие темы информационной безопасности.
Бесплатная электронная библиотека. Скачать книги бесплатно!
Наша электронная библиотека Bookskeeper (для РФ работает через VPN) - это интернет-витрина, где любой посетитель может публиковать электронные варианты книг, журналов, газет, комиксов, в общем, любой литературы со ссылками для медленного, но бесплатного скачивания с файлообменников.
В нашем книжном хранилище Вы всегда найдете литературу на любой вкус человека любого возраста - от детских комиксов и расскрасок до серьезной научной литературы.
|