- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook It security interviews exposed - Secrets to landing your next information security job: Part 2
Part 2 book "It security interviews exposed - Secrets to landing your next information security job" includes content: Knowing virtual private networks, knowing IDS/IPS/IDP, everything you ever wanted to know about wireless but were afraid they’d ask, finding your posture, tools.
112 p actvn 24/04/2024 1 0
Từ khóa: Insider attack cyber security beyond the hacker, Finding your posture, Knowing virtual private networks, Penetration testing
Ebook How to cheat at securing a wireless network: Part 2
Ebook How to cheat at securing a wireless network - Part 2 includes contents: Chapter 8: monitoring and intrusion detection, chapter 9: designing a wireless enterprise network: hospital case study, chapter 10: designing a wireless industrial network: retail case study, chapter 11: designing a wireless home network: home office case study, chapter 12: wireless penetration testing.
193 p actvn 26/03/2024 18 0
Từ khóa: Network security, Computer security, Information security, Wireless enterprise network, Wireless home network, Wireless industrial network, Wireless penetration testing
Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...
134 p actvn 26/03/2024 21 0
Từ khóa: Network security, Computer security, Information security, Computer hacking, Security testing, The Hacker's methodology
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 1
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 1 presents the following content: Chapter 1 the basics of physical penetration testing, chapter 2 planning your physical penetration tests, chapter 3 executing tests, chapter 4 an introduction to social engineering techniques, chapter 5 lock picking, chapter 6 information gathering.
142 p actvn 29/11/2023 23 0
Từ khóa: Ebook Unauthorised access, Unauthorised access, Physical penetration testing, IT security teams, Executing tests, Lock picking
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 2
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 2 presents the following content: Chapter 7 hacking wireless equipment, chapter 8 gathering the right equipment, chapter 9 tales from the front line, chapter 10 introducing security policy concepts, chapter 11 counter intelligence, appendix A: UK Law, appendix B: US Law, appendix C: EU Law, appendix D: Security Clearances, appendix E: Security Accreditations.
167 p actvn 29/11/2023 21 0
Từ khóa: Ebook Unauthorised access, Unauthorised access, Physical penetration testing, IT security teams, Hacking wireless equipment, Gathering the right equipment
Ebook Information security management handbook (Volume 7): Part 2
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 -...
224 p actvn 21/07/2023 51 0
Từ khóa: Ebook Information security management handbook, Information security management, Managing the security testing process, Software development life cycle, Cloud cryptography
Chapters will allow you to fully grasp many of the technical issues introduced in the top 15 list as well as a few new ones. for example, although sms is not a mobile application, it is used heavily by many mobile applications today, even for security purposes.
432 p actvn 31/01/2022 143 2
Từ khóa: Ebook Mobile application security, Mobile application security, Mobile security penetration testing tools, Enterprise security on the mobile OS, WAP and mobile HTML security
Hacking: How to hack computer - Basic security and penetration testing
This book contains proven steps and strategies on how to have better security when it comes to using your computer and making sure that it is protected against malicious hackers.
78 p actvn 31/01/2022 234 5
Từ khóa: Ebook Hacking computer, Basic security and penetration testing, The rules of ethical hacking, Basic security systems, Hacker and nerd
Đăng nhập
Bộ sưu tập nổi bật
12 23564
10 19592
Bộ sưu tập Tài liệu học tiếng Anh
14 82964
Bộ sưu tập Kỹ thuật viễn thông
11 16531