Книги жанра информационная безопасность: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 12
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра информационная безопасность

Applied Microsoft Business Intelligence
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Leverage the integration of SQL Server and Office for more effective BI Applied Microsoft Business Intelligence shows you how to leverage the complete set of Microsoft tools—including Microsoft Office and SQL Server—to better analyze business data. This book provides best practices for building complete BI solutions using the full Microsoft toolset. You will learn how to effectively use SQL Server…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Getting an Information Security Job For Dummies
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense gui…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Beyond Cybersecurity
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprie…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Big Data MBA
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Integrate big data into business to drive competitive advantage and sustainable success Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage. Based on a practical framework with supporting methodology and hands-on exercises, this book helps identify where and how big data can help you transform you…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
VMware Software-Defined Storage
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The inside guide to the next generation of data storage technology VMware Software-Defined Storage, A Guide to the Policy Driven, Software-Defined Storage Era presents the most in-depth look at VMware's next-generation storage technology to help solutions architects and operational teams maximize quality storage design. Written by a double VMware Certified Design Expert, this book delves into the …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking the Hacker
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with …

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Wireshark for Security Professionals
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for S…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Getting an Information Security Job For Dummies
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective strategies for landing a lucrative job in this popular and quickly-growing field, Getting an Information Security Job For Dummies provides no-nonsense gui…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
CISA Certified Information Systems Auditor Study Guide
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and k…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
The Web Application Hacker's Handbook. Finding and Exploiting Security Flaws
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defend…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
CCNA Wireless Study Guide. IUWNE Exam 640-721
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networking, and this book focuses exclusively on the skills covered in this Cisco certification exam. The CCNA Wireless Study Guide joins the popular Sybex stu…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Social Engineering. The Art of Human Hacking
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social en…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000. Mark Minasi Windows Administrator Library
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

The Group Policy Management Console (GPMC) is a dramatic step forward in the way Group Policy is administered. This book provides all the instruction and insight you need to take full control of your Active Directory with GPMC and other Group Policy tools. You'll also learn techniques for implementing IntelliMirror, making it possible for users to work securely from any location; and you'll find i…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Blackjacking. Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker explains in this book why this must change and how to change it. Packed with sobering examples of actua…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Web Site Privacy with P3P
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

A cutting-edge, first look at how to embed and design a Web site compliant with the new personal privacy standard, P3P Introduces the P3P standard with detailed descriptions and then examines its parameters Includes helpful guidelines, explanations, and P3P how-to examples for system architects to follow Presents detailed case studies covering companies in both finance and retail

Добавленo: Рейтинг: 5 Комментариев 0 шт.