Безопасность серверов, сетей и информации

  • Защита вашего компьютера от сбоев

    Защита вашего компьютера от сбоев, спама, вируса и хакеров на 100% (+ CD-ROM)

    0 из 5

    Домашний компьютер сегодня уже не считается роскошью, все больше семей обзаводятся новым другом и помощником. С помощью компьютера мы общаемся с людьми, получаем нужные сведения, ведем деловую переписку, храним финансовую и личную информацию — доверяем компьютеру то, к чему хотелось бы ограничить доступ. В то же время сегодня только и говорят о вирусных эпидемиях, хакерских атаках, воровстве личных данных. И вы должны уметь защищать свои данные. Прочитав эту книгу, вы узнаете о приемах, используемых хакерами, вирусописателями и сетевыми мошенниками. Научитесь защищаться от вирусов и прочих вредоносных программ, распознавать и отражать хакерские атаки, уловки интернет-мошенников, защищаться от спама, контролировать доступ к тем ресурсам, которые не должен посещать ваш ребенок. Книга расскажет вам, как прятать ценную информацию от чужих глаз, подбирать пароли, восстанавливать потерянную информацию. На прилагаемом к книге диске имеются десятки программ, которые помогут…

    340 
  • Secure Your Network for Free

    Secure Your Network for Free

    0 из 5

    This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn’t want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.

    1,085 
  • Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

    Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

    0 из 5

    The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can’t explain why. This book will help you to break free from the so-called «best practices» argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. — Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. — Explores each…

    3,398 
  • Security Fundamentals

    Security Fundamentals

    0 из 5

    Students who are beginning studies in technology need a strong foundation in the basics before moving on to more advanced technology courses and certification programs. The Microsoft Technology Associate (MTA) is a new and innovative certification track designed to provide a pathway for future success in technology courses and careers. The MTA program curriculum helps instructors teach and validate fundamental technology concepts and provides students with a foundation for their careers as well as the confidence they need to succeed in advanced studies. Through the use of MOAC MTA titles you can help ensure your students future success in and out of the classroom. Vital fundamentals of security are included such as understanding security layers, authentication, authorization, and accounting. They will also become familair with security policies, network security and protecting the Server and Client.

    12,771 
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

    0 из 5

    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application. New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking «unbreakable» software packages such as McAfee’s Entercept, Mac OS X, XP, Office 2003, and Vista. Also features the first-ever published information on exploiting Cisco’s IOS, with content that has never before been explored. The companion Web site features downloadable code files.

    2,280 
  • Malware

    Malware, Rootkits and Botnets: A Beginner’s Guide

    0 из 5

    Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. MALWARE, ROOTKITS AND BOTNETS: A BEGINNER’S GUIDE explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You’ll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get started protecting your network right away. MALWARE, ROOTKITS AND BOTNETS: A BEGINNER’S GUIDE features: — Lingo — Common security terms defined so that you’re in the know on the job. — IMHO — Frank and relevant opinions based on the author’s years of industry experience. — Budget Note — Tips for getting…

    1,704 
  • Asterisk Hacking

    Asterisk Hacking

    0 из 5

    Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated,…

    3,617 
  • How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat)

    How to Cheat at Voip Security (How to Cheat) (How to Cheat) (How to Cheat)

    0 из 5

    The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isnt Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication…

    3,507 
  • Business Continuity and Disaster Recovery Planning for IT Professionals

    Business Continuity and Disaster Recovery Planning for IT Professionals

    0 из 5

    Increase Your Companys Odds of Surviving a Major Disaster Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, its difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially. Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP) are emerging as the next big thing in corporate IT circles. With distributed networks, increasing demands for confidentiality, integrity and availability of data, and…

    4,055 
  • Защита данных геоинформационных систем

    Защита данных геоинформационных систем

    0 из 5

    В книге рассмотрены актуальные вопросы обеспечения информационной безопасности геоинформационных систем (ГИС). Представлены результаты научных исследований авторов в этой области. В частности, рассмотрены угрозы безопасности ГИС, разработаны стратегии защиты данных в персональных, сетевых и интернет-ГИС, учитывая специфику их построения и функционирования. Рассмотрены вопросы разработки и реализации мандатного принципа доступа, как для данных ГИС, так и для баз данных, с помощью которых ГИС могут быть построены. Далее в книги обсуждаются вопросы использования стеганографии, показатели и методики оценки средств безопасности данных в ГИС, а также представлена нормативная документация по защите информации в геоинформатике. Книга предназначена для специалистов, студентов и аспирантов, занимающихся вопросами использования и защиты геоинформационных систем.

    733 
  • Халявные антивирусы и другие бесплатные программы из Интернета!1012176771.jpg

    Халявные антивирусы и другие бесплатные программы из Интернета!

    0 из 5

    Автор предлагает бесплатную, проверенную на практике, супернадежную и эффективную комплексную защиту от вирусов, шпионских программ, вторжения любопытных хакеров — любых попыток несанкционированного вторжения в ваш компьютер. Пользуясь советами автора, вы сможете не только выстроить надежную систему безопасности, но и контролировать те сайты, которые посещают ваши дети, а также без проблем восстановить операционную систему после любого сбоя и даже полного обрушения. Книга станет настольным пособием и у продвинутых пользователей, и у чайников благодаря простому и краткому изложению материала с подробными иллюстрациями каждого шага.

    61 
  • Алгоритмы и модели ограничения доступа к записям баз данных

    Алгоритмы и модели ограничения доступа к записям баз данных

    0 из 5

    Рассмотрены вопросы проектирования защищенных баз данных с использованием ограничения доступа к отдельным записям. Рассмотрено как ограничение несанкционированного доступа к записям, так и предоставление ложной маскировочной информации вместо запрашиваемой. Для специалистов и научных работников в области разработки информационных систем и защиты информации, квалифицированных программистов, будет полезна студентам и аспирантам.

    612