bannerbanner

информационная безопасность

Методика защиты информации в организациях. (Бакалавриат, Магистратура, Специалитет). Монография.
3
Монография посвящена разработке методики защиты информации, исследованию угроз, уязвимостей и рисков при защите информации в организациях. Обоснован математический аппарат научных исследований: аксиоматика алгебры логики, которая наиболее адекватно о…
Монография посвящена разработке методики защиты информации, исследованию угроз, уязвимостей и рисков при защите информации в организациях. Обоснован математический аппарат научных исследований: аксиоматика алгебры логики, которая наиболее адекватно о…
Правовое нормативное обеспечение управления проектами в области информационной безопасности. (Аспирантура, Бакалавриат, Магистратура). Монография.
3
В монографии представлен анализ общих правовых нормативных документов управления проектами в области обеспечения информационной безопасности, определена технология разработки корпоративного глоссария терминов в сфере управления проектами объектов инф…
В монографии представлен анализ общих правовых нормативных документов управления проектами в области обеспечения информационной безопасности, определена технология разработки корпоративного глоссария терминов в сфере управления проектами объектов инф…
Информационная безопасность в банковско-финансовой сфере. Сборник научных работ участников ежегодной международной молодежной научно-практической конференции в рамках VI (Международного форума Как попасть в пятерку? 28 ноября 2019 года. (Аспирантура, Бакалавриат, Магистратура). Сборник статей.
4
28 ноября 2019 года в Финансовом университете в рамках VI Международного форума Финансового университета "Рост или рецессия: к чему готовиться?" состоялись пленарное заседание и международная молодежная научно-практическая конференция студентов, аспи…
28 ноября 2019 года в Финансовом университете в рамках VI Международного форума Финансового университета "Рост или рецессия: к чему готовиться?" состоялись пленарное заседание и международная молодежная научно-практическая конференция студентов, аспи…
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
3
This value-packed packed set for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition with an all new collection of Practice Exams to giv…
This value-packed packed set for the serious CISSP certification candidate combines the bestselling CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition with an all new collection of Practice Exams to giv…
Group Policy
5
Get up to speed on the latest Group Policy tools, features, and best practices Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools a…
Get up to speed on the latest Group Policy tools, features, and best practices Group Policy, Fundamentals, Security, and the Managed Desktop, 3rd Edition helps you streamline Windows and Windows Server management using the latest Group Policy tools a…
Network Forensics
3
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissec…
Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way—by dissec…
Phishing Dark Waters
3
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicio…
An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicio…
Applied Microsoft Business Intelligence
4
Leverage the integration of SQL Server and Office for more effective BI Applied Microsoft Business Intelligence shows you how to leverage the complete set of Microsoft tools—including Microsoft Office and SQL Server—to better analyze business data. T…
Leverage the integration of SQL Server and Office for more effective BI Applied Microsoft Business Intelligence shows you how to leverage the complete set of Microsoft tools—including Microsoft Office and SQL Server—to better analyze business data. T…
Getting an Information Security Job For Dummies
4
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective stra…
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective stra…
Beyond Cybersecurity
4
Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and gu…
Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and gu…
Big Data MBA
5
Integrate big data into business to drive competitive advantage and sustainable success Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage. Based o…
Integrate big data into business to drive competitive advantage and sustainable success Big Data MBA brings insight and expertise to leveraging big data in business so you can harness the power of analytics and gain a true business advantage. Based o…
VMware Software-Defined Storage
5
The inside guide to the next generation of data storage technology VMware Software-Defined Storage, A Guide to the Policy Driven, Software-Defined Storage Era presents the most in-depth look at VMware's next-generation storage technology to help solu…
The inside guide to the next generation of data storage technology VMware Software-Defined Storage, A Guide to the Policy Driven, Software-Defined Storage Era presents the most in-depth look at VMware's next-generation storage technology to help solu…
Hacking the Hacker
5
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this tech…
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this tech…
Wireshark for Security Professionals
4
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging netw…
Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging netw…
Getting an Information Security Job For Dummies
5
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective stra…
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Security job market? If so, you've come to the right place. Packed with the latest and most effective stra…
The Web Application Hacker's Handbook. Finding and Exploiting Security Flaws
4
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or comprom…
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or comprom…
CCNA Wireless Study Guide. IUWNE Exam 640-721
4
A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networkin…
A complete guide to the CCNA Wireless exam by leading networking authority Todd Lammle The CCNA Wireless certification is the most respected entry-level certification in this rapidly growing field. Todd Lammle is the undisputed authority on networkin…
Social Engineering. The Art of Human Hacking
5
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world ex…
The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world ex…
Group Policy, Profiles, and IntelliMirror for Windows 2003, Windows XP, and Windows 2000. Mark Minasi Windows Administrator Library
4
The Group Policy Management Console (GPMC) is a dramatic step forward in the way Group Policy is administered. This book provides all the instruction and insight you need to take full control of your Active Directory with GPMC and other Group Policy …
The Group Policy Management Console (GPMC) is a dramatic step forward in the way Group Policy is administered. This book provides all the instruction and insight you need to take full control of your Active Directory with GPMC and other Group Policy …
Blackjacking. Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
5
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a…
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a…

Популярные авторы