зарубежная компьютерная литература
[b]Move beyond the checklist and fully protect yourself from third-party cybersecurity risk [/b]
Over the last nearly ten years there have been hundreds of big-name organizations in every sector subjected to a public breach due to a vendor. The recog…
[b]Move beyond the checklist and fully protect yourself from third-party cybersecurity risk [/b]
Over the last nearly ten years there have been hundreds of big-name organizations in every sector subjected to a public breach due to a vendor. The recog…
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and incl…
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and incl…
[b]Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.[/b][b][/b]The [i]Tribe of Hackers [/i]team is back with a new guide packed with insights from dozens of the world’s leading Red Team security spec…
[b]Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.[/b][b][/b]The [i]Tribe of Hackers [/i]team is back with a new guide packed with insights from dozens of the world’s leading Red Team security spec…
This book describes the agile software development process of Comerge AG from Zürich, Switzerland. Founded 2008 as a startup with four employees, the team consists now of over twenty members. Embracing an agile approach from the beginning, the Comerg…
This book describes the agile software development process of Comerge AG from Zürich, Switzerland. Founded 2008 as a startup with four employees, the team consists now of over twenty members. Embracing an agile approach from the beginning, the Comerg…
[b]A bundle of Apple services, all in one place [/b] All your favorite Apple services are available in one convenient bundle, and [i]Apple One For Dummies[/i] helps you get the full value out of your subscription. What’s in this Apple barrel? Everyth…
[b]A bundle of Apple services, all in one place [/b] All your favorite Apple services are available in one convenient bundle, and [i]Apple One For Dummies[/i] helps you get the full value out of your subscription. What’s in this Apple barrel? Everyth…
[b]Harden your business against internal and external cybersecurity threats with a single accessible resource. [/b]
In [i]8 Steps to Better Security: A Simple Cyber Resilience Guide for Business[/i], cybersecurity researcher and writer Kim Crawley de…
[b]Harden your business against internal and external cybersecurity threats with a single accessible resource. [/b]
In [i]8 Steps to Better Security: A Simple Cyber Resilience Guide for Business[/i], cybersecurity researcher and writer Kim Crawley de…
[b]Master one of the most essential skill sets for the contemporary office [/b]
As Microsoft Office becomes ever more ubiquitous in modern offices across the world, competence and familiarity with its intricacies is more important than ever. Now you …
[b]Master one of the most essential skill sets for the contemporary office [/b]
As Microsoft Office becomes ever more ubiquitous in modern offices across the world, competence and familiarity with its intricacies is more important than ever. Now you …
This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointing and logging, recovery-orientated computing, replicat…
This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointing and logging, recovery-orientated computing, replicat…
[b]Target, test, analyze, and report on security vulnerabilities with pen testing[/b]
Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise…
[b]Target, test, analyze, and report on security vulnerabilities with pen testing[/b]
Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise…
[b]Smarter, faster prep for the SSCP exam[/b] The [i](ISC)² SSCP Official Practice Tests, 2nd Edition[/i] is the only (ISC)²-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapt…
[b]Smarter, faster prep for the SSCP exam[/b] The [i](ISC)² SSCP Official Practice Tests, 2nd Edition[/i] is the only (ISC)²-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapt…
[b]The practical and conceptual knowledge you need to attain CCNP Enterprise certification[/b]
From one of the most trusted study guide publishers comes [i]CCNP Enterprise Certification Study Guide: Exam 350-401[/i]. This guide helps you develop prac…
[b]The practical and conceptual knowledge you need to attain CCNP Enterprise certification[/b]
From one of the most trusted study guide publishers comes [i]CCNP Enterprise Certification Study Guide: Exam 350-401[/i]. This guide helps you develop prac…
[b]Dig into [/b][b]the ins and outs of Windows 10 [/b]
Computer users have been “doing Windows” since the 1980s. That long run doesn’t mean everyone knows the best-kept secrets of the globally ubiquitous operating system. [i]Windows 10 All-in-One Fo…
[b]Dig into [/b][b]the ins and outs of Windows 10 [/b]
Computer users have been “doing Windows” since the 1980s. That long run doesn’t mean everyone knows the best-kept secrets of the globally ubiquitous operating system. [i]Windows 10 All-in-One Fo…
[b]Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers [/b]
In [i]The Art of Attack: Attacker Mindset for Security Professionals,[/i] experienced physical pentester and social…
[b]Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers [/b]
In [i]The Art of Attack: Attacker Mindset for Security Professionals,[/i] experienced physical pentester and social…
[b]Tribal Knowledge from the Best in Cybersecurity Leadership[/b]
The [i]Tribe of Hackers series continues[/i], sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Doze…
[b]Tribal Knowledge from the Best in Cybersecurity Leadership[/b]
The [i]Tribe of Hackers series continues[/i], sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Doze…
[b]Full-length practice tests covering all CISSP domains for the ultimate exam prep[/b]
The[i] (ISC)2 CISSP Official Practice Tests[/i] is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1…
[b]Full-length practice tests covering all CISSP domains for the ultimate exam prep[/b]
The[i] (ISC)2 CISSP Official Practice Tests[/i] is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1…