Зарегистрироваться
Восстановить пароль
FAQ по входу

Выложенные файлы

  • Страницы:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Всего: 465
Orange Education Pvt Ltd, AVA, 2024. — 306 p. — ISBN 978-81-96890-31-5. Attackers have to be only right once, but just one mistake will permanently undo them. Book Description The “Ultimate Cyberwarfare for Evasive Cyber Tactic” is an all-encompassing guide, meticulously unfolding across pivotal cybersecurity domains, providing a thorough overview of cyber warfare.The book...
  • №1
  • 34,66 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
  • №2
  • 5,95 МБ
  • добавлен
  • описание отредактировано
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
  • №3
  • 3,74 МБ
  • добавлен
  • описание отредактировано
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
  • №4
  • 3,71 МБ
  • добавлен
  • описание отредактировано
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1408-2. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
  • №5
  • 3,78 МБ
  • добавлен
  • описание отредактировано
Apress Media, LLC, 2025. — 204 p. — (Apress Pocket Guides). — ISBN-13: 979-8-8688-1407-5. In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap...
  • №6
  • 5,95 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
  • №7
  • 2,74 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
  • №8
  • 2,94 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2025. — 544 p. — ISBN 978-1394331857. Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers...
  • №9
  • 7,33 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
  • №10
  • 53,04 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
  • №11
  • 53,04 МБ
  • добавлен
  • описание отредактировано
Addison-Wesley/Pearson Education, 2025. — 608 p. — ISBN-13 978-0-13-836361-1. Переосмысление хакерства: всеобъемлющее руководство по Red Teaming и охоте за ошибками в мире, управляемом искусственным интеллектом Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts...
  • №12
  • 52,74 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
  • №13
  • 8,14 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
  • №14
  • 22,94 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
  • №15
  • 22,75 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
  • №16
  • 1,78 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
  • №17
  • 1,72 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1122-7. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
  • №18
  • 1,84 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2025. — 304 p. — ISBN-13: 979-8-8688-1121-0. Imagine quantifying and visualizing your organization's cyber resilience as precisely as a stock market index. This book introduces that reality through the innovative Cyber Resilience Index, a unified metric that helps master threat-informed defense, transform cybersecurity strategy, and achieve efficient and...
  • №19
  • 4,61 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
  • №20
  • 3,76 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
  • №21
  • 2,07 МБ
  • добавлен
  • описание отредактировано
BPB Publications, 2025. — 460 р. — ISBN: 978-93-65899-504. Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware....
  • №22
  • 8,27 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
  • №23
  • 9,03 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
  • №24
  • 9,38 МБ
  • добавлен
  • описание отредактировано
Apress Media LLC, 2024. — 422 p. — ISBN-13: 979-8-8688-0947-7. This book explores three crucial topics for cybersecurity professionals: artificial intelligence (AI), automation, and active cyber defense (ACD). The Cybersecurity Trinity will provide cybersecurity professionals with the necessary background to improve their defenses by harnessing the combined power of these three...
  • №25
  • 9,27 МБ
  • добавлен
  • описание отредактировано
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
  • №26
  • 5,09 МБ
  • добавлен
  • описание отредактировано
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
  • №27
  • 5,18 МБ
  • добавлен
  • описание отредактировано
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714806. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
  • №28
  • 15,28 МБ
  • добавлен
  • описание отредактировано
Youssef Baddi, Mohammed Amin Almaiah, Omar Almomani, Yassine Maleh (Editor). — CRC Press, 2024. — 310 p. — ISBN-13: 978-1032714790. The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats. This...
  • №29
  • 27,24 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
  • №30
  • 5,45 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
  • №31
  • 16,20 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392270. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructures technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
  • №32
  • 15,87 МБ
  • добавлен
  • описание отредактировано
IGI Global, 2024. — 524 p. — ISBN-13: 979-8369392263. In a world where cyber threats are becoming increasingly sophisticated, the need for robust protection of our digital assets has never been more crucial. As blockchain, IoT, and network infrastructure technologies expand, so do new avenues for exploitation by malicious actors. Protecting sensitive data and ensuring the...
  • №33
  • 13,41 МБ
  • добавлен
  • описание отредактировано
Manning Publications, 2025. — 416 р. — ISBN-13: 978-1633439474. Follow the clues, track down the bad actors trying to access your systems, and uncover the chain of evidence left by even the most careful adversary. Cyber Threat Hunting teaches you how to identify potential breaches of your security. Practical and easy-to-follow, it gives you a reliable and repeatable framework...
  • №34
  • 57,26 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 288 p. — ISBN-13: 978-1394226238. A comprehensive overview for directors aiming to meet their cybersecurity responsibilities. In the following chapters, we will cover various cybersecurity topics in depth, such as threat actors, data breaches, compliance regulations, risk assessments, and incident response. But more importantly, we will provide...
  • №35
  • 492,79 КБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 288 p. — ISBN-13: 978-1394226238. A comprehensive overview for directors aiming to meet their cybersecurity responsibilities. In the following chapters, we will cover various cybersecurity topics in depth, such as threat actors, data breaches, compliance regulations, risk assessments, and incident response. But more importantly, we will provide...
  • №36
  • 556,61 КБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 288 p. — ISBN-13: 978-1394226245 A comprehensive overview for directors aiming to meet their cybersecurity responsibilities. In the following chapters, we will cover various cybersecurity topics in depth, such as threat actors, data breaches, compliance regulations, risk assessments, and incident response. But more importantly, we will provide...
  • №37
  • 2,49 МБ
  • добавлен
  • описание отредактировано
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
  • №38
  • 2,24 МБ
  • добавлен
  • описание отредактировано
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
  • №39
  • 2,19 МБ
  • добавлен
  • описание отредактировано
River Publishers, 2025. — 130 р. — ISBN 978-87-7004-617-6. This book is an overview of basics and other related fundamentals pertaining to software vulnerability discovery as a process. This collaboration of academia and industry disseminates various practical mathematical modeling-based tools and analytics used for vulnerability discovery. A big challenge for software...
  • №40
  • 3,62 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
  • №41
  • 2,38 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
  • №42
  • 2,29 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 189 p. — ISBN: 978-1-003-57038-7. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
  • №43
  • 2,40 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 189 p. — ISBN: 978-1-032-94367-1. The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape. Cyber Investigations of Smart Devices provides a comprehensive guide to navigating this challenging terrain. This book delves into the intricacies of smart device...
  • №44
  • 13,17 МБ
  • добавлен
  • описание отредактировано
Пер. с англ. Д. Брайт. — СПб.: Питер, 2025. — 352 с.: ил. — (Для профессионалов). — ISBN: 978-5-4461-2182-3. Изучите влияние на кибербезопасность взаимосвязанных цепочек поставки ПО! Могут ли цепочки поставок ПО быть безопасными? Команда преданных своему делу профессионалов предлагает по-новому взглянуть на безопасность вашей организации. Вы познакомитесь со множеством тем: от...
  • №45
  • 20,16 МБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
  • №46
  • 708,30 КБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
  • №47
  • 676,37 КБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72050-0. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
  • №48
  • 601,11 КБ
  • добавлен
  • описание отредактировано
CRC Press, 2025. — 211 р. — ISBN: 978-1-032-72046-3. Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "best of the best" on what works and what doesn’t, as a CISO, in a unique storytelling format. This book is designed for a Chief Information Security Officer (CISO) or an individual...
  • №49
  • 5,15 МБ
  • добавлен
  • описание отредактировано
John Wiley & Sons, Inc., 2024. — 320 p. — ISBN-13: 978-1119712091. A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the...
  • №50
  • 4,43 МБ
  • добавлен
  • описание отредактировано
Нет выложенных файлов.
  • Страницы:
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Всего: 465