Зарубежная компьютерная литература
электронная книга
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of t…
электронная книга
[b]Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.[/b][b][/b]The [i]Tribe of Hackers [/i]team is back with a new guide packed with insights fr…
электронная книга
This book describes the agile software development process of Comerge AG from Zürich, Switzerland. Founded 2008 as a startup with four employees, the team consists now of over twenty members. Emb…
электронная книга
[b]A bundle of Apple services, all in one place [/b] All your favorite Apple services are available in one convenient bundle, and [i]Apple One For Dummies[/i] helps you get the full value out of …
электронная книга
[b]Harden your business against internal and external cybersecurity threats with a single accessible resource. [/b]
In [i]8 Steps to Better Security: A Simple Cyber Resilience Guide for Business[…
электронная книга
[b]Master one of the most essential skill sets for the contemporary office [/b]
As Microsoft Office becomes ever more ubiquitous in modern offices across the world, competence and familiarity wit…
электронная книга
This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointi…
электронная книга
[b]Target, test, analyze, and report on security vulnerabilities with pen testing[/b]
Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabiliti…
электронная книга
[b]Smarter, faster prep for the SSCP exam[/b] The [i](ISC)² SSCP Official Practice Tests, 2nd Edition[/i] is the only (ISC)²-endorsed set of practice questions for the Systems Security Certified …
электронная книга
[b]The practical and conceptual knowledge you need to attain CCNP Enterprise certification[/b]
From one of the most trusted study guide publishers comes [i]CCNP Enterprise Certification Study Gui…
электронная книга
[b]Dig into [/b][b]the ins and outs of Windows 10 [/b]
Computer users have been “doing Windows” since the 1980s. That long run doesn’t mean everyone knows the best-kept secrets of the globally u…
электронная книга
[b]Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers [/b]
In [i]The Art of Attack: Attacker Mindset for Security Profe…
электронная книга
[b]Tribal Knowledge from the Best in Cybersecurity Leadership[/b]
The [i]Tribe of Hackers series continues[/i], sharing what CISSPs, CISOs, and other security leaders need to know to build solid …
электронная книга
[b]Full-length practice tests covering all CISSP domains for the ultimate exam prep[/b]
The[i] (ISC)2 CISSP Official Practice Tests[/i] is a major resource for (ISC)2 Certified Information System…
электронная книга
[b]Quickly preps technical and non-technical readers to pass the Microsoft AZ-900 certification exam[/b]
[i]Microsoft Certified Azure Fundamentals Study Guide: Exam AZ-900 [/i]is your complete re…
электронная книга
[b]The easy way to get up and running with Windows 10![/b]
With [i]Windows 10 For Seniors For Dummies[/i], becoming familiarized with Windows 10 is a painless process. If you’re interested in lea…
электронная книга
[b]The only official CCSP practice test product endorsed by (ISC)²[/b]
With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your r…
электронная книга
[b]Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout [/b] [i]Information Security: Principles and Practi…
электронная книга
[b]Explore the latest and most comprehensive guide to securing your Cloud Native technology stack [/b]
[i]Cloud Native Security[/i] delivers a detailed study into minimizing the attack surfaces f…
электронная книга
[b]Avoid becoming the next ransomware victim by taking practical steps today [/b]
Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sop…