LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 30-09-2021, 15:49
  • Комментариев: 0
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media ApplicationsНазвание: Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
Автор: Maniik R Grover
Издательство: BPB Publications
Год: 2021
Страниц: 999
Язык: английский
Формат: pdf, epub
Размер: 15.9 MB

Your All-in-One Guide to the Digital World. Technology touches our lives in many different ways. In this book, we will explore the common uses of technology in the world around you, demystify the concepts, and explain its usage. The book begins by making you comfortable with your Windows PC and Android Smartphone/Tablet. It discusses the Internet and common device connections. It also delves into popular productivity applications like emails, documents, spreadsheets, presentations, maps, photos, music, and videos. Usage of free apps from Google is demonstrated. The book also talks about social media and online tools which allow you to connect and communicate with people on the Internet, with examples from Facebook, Twitter, Instagram, and WhatsApp.


  • Добавил: literator
  • Дата: 29-09-2021, 19:39
  • Комментариев: 0
Название: Хакинг на примерах. Уязвимости, взлом, защита
Автор: Ярошенко А.А.
Издательство: Наука и техника
Год: 2021
Страниц: 320
Язык: русский
Формат: pdf
Размер: 29.1 MB

Из этой книги вы не узнаете, как взламывать банки — ничего противозаконного описано здесь не будет. Мы не хотим, чтобы у наших читателей или кого-либо ещё возникли какие-то проблемы из-за нашей книги. Будет рассказано: об основных принципах взлома сайтов (а чтобы теория не расходилась с практикой, будет рассмотрен реальный пример взлома); отдельная глава будет посвящена угону почтового ящика (мы покажем, как взламывается почтовый ящик — будут рассмотрены различные способы).
  • Добавил: umkaS
  • Дата: 29-09-2021, 08:35
  • Комментариев: 0
Название: Методы защиты информации. Защита от внешних вторжений
Автор: Никифоров С. Н.
Издательство: Лань
Год: 2020 - 3-е изд.
Cтраниц: 100
Формат: pdf (ocr)
Размер: 18 мб
Язык: русский

Предназначено для всех пользователей, стремящихся обеспечить защиту своей информации. Рассматриваются вопросы использования антивирусных программ Comodo Internet Security, Dr. Web CureIt, AVZ и др.
  • Добавил: literator
  • Дата: 28-09-2021, 18:30
  • Комментариев: 0
The Nmap cookbook: Beat the BeastНазвание: The Nmap cookbook: Beat the Beast
Автор: Nima Shahmoradi, Nasim Kangari
Издательство: Amazon.com Services LLC
Год: 2021
Страниц: 241
Язык: английский
Формат: epub
Размер: 10.3 MB

To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation. Nmap is the scanner that other scanners are measured against. it is an indispensable tool that all techies should know well. It is used by all ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. This book is based on real experiences using Nmap in network security tests on a huge variety of networks. In the end, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts. You will start out at the very basics and work your way up to writing your own basic Nmap Scripting Engine (NSE) scripts, and you will become an expert to using the most powerful and flexible network scanner available.

  • Добавил: literator
  • Дата: 28-09-2021, 12:32
  • Комментариев: 0
Название: UNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World
Автор: George Mansour
Издательство: Lasting Press
Год: 2020
Страниц: 377
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind. Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones protected with iron-clad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your valuable digital life. Unhackable provides you with a unique Cyber security strategy that combines user psychology and easy-to-apply techniques that teach you how to become your own strongest line of defense. Informative and insightful, Mansour uses anecdotes, professional experience, and step-by-step procedures to make protecting your personal data as easy as hitting the power button.
  • Добавил: literator
  • Дата: 28-09-2021, 11:36
  • Комментариев: 0
Название: Principles of Blockchain Systems
Автор: Antonio Fernandez Anta, Chryssis Georgiou
Издательство: Morgan & Claypool
Год: 2021
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 14.94 MB

This book is the first to present the state of the art and provide technical focus on the latest advances in the foundations of blockchain systems. It is a collaborative work between specialists in cryptography, distributed systems, formal languages, and economics, and addresses hot topics in blockchains from a theoretical perspective: cryptographic primitives, consensus, formalization of blockchain properties, game theory applied to blockchains, and economical issues. This book reflects the expertise of the various authors, and is intended to benefit researchers, students, and engineers who seek an understanding of the theoretical foundations of blockchains.
  • Добавил: literator
  • Дата: 27-09-2021, 13:12
  • Комментариев: 0
Название: Information Security Management, Second Edition
Автор: Michael Workman
Издательство: ‎Jones & Bartlett Learning
Год: 2023
Страниц: 500
Язык: английский
Формат: epub
Размер: 16.4 MB

This text will provide you with an overview of information and cybersecurity and offer a summary of security topics that are addressed in more detail in the Jones & Bartlett Learning “New Information Systems Security & Assurance” series. Cybersecurity is an aspect of information security. Cybersecurity deals with the electronic elements of protecting assets such as information. Information security encompasses broader threats, including theft of physical documents, perhaps left unattended on an employee’s desk. In this text, we will use the term cybersecurity when we are referring to the electronic aspects and information security when discussing these other elements. We begin with some foundational materials that cover the broad spectrum of information technology management, including what the main departments such as software engineering, operations, and compliance do, and what their roles and responsibilities are.
  • Добавил: literator
  • Дата: 26-09-2021, 13:33
  • Комментариев: 0
Cloud Computing: Theory and Practice, 2nd EditionНазвание: Cloud Computing: Theory and Practice, 2nd Edition
Автор: Dan C. Marinescu
Издательство: Morgan Kaufmann/Elsevier
Год: 2018
Страниц: 588
Язык: английский
Формат: epub
Размер: 44.4 MB

Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up. After an introduction to network-centric computing and network-centric content in Chapter One, the book is organized into four sections. Section One reviews basic concepts of concurrency and parallel and distributed systems. Section Two presents such critical components of the cloud ecosystem as cloud service providers, cloud access, cloud data storage, and cloud hardware and software. Section Three covers cloud applications and cloud security, while Section Four presents research topics in cloud computing.

  • Добавил: harun54
  • Дата: 17-09-2021, 08:31
  • Комментариев: 0
Название: The Strategies of Informing Technology in the 21st Century
Автор: Andrew Targowski
Издательство: IGI Global
Год: 2021
Формат: EPUB
Размер: 13 Мб
Язык: английский / English

Digital technology is ever-changing, which means that those working or planning to work in IT or apply IT systems must strategize how and what applications and technologies are ideal for sustainable civilization and human development. Developmental trends of IT and the digitalization of enterprise, agriculture, healthcare, education, and more must be explored within the boundaries of ethics and law in order to ensure that IT does not have a harmful effect on society. The Strategies of Informing Technology in the 21st Century is a critical authored reference book that develops the strategic attitude in developing and operating IT applications based on the requirements of sustainable civilization and ethical and wise applications of technology in society. Technological progress is examined including trends in automation, artificial intelligence, and information systems. The book also specifically covers applications of digital informing strategies in business, healthcare, agriculture, education, and the home. Covering key concepts such as automation, robotization, and digital infrastructure, it is ideal for IT executives, CIS/MIS/CS faculty, cyber ethics professionals, technologists, systems engineers, IT specialists and consultants, security analysts, students, researchers, and academicians.
  • Добавил: literator
  • Дата: 16-09-2021, 20:28
  • Комментариев: 0
Blockchain in e-Governance: Driving the next Frontier in G2C ServicesНазвание: Blockchain in e-Governance: Driving the next Frontier in G2C Services
Автор: Rajesh Dhuddu, Srinivas Mahankali
Издательство: BPB Publications
Год: 2021
Страниц: 389
Язык: английский
Формат: pdf
Размер: 13.3 MB

Blockchain: Preferred technology that the world is looking for! We are increasingly faced with several new technologies like IOT, AI & Analytics, Machine learning, 3D printing, AR/VR, Robotics, Drones making inroads into several areas of our corporate & personal lives. All these technologies are offering an unprecedented level of automation that is augmenting our performance & lifestyles as well. As these technologies are leveraging the centralised approach of aggregation & economies of scale to facilitate efficiencies that provide a high level of training data, these are also increasingly becoming vulnerable to sophisticated cyber-attacks from actors searching for lucrative targets, to hold them at ransom.