Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cloud Security Auditing, Suryadipta Majumdar, Taous Madi


Варианты приобретения
Цена: 12577.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Suryadipta Majumdar, Taous Madi   (Маджумдар Сурьядипта)
Название:  Cloud Security Auditing
Перевод названия: Маджумдар Сурьядипта: Аудит облачной безопасности
ISBN: 9783030231279
Издательство: Springer
Классификация:



ISBN-10: 3030231275
Обложка/Формат: Hardcover
Страницы: 166
Вес: 0.44 кг.
Дата издания: 02.08.2019
Серия: Advances in information security
Язык: English
Издание: 1st ed. 2019
Иллюстрации: 10 illustrations, color; 65 illustrations, black and white; xi, 166 p. 75 illus., 10 illus. in color.
Размер: 234 x 156 x 11
Читательская аудитория: Professional & vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers.


Nmap Network Exploration and Security Auditing Cookbook

Автор: Pale Paulino Calderon
Название: Nmap Network Exploration and Security Auditing Cookbook
ISBN: 1786467453 ISBN-13(EAN): 9781786467454
Издательство: Неизвестно
Цена: 10114.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Over 100 practical recipes related to network and application security auditing using the powerful Nmap

Key Features

  • Learn through practical recipes how to use Nmap for a wide range of tasks for system administrators and penetration testers.
  • Learn the latest and most useful features of Nmap and the Nmap Scripting Engine.
  • Learn to audit the security of networks, web applications, databases, mail servers, Microsoft Windows servers/workstations and even ICS systems.
  • Learn to develop your own modules for the Nmap Scripting Engine.
  • Become familiar with Lua programming.
  • 100% practical tasks, relevant and explained step-by-step with exact commands and optional arguments description

Book Description

This is the second edition of 'Nmap 6: Network Exploration and Security Auditing Cookbook'. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security auditing tasks for local and remote networks, web applications, databases, mail servers, Microsoft Windows machines and even ICS SCADA systems are explained step by step with exact commands and argument explanations.

The book starts with the basic usage of Nmap and related tools like Ncat, Ncrack, Ndiff and Zenmap. The Nmap Scripting Engine is thoroughly covered through security checks used commonly in real-life scenarios applied for different types of systems. New chapters for Microsoft Windows and ICS SCADA systems were added and every recipe was revised. This edition reflects the latest updates and hottest additions to the Nmap project to date. The book will also introduce you to Lua programming and NSE script development allowing you to extend further the power of Nmap.

What you will learn

  • Learn about Nmap and related tools, such as Ncat, Ncrack, Ndiff, Zenmap and the Nmap Scripting Engine
  • Master basic and advanced techniques to perform port scanning and host discovery
  • Detect insecure configurations and vulnerabilities in web servers, databases, and mail servers
  • Learn how to detect insecure Microsoft Windows workstations and scan networks using the Active Directory technology
  • Learn how to safely identify and scan critical ICS/SCADA systems
  • Learn how to optimize the performance and behavior of your scans
  • Learn about advanced reporting
  • Learn the fundamentals of Lua programming
  • Become familiar with the development libraries shipped with the NSE
  • Write your own Nmap Scripting Engine scripts
Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Автор: Shaun Aghili
Название: Fraud Auditing Using CAATT: A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud
ISBN: 0367145618 ISBN-13(EAN): 9780367145613
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book discusses various common occupational and organizational fraud schemes, based on the Association of Certified Fraud Examiners (ACFE) fraud tree and assists fraud examiners and auditors in correctly choosing the appropriate audit tests to uncover such various fraud schemes.

Security Engineering for Cloud Computing

Автор: Rosado David G.
Название: Security Engineering for Cloud Computing
ISBN: 1466621257 ISBN-13(EAN): 9781466621251
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Cloud Management and Security

Автор: Abbadi Imad M
Название: Cloud Management and Security
ISBN: 1118817095 ISBN-13(EAN): 9781118817094
Издательство: Wiley
Рейтинг:
Цена: 12347.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Establishes the foundations of Cloud computing, building a diverse understanding of the technologies behind Cloud computing. This book begins with an introduction to Cloud computing, presenting fundamental concepts such as analysing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types, and highlights the main challenges.

Handbook Of Research On Securing Cloud-Based Databases With Biometric Applications

Автор: Deka & Bakshi
Название: Handbook Of Research On Securing Cloud-Based Databases With Biometric Applications
ISBN: 1466665599 ISBN-13(EAN): 9781466665590
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 48787.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern.The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

The Cloud Security Ecosystem

Автор: Ryan Ko
Название: The Cloud Security Ecosystem
ISBN: 0128015950 ISBN-13(EAN): 9780128015957
Издательство: Elsevier Science
Рейтинг:
Цена: 14820.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия