Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Writing Security Tools and Exploits, Foster, James C


Варианты приобретения
Цена: 6399.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Foster, James C
Название:  Writing Security Tools and Exploits
ISBN: 9781597499972
Издательство: Elsevier Science
Классификация:

ISBN-10: 1597499978
Обложка/Формат: Paperback
Страницы: 664
Вес: 1.22 кг.
Дата издания: 05.01.2006
Язык: English
Размер: 227 x 180 x 46
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз


The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers

Автор: Kevin D. Mitnick
Название: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
ISBN: 0471782661 ISBN-13(EAN): 9780471782667
Издательство: Wiley
Рейтинг:
Цена: 2218.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Kevin Mitnick, the world`s most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In The Art of Intrusion, Mitnick offers hair-raising stories of real-life computer break-ins, and shows how the victims could have prevented them.

Critical Infrastructure Security and Resilience

Автор: Dimitris Gritzalis; Marianthi Theocharidou; George
Название: Critical Infrastructure Security and Resilience
ISBN: 3030000230 ISBN-13(EAN): 9783030000233
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols.

Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods.
The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.
Gfi Network Security And Pci Compliance Power Tools

Автор: Posey, Brien
Название: Gfi Network Security And Pci Compliance Power Tools
ISBN: 159749285X ISBN-13(EAN): 9781597492850
Издательство: Elsevier Science
Рейтинг:
Цена: 7832.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.

IoT Supply Chain Security Risk Analysis and Mitigation

Автор: Kieras
Название: IoT Supply Chain Security Risk Analysis and Mitigation
ISBN: 3031084799 ISBN-13(EAN): 9783031084799
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: * Risk modeling and analysis of IoT supply chains * Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Автор: Foster, James C
Название: Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
ISBN: 1597490059 ISBN-13(EAN): 9781597490054
Издательство: Elsevier Science
Рейтинг:
Цена: 6399.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cloud Security: Attacks, Techniques, Tools, and Challenges

Автор: Mishra Preeti, Pilli Emmanuel S., Joshi R. C.
Название: Cloud Security: Attacks, Techniques, Tools, and Challenges
ISBN: 0367435829 ISBN-13(EAN): 9780367435820
Издательство: Taylor&Francis
Рейтинг:
Цена: 19140.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book is written with an intension to provide a thorough and detailed discussion on various fundamental aspects of cloud security. It provides an insight in to cloud computing including definition, history, characteristics, service models, cloud deployment models, key technologies, service platforms and challenges.

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 2

Автор: Management Association Information Reso
Название: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 2
ISBN: 1668429993 ISBN-13(EAN): 9781668429990
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin

Автор: Van Oorschot Paul C.
Название: Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
ISBN: 3030834107 ISBN-13(EAN): 9783030834104
Издательство: Springer
Рейтинг:
Цена: 9083.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students.

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 1

Автор: Management Association Information Reso
Название: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, VOL 1
ISBN: 1668429985 ISBN-13(EAN): 9781668429983
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 1

Автор: Management Association Information Reso
Название: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 1
ISBN: 1668431130 ISBN-13(EAN): 9781668431139
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 2

Автор: Management Association Information Reso
Название: Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, VOL 2
ISBN: 1668431149 ISBN-13(EAN): 9781668431146
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 47401.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Kali Linux 2018: Assuring Security by Penetration Testing, Fourth Edition

Автор: V. N. Parasram Shiva, Samm Alex, Allen Lee
Название: Kali Linux 2018: Assuring Security by Penetration Testing, Fourth Edition
ISBN: 1789341760 ISBN-13(EAN): 9781789341768
Издательство: Неизвестно
Рейтинг:
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques. It offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today`s digital age.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия