Showing posts with label IS. Show all posts
Showing posts with label IS. Show all posts

Tuesday, 26 March 2019

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks 2nd Edition, Kindle Edition by Mike O'Leary (Author)

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. (adsbygoogle = window.adsbygoogle || []).push({}); You will learn to configure your network from the ground up, beginning with...

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks 1st ed. Edition, Kindle Edition by Mike O'Leary (Author)

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a...

Saturday, 23 March 2019

Personal Cybersecurity: How to Avoid and Recover from Cybercrime 1st ed. Edition, Kindle Edition by Marvin Waschke (Author)

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat. ...

Cyber Security: Analytics, Technology and Automation (Intelligent Systems, Control and Automation: Science and Engineering) Hardcover – 10 Jun 2015 by Martti Lehto (Editor), Pekka Neittaanmäki (Editor)

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. (adsbygoogle = window.adsbygoogle...

Thursday, 21 March 2019

Wireshark Network Security Paperback – Import, 29 Jul 2015 by Piyush Verma (Author)

null If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.What...

Friday, 15 March 2019

Cyber Security: Analytics, Technology and Automation (Intelligent Systems, Control and Automation: Science and Engineering

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. (adsbygoogle = window.adsbygoogle...

Wednesday, 9 January 2019

OS Security Goals, Policy & Model and Access Control Techniques

 Security Goals Secrecy (confidentiality) - Unauthorized disclosure - Limits the objects (files/sockets) that a process can read Integrity - Unauthorized modification - Limits the objects that a process can write  (objects...

Popular Posts

Categories

100 Python Programs for Beginner (108) AI (41) Android (24) AngularJS (1) Api (2) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (200) C (77) C# (12) C++ (83) Course (67) Coursera (253) Cybersecurity (25) Data Analysis (3) Data Analytics (4) data management (11) Data Science (149) Data Strucures (8) Deep Learning (21) Django (16) Downloads (3) edx (2) Engineering (14) Euron (29) Events (6) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Generative AI (11) Google (37) Hadoop (3) HTML Quiz (1) HTML&CSS (47) IBM (30) IoT (1) IS (25) Java (93) Java quiz (1) Leet Code (4) Machine Learning (86) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (4) Pandas (4) PHP (20) Projects (29) pyth (1) Python (1066) Python Coding Challenge (465) Python Quiz (136) Python Tips (5) Questions (2) R (70) React (6) Scripting (3) security (3) Selenium Webdriver (4) Software (17) SQL (42) UX Research (1) web application (8) Web development (4) web scraping (2)

Followers

Python Coding for Kids ( Free Demo for Everyone)