-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
Defensive Security Handbook
Cyber Security on Azure
iOS Application Security
Node Security
Spring Security Essentials
Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the rea ...
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish ...
Cyber Security on Azure
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This boo ...
Digital Privacy and Security Us ...
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure ...
CISSP (ISC)2 Certified Informat ...
CISSP Study Guide – fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Stud ...
CCNP Security Firewall 642-617 ...
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Referenceprovides a concise review of all objectives on the new CCNP Securi ...
31 Days Before Your CCNA Securi ...
31 Days Before Your CCNA Security Exam offers you an engaging and practical way to understand the certification process, commit to taking the CCNA Sec ...
SSCP Systems Security Certified ...
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam doma ...
Kali Linux 2 Assuring Security ...
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the t ...
IT Security Risk Control Manage ...
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable ...
Managing Risk and Information S ...
This updated version describes, at a high level, the evolving enterprise security landscape and provides guidance for a management-level audience abou ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
iOS Application Security
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, ...
Building a Comprehensive IT Sec ...
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further ...
SSCP (ISC)2 Systems Security Ce ...
Fully updated Study Guide for the SSCP This guide prepares you for the SSCP, Systems Security Certified Practitioner certification examination by focu ...
Node Security
Node.js is a fast-growing platform for building server applications using JavaScript. Now that it is being more widely used in production settings, No ...
Information Security, 2nd Editi ...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Microsoft Dynamics AX 2012 Secu ...
Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users’ privileg ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Guide to Security Assurance for ...
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tool ...
Resource Optimization and Secur ...
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cl ...
Building a Home Security System ...
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security s ...
Enterprise Mac Security, 3rd Ed ...
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to t ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...