首页
社区
课程
招聘
[转帖]Компьютерная литература на английском языке
发表于: 2012-10-11 22:44 5717

[转帖]Компьютерная литература на английском языке

2012-10-11 22:44
5717
收藏
免费 1
支持
分享
最新回复 (133)
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
126

Chris McNab, Network Security Assessment: Know Your Network
ISBN: 0596510306 | edition 2009 | PDF | 506 pages | 6 mb

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.
http://ul.to/91uahyks

上传的附件:
2013-3-8 16:00
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
127

Ananda, Ph.d. Mitra, "Digital Security: Cyber Terror and Cyber Security"
English | 2010 | ISBN: 0816067910 | 120 pages | PDF | 13,2 MB

Since the advent of widespread Internet use, digital technology has been used for criminal intent. From computer viruses capable of shutting down and destroying infected computers to recruiting members online for hate groups, the ways the Internet can be used for nefarious purposes is practically limitless. But there is hope. Those in the digital industry are working to increase safeguards from cyber terrorists, such as heading off viruses before they can infect computers, and increasing cyber security. Digital Security: Cyber Terror and Cyber Security describes how computers are used both to commit crimes and to prevent them and concludes with a discussion of the future of digital crime and stopping its spread.
http://ul.to/z2s3xdun

上传的附件:
2013-3-8 16:02
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
128

Corey Sandler, "Living With the Internet and Online Dangers"
2010 | ISBN: 0816078742, 0816078750, 1438129718 | 165 pages | PDF | 4,9 MB

Although cyberspace is considered a modern way to communicate, in many ways it is also the Wild West. The Internet is filled with online dangers - from those who want to infect computers with destructive viruses to criminals who want to steal money, ruin reputations, or cause personal harm. "Living with the Internet and Online Dangers" highlights the risks and problems that come with modern Web technology, as well as what teens can do to protect themselves. Chapters explore online job hunting, email scams and Internet fraud, finding that special someone online, and wireless security. Written in straightforward language, this new resource is loaded with helpful sidebars, a glossary, index, and appendixes.
http://ul.to/cuhhdbe9

上传的附件:
2013-3-10 14:40
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
129

Mark Ciampa, "Security+ Guide to Network Security Fundamentals, 4 edition"
2011 | ISBN-10: 1111640122 | 656 pages | PDF | 17,5 MB

Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly preparing readers for the CompTIA Security+ SY0-301 certification exam. Its comprehensive introduction to practical network and computer security covers all of the the new CompTIA Security+ exam objectives. Cutting-edge coverage of the new edition includes virtualization, mobile devices, and other trends, as well as new topics such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.

http://ul.to/gwv0gda2

上传的附件:
2013-3-14 07:40
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
130

《经典密码学现代密码学》(Classical and Contemporary Cryptology)扫描版[PDF]


《经典密码学与现代密码学》主要从三个方面来介绍密码学的知识:第一部分介绍了经典密码学的经典问题,包括单码加密法、仿射加密法、多码加密法、多图加密法和换位加密法;第二部分介绍了现代密码学,包括流加密法、块加密法和公钥加密法;第三部分介绍了密码学的未来,并对量子加密法进行了简单介绍。《经典密码学与现代密码学》—个突出的特点足,对密码破解进行了详细描述,使读者既掌握加密的内部算法,又能了解各种加密法的弱点。与《经典密码学与现代密码学》配套的CAP软件实现了各种加密法,读者可以利用该软件进行加密和解密,从而增强了《经典密码学与现代密码学》的科学性和适用性。每章末尾还给出了一些复习题,给读者以很大的启发和想象力。
《经典密码学与现代密码学》不仅是一本很好的密码学教材,对密码学研究人员和广大密码学爱好者也都是一本不可多得的参考用书。

ed2k://|file|%5B%E7%BB%8F%E5%85%B8%E5%AF%86%E7%A0%81%E5%AD%A6%E7%8E%B0%E4%BB%A3%E5%AF%86%E7%A0%81%E5%AD%A6%5D%28Classical.and.Contemporary.Cryptology%29.%E6%96%AF%E7%9A%AE%E5%B0%94%E6%9B%BC.%E6%89%AB%E6%8F%8F%E7%89%88.PDF|61692880|0c63d9502d82a0899da12107351547e2|h=7okymcoibd5ekmuaiopbc6zd5r4hnogu|/

上传的附件:
2013-3-19 13:13
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
131

Preston Gralla, "Windows 8 Hacks"
English | ISBN: 1449325750 | 2013 | EPUB, PDF | 422 pages | 18 + 42 MB

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the beginning. You’ll find more than 100 standalone hacks on performance, multimedia, networking, the cloud, security, email, hardware, and more. Not only will you learn how to use each hack, you’ll also discover why it works.
Add folders and other objects to the Start screen
Run other Windows versions inside Windows 8
Juice up performance and track down bottlenecks
Use the SkyDrive cloud service to sync your files everywhere
Speed up web browsing and use other PCs on your home network
Secure portable storage and set up a virtual private network
Hack Windows 8 Mail and services such as Outlook
Combine storage from different devices into one big virtual disk
Take control of Window 8 setting with the Registry
http://ul.to/u3zlod9k
http://ul.to/t27rsi55

上传的附件:
2013-3-22 12:11
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
132

Chris Seibold, "Mac Hacks: Tips & Tools for unlocking the power of OS X"
English | ISBN: 1449325580 | 2013 | EPUB, PDF | 330 pages | 19 + 57 MB

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them to.

There are more than 50 hacks in this book that show you how to fine-tune the interface, work with multimedia, set up your network, boost security, and perform a few tricks with Unix.
Go beyond Preferences: change the way OS X Mountain Lion behaves
Customize your experience by taming browsers and making apps full screen
Get information delivered right to your desktop, and automate mundane tasks
Use the command line and install various Unix apps to unlock your Mac’s Unix power
Increase security, monitor network traffic, and remain anonymous
Play Wii games and host a Minecraft server on your Mac
Modify your WiFi, move iTunes, and record TV shows
Turn your MacBook into a tablet and give it a custom dye job

http://ul.to/dt46jor1
http://ul.to/fim2oor0

上传的附件:
2013-3-22 12:12
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
133

Andrew Lockhart, "Network Security Hacks: Tips & Tools for Protecting Your Privacy"
English | 2006 | ISBN: 0596527632 | 455 pages | PDF, EPUB | 7 + 8 MB

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

his second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.
http://ul.to/ez45b6ro
http://ul.to/tcnfzh40

上传的附件:
2013-3-22 12:14
0
雪    币: 496
活跃值: (286)
能力值: ( LV13,RANK:400 )
在线值:
发帖
回帖
粉丝
134
林版家里有一个武器库,还有一个图书馆。
2013-3-22 12:22
0
游客
登录 | 注册 方可回帖
返回
//