Audit bezopasnosti Intranet (Russian Edition)






[PDF.by74] Audit bezopasnosti Intranet (Russian Edition)
Rating: 3.84 (791 Votes)

Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko epub
Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko pdf download
Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko pdf file
Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko audiobook
Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko book review
Audit bezopasnosti Intranet (Russian  S. A. Petrenko, A. A. Petrenko summary

 |  2013-01-21 | Original language:Russian | PDF # 1 |  8.27 x.80 x5.83l,1.02 | File type: PDF | 390 pages

|

V knige soderzhitsya kompleksnoe opisanie vseh osnovnyh voprosov audita bezopasnosti korporativnyh sistem Internet/Intranet v sootvetstvii s trebovaniyami mezhdunarodnyh standartov ISO 15408, ISO 17799 (BS 7799), BSI i COBIT. Naryadu s rassmotreniem osnovnyh printsipov, formal'nyh metodov i podhodov v knige soderzhatsya primery provedeniya konkretnyh auditorskih proverok informatsionnoj bezopasnosti razlichnyh gosudarstvennyh i kommercheskih organizatsij i struktur. V p...



You can specify the type of files you want, for your device.Audit bezopasnosti Intranet (Russian Edition)   |  S. A. Petrenko, A. A. Petrenko. A good, fresh read, highly recommended.

TCP/IP et les protocoles Internet (Technote)
TCP/IP Handbook
Puppet for Containerization
IEEE Project 802: Local Network Standards Committee - A Status Report - Draft B
Signals and Systems: A Primer with MATLAB®
Internetworking with TCP/IP, Vol. III: Client-Server Programming and Applications, Linux/Posix Sockets Version 1st Edition by Comer, Douglas E.; Stevens, David L. published by Prentice Hall
Scratch by Example: Programming for All Ages
Professional Heroku Programming
The Essential Guide to Telecommunications (4th Edition)
Oracle9i Developer: Developing Web Applications with Forms Builder
Bundle: Network+ Guide to Networks, 7th + LMS Integrated for MindTap Printed Access Card
Number Theory: An Introduction via the Density of Primes
Building a Pentesting Lab for Wireless Networks
Pattern Recognition with Neural Networks in C++
Cable and Wireless plc: Bringing up the mobile generation (International fixed-income research. Telecommunications)
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science)
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Load Balancing with HAProxy: Open-source technology for better scalability, redundancy and availability in your IT infrastructure
IPng and the TCP/IP Protocols: Implementing the Next Generation Internet
Snmp, Snmpv2, and Cmip: The Practical Guide to Network-Management Standards
The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal
Linux. Administrirovanie setei TCP/IP
Home Networking Simplified
An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone Network
Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation: Real and Near Real Time Analysis and Decision Making System
Windows PowerShell 3.0 First Steps
Peer-to-Peer Application Development: Cracking the Code
Big Data over Networks
CCNA Wireless 640-722 Official Cert Guide (Certification Guide)
Networking with Banyan VINES (Applied networking series)
Performance Enhancement of TCP over Wireless Network
Routing in Wireless Sensor Networks
Introduction to Wireless Systems, 2nd Edition; Technologies, Systems, Services and Market Growth
Ethernet Tips and Techniques
Top Secret Intranet: How U.S. Intelligence Built Intelink - the World's Largest, Most Secure Network
Liferay Portal 6.2 Enterprise Intranets
Passive Components and Transmission Systems (Proceedings of Spie)
Web Penetration Testing with Kali Linux
Direct Broadcast Satellite Communications: An MPEG Enabled Service
Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability
Jeff Duntemann's Drive-By Wi-Fi Guide
Hacking University: Computer Hacking and Learn Linux 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and A Complete ... System (Hacking Freedom and Data Driven)
Wireless Networking with Microsoft Windows Vista
!%@:: A Directory of Electronic Mail Addressing & Networks (Nutshell Handbooks)
New Technologies, Mobility and Security
Rapid Sharepoint 2013 Collaboration Solution Development and Deployment by Yaroslav Pentsarskyy (Jan 10 2013)
Parallel Programming: Techniques and Applications Using Networked Workstations and Parallel Computers (2nd Edition)
Tcp/Ip Illustration: A Graphic Guide to Understanding the Tcp/Ip Protocol Suite/Diskette
Exam Ref 70-331 Core Solutions of Microsoft SharePoint Server 2013 (MCSE)
Red Flags: Recognize and eliminate the risks in your RIA firm’s Disaster Recovery, IT Compliance, and Cyber Security processes to safeguard your reputation and client trust.
Database Publishing on the Web & Intranets: Master the Future of Delivering Content on the Web by Lang, Curt, Chow, Jeff (1996) Paperback
SharePoint 2013 Unleashed
Microsoft Sharepoint Portal Server 2001 Resource Kit (Examples & Explanations Series)
Critical VMware Mistakes You Should Avoid
Cisco Wireless Network Design Guide: Foundation for Cisco Wireless Design (Design Series)
MCSE TCP/IP Exam: TestTaker's Guide Series
Customers perspectives on cloud computing adoption by Banking sector
Cloud Computing: Managing Risk in the World of Cloud Computing
Computer Networks (5th Edition)
Start Here! Fundamentals of Microsoft .NET Programming
Intelligent Java Applications for the Internet and Intranets
Force.com Enterprise Architecture - Second Edition
Networking Linux: A Practical Guide to TCP/IP
Building an Asp.Net Intranet (Paperback) - Common
[ { INTRODUCTION TO PUBLIC SWITCHED TELEPHONE NETWORKS; POTS, ISDN, DLC, DSL, AND PON TECHNOLOGIES, SYSTEMS AND SERVICES } ] by Harte, Lawrence (AUTHOR) May-09-2005 [ Paperback ]
Mobile Forensics: Advanced Investigative Strategies
The business case for ISDN: Applications that work
Programming in Modula-2 (Texts & Monographs in Computer Science)
Isdn & Its Application To Lan Interconne

Copyright Disclaimer:This site does not store any files on its server. We only index and link to content provided by other sites.