Теоретический минимум по Big Data. Всё, что нужно знать о больших данных, Ын Анналин, Су Кеннет, Питер, 2019
Cегодня Big Data — это большой бизнес.
Нашей жизнью управляет информация, и извлечение выгоды из нее становится центральным моментом в работе современных организаций. Неважно, кто вы — деловой человек, работающий с аналитикой, начинающий программист или разработчик, «Теоретический минимум по Big Data» позволит не утонуть в бушующем океане современных технологий и разобраться в основах новой и стремительно развивающейся отрасли обработки больших данных.
Хотите узнать о больших данных и механизмах работы с ними? Каждому алгоритму посвящена отдельная глава, в которой не только объясняются основные принципы работы, но и даются примеры использования в реальных задачах. Большое количество иллюстраций и простые комментарии позволят легко разобраться в самых сложных аспектах Big Data
#book #useful
Cегодня Big Data — это большой бизнес.
Нашей жизнью управляет информация, и извлечение выгоды из нее становится центральным моментом в работе современных организаций. Неважно, кто вы — деловой человек, работающий с аналитикой, начинающий программист или разработчик, «Теоретический минимум по Big Data» позволит не утонуть в бушующем океане современных технологий и разобраться в основах новой и стремительно развивающейся отрасли обработки больших данных.
Хотите узнать о больших данных и механизмах работы с ними? Каждому алгоритму посвящена отдельная глава, в которой не только объясняются основные принципы работы, но и даются примеры использования в реальных задачах. Большое количество иллюстраций и простые комментарии позволят легко разобраться в самых сложных аспектах Big Data
#book #useful
🔥2👍1
Teoreticheskiy_minimum_po_Big_Data_2019_Annalin_Yn_Kennet_Su.pdf
4.2 MB
Теоретический минимум по Big Data. Всё, что нужно знать о больших данных, Ын Анналин, Су Кеннет, Питер, 2019
👍3
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x, Shiva V. N. Parasram
This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools.
#book #forensic
This new edition will help you explore modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, Hex Editor, and Axiom. You'll cover the basics and advanced areas of digital forensics within the world of modern forensics while delving into the domain of operating systems. As you advance through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. You'll also discover how to install Windows Emulator, Autopsy 4 in Kali, and how to use Nmap and NetDiscover to find device types and hosts on a network, along with creating forensic images of data and maintaining integrity using hashing tools.
#book #forensic
👍4❤1🔥1
Parasram S. Digital Forensics with Kali Linux 2023.pdf
50.3 MB
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x, Shiva V. N. Parasram
🔥3
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes, Paul Smith, 2023
This is a unique pentesting book, which takes a different approach by helping you gain hands-on experience with equipment that you’ll come across in the field.
You'll start by getting to grips with the basics of industrial processes, and then see how to create and break the process, along with gathering open-source intel to create a threat landscape for your potential customer. As you advance, you'll find out how to install and utilize offensive techniques used by professional hackers.
Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network.
#book #pentest
This is a unique pentesting book, which takes a different approach by helping you gain hands-on experience with equipment that you’ll come across in the field.
You'll start by getting to grips with the basics of industrial processes, and then see how to create and break the process, along with gathering open-source intel to create a threat landscape for your potential customer. As you advance, you'll find out how to install and utilize offensive techniques used by professional hackers.
Throughout the book, you'll explore industrial equipment, port and service discovery, pivoting, and much more, before finally launching attacks against systems in an industrial network.
#book #pentest
👍4
Pentesting_Industrial_Control_Systems_An_ethical_hacker's_guide.epub
48.4 MB
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes, Paul Smith, 2023
👏4
101 Labs - CompTIA Security+, İngilizce Baskı Paul W Browning (Eser Sahibi), Mark Drinan (Eser Sahibi)
101 Labs - Book Series Experts agree that we retain only 10% of what we read but 90% of what we do. Perhaps this explains why the global pass rate for most IT exams is a ghastly 40%. This is where the 101 Labs book series can help.
Official page
#book
101 Labs - Book Series Experts agree that we retain only 10% of what we read but 90% of what we do. Perhaps this explains why the global pass rate for most IT exams is a ghastly 40%. This is where the 101 Labs book series can help.
Official page
#book
🔥4❤2
101 Labs – CompTIA Security+.pdf
38.8 MB
101 Labs - CompTIA Security+, İngilizce Baskı Paul W Browning (Eser Sahibi), Mark Drinan (Eser Sahibi)
👍3🔥1
Cybersecurity for Small Networks by Seth Enoka, 2022
This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security—from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity.
The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you’ll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you’ll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security.
#book
This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises, you'll quickly progress through several levels of security—from building a defensible network architecture to protecting your network from adversaries and monitoring for suspicious activity.
The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. Then, you’ll configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, and configure an antivirus. From there, you’ll implement back-up storage strategies, monitor and capture network activity using a variety of open-source tools, and learn tips to efficiently manage your security.
#book
👍3
Cybersecurity for Small Networks.epub
9.2 MB
Cybersecurity for Small Networks by Seth Enoka, 2022
❤3
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing, Hack, Phil J., 2022
Using this knowledge, you are also able to explore further in hacking if you wish to develop your skills and discover additional knowledge into creating your own programs and software.
This guide will help you learn:
(+) The 3 chief categories for installation of Kali Linux
(+) How to Hack a Windows Computer – Step-by-Step Procedure
(+) Why you should never underestimate any Black Hat Hackers
(+) How to get started in Computer Security
(+) The 7 Steps to follow during a Penetration Testing exercise
(+) The most common scanning techniques
(+) Cybersecurity Career Potentials
(+) Step-by-Step Guide to Running and Using Kali Linux
(+) Practical Hacking Tools
Other post
#book #linux
Using this knowledge, you are also able to explore further in hacking if you wish to develop your skills and discover additional knowledge into creating your own programs and software.
This guide will help you learn:
(+) The 3 chief categories for installation of Kali Linux
(+) How to Hack a Windows Computer – Step-by-Step Procedure
(+) Why you should never underestimate any Black Hat Hackers
(+) How to get started in Computer Security
(+) The 7 Steps to follow during a Penetration Testing exercise
(+) The most common scanning techniques
(+) Cybersecurity Career Potentials
(+) Step-by-Step Guide to Running and Using Kali Linux
(+) Practical Hacking Tools
Other post
#book #linux
👍4
HACKING_LINUX_The_Complete_Beginners_Programming_System_Guide_With.pdf
883.1 KB
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing, Hack, Phil J., 2022
👍3👏1
SOC-200: Security Operations and Defensive Analysis PDF + videos materials, 2022
Learn the foundations of cybersecurity defense with Security Operations and Defensive Analysis (SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat Hunters. Students gain hands-on experience with a SIEM, identifying and assessing a variety of live, end-to-end attacks against a number of different network architectures. Students who complete the course and pass the exam earn the Offensive Security Defence Analyst (OSDA) certification, demonstrating their ability to detect and assess security incidents.
❗️Download
📌GitHub
#education #architecture
Learn the foundations of cybersecurity defense with Security Operations and Defensive Analysis (SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat Hunters. Students gain hands-on experience with a SIEM, identifying and assessing a variety of live, end-to-end attacks against a number of different network architectures. Students who complete the course and pass the exam earn the Offensive Security Defence Analyst (OSDA) certification, demonstrating their ability to detect and assess security incidents.
❗️Download
📌GitHub
#education #architecture
🔥4👍2❤1
101. Hacking For Beginners, Hackers Academy
Zero Programming
We know how frustrating programming can be for beginners. And this why you will need zero programming to complete this course. As a matter of fact, you’ll be hacking into your first target with out reading or writing a single line of code!
Zero Networking
Networking is essential for you to become a hacker. Having said that we designed this course with the expectation that you have zero knowledge of networking. You’ll be surprised what you’ll be able to learn by the end of this course though!
Zero Linux
We would be lying if we said you don’t need to learn Linux to become a hacker. We would also be lying if we said you can’t hack without knowing Linux. This is why we will get you started assuming you have zero Linux knowledge.
Official page
#education
Zero Programming
We know how frustrating programming can be for beginners. And this why you will need zero programming to complete this course. As a matter of fact, you’ll be hacking into your first target with out reading or writing a single line of code!
Zero Networking
Networking is essential for you to become a hacker. Having said that we designed this course with the expectation that you have zero knowledge of networking. You’ll be surprised what you’ll be able to learn by the end of this course though!
Zero Linux
We would be lying if we said you don’t need to learn Linux to become a hacker. We would also be lying if we said you can’t hack without knowing Linux. This is why we will get you started assuming you have zero Linux knowledge.
Official page
#education
👍5
Forwarded from RuSecJobs Channel
Ресурсы
https://news.1rj.ru/str/RuSecJobs - основной канал.
https://news.1rj.ru/str/CyberJobsRussia - чат с обсуждением конкретных вакансий.
https://news.1rj.ru/str/cvcyber - ресурс, где можно опубликовать своё резюме.
https://news.1rj.ru/str/cybertalkr - разговоры на любые темы в области ИБ.
@cybertoolset - обсуждение инструментов, включая Open Source
Ресурс для HR и руководителей - закрытое комьюнити, для вступления отписать @maximbautin , ссылку скину в лс.
https://news.1rj.ru/str/RuSecJobs - основной канал.
https://news.1rj.ru/str/CyberJobsRussia - чат с обсуждением конкретных вакансий.
https://news.1rj.ru/str/cvcyber - ресурс, где можно опубликовать своё резюме.
https://news.1rj.ru/str/cybertalkr - разговоры на любые темы в области ИБ.
@cybertoolset - обсуждение инструментов, включая Open Source
Ресурс для HR и руководителей - закрытое комьюнити, для вступления отписать @maximbautin , ссылку скину в лс.