|
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity Threats and Attacks in the Gaming Industry: Secure Game Players' and Developers' Data and Systems Автор: Massimo Nardone Издательство: Apress Год: 2025 Страниц: 118 Язык: английский Формат: pdf (true), epub (true), rtf, mobi Размер: 10.1 MB
Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment. This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant, educate themselves about potential threats, and employ best practices to ensure a safe and enjoyable gaming experience. We will describe the most common type of targeted games facing cybersecurity attacks as well as some of the most common types of cyber threats faced by the gaming industry such as malware, distributed denial of service (DDoS) attacks, data breaches, etc. |
Разместил: Ingvar16 Вчера, 05:32 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Kali Linux for Beginners: A step-by-step Guide to Ethical Hacking: Mastering Cybersecurity with Hands-On Exercises Автор: ETS Publishing Издательство: ETS Publishing Год: October 26, 2024 Страниц: 510 Язык: английский Формат: epub Размер: 10.1 MB
Are you fascinated by the world of cybersecurity? Do you want to learn the same tools used by hackers and penetration testers—but without feeling overwhelmed by technical jargon? Kali Linux for Beginners offers an accessible way to step into the realm of ethical hacking, even if you have zero prior experience. This comprehensive guide takes you from a beginner to a capable ethical hacker with hands-on, step-by-step instructions. Designed with clarity and practicality in mind, this book introduces readers to the powerful Kali Linux operating system—a specialized platform packed with hundreds of cybersecurity tools. Whether you're pursuing a career in information security or just curious about how ethical hackers think, this guide will equip you with the knowledge and skills to confidently test and secure systems. In today’s digital age, cyber threats are becoming more sophisticated, and ethical hackers play a crucial role in identifying and fixing vulnerabilities before malicious attackers exploit them. Kali Linux is the go-to platform for penetration testers worldwide due to its flexibility, power, and pre-installed tools. |
Разместил: Ingvar16 29-05-2025, 18:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Blockchain Technology: Cross-Chain Regulation and Privacy Автор: Peng Jiang, Liehuang Zhu Издательство: Springer Год: 2025 Страниц: 192 Язык: английский Формат: pdf (true), epub Размер: 28.3 MB
The rapid development and widespread application of blockchain technology have led to a diverse and heterogeneous blockchain ecosystem. Independent operations, resembling isolated data islands, increase the difficulty of data exchange among blockchains. Cross-chain technology has emerged to connect independent blockchains, facilitating asset transfer and information interaction. As a promising new technology, cross-chain solutions with strong interoperability have garnered attention from both academia and industry. However, cross-chain financial incidents have exposed significant information leakage and property loss, highlighting the need for regulation and privacy in cross-chain environments. The lack of uniformity in cross-chain architecture and the use of common plain-format transactions increase the difficulty of both regulation and privacy preservation. This book, for the first time, explores the challenges and solutions related to cross-chain regulation and privacy. We provide a comprehensive understanding of how to design full life-cycle regulation mechanisms, from multi-dimensional detection to efficient provenance tracking, and lightweight privacy-preserving mechanisms. Additionally, we discuss how to balance regulation and privacy in cross-chain environments. |
Разместил: Ingvar16 29-05-2025, 02:38 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Azure Networking: Understand key concepts and design secure Cloud networking architectures Автор: Jose Moreno, Adam Stuart Издательство: BPB Publications Год: 2025 Страниц: 408 Язык: английский Формат: epub (true) Размер: 28.0 MB
In the ever-evolving landscape of Cloud technology, every project demands a robust, high-performance, scalable and secure foundation. Whether you're deploying traditional Virtual Machines or pioneering modern Artificial Intelligence solutions, a well designed Azure Networking infrastructure is critical for success. This book simplifies complex concepts, empowering you to architect reliable and efficient network solutions within the Azure cloud. It takes you from the fundamentals of Azure networking, including VNets, NSGs, and hub-and-spoke models, to advanced topics like Virtual WAN, ExpressRoute, and SD-WAN integration using Route Server. It meticulously covers essential design considerations, security best practices with Azure Firewall, service tags, AVNM security rules and ZTNA, and explores multi-cloud strategies. You will learn how to implement effective DNS with Private Resolver and PaaS networking using Private Link, and master application delivery with load balancing and Front Door. This book is for network architects and engineers familiar with on-premises networking products and protocols. It also benefits cloud architects who understand Azure constructs and want to specialize in its networking capabilities. |
Разместил: Ingvar16 27-05-2025, 20:57 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Advances in Geoinformation Sciences Автор: Alias Abdul-Rahman, Ivin A. Musliman, Imzan Hassan, Ainn Zamzuri (Editors) Издательство: Springer Год выхода: 2025 Страниц: 378 Формат: True PDF; True ePUB Размер: 192 MB Язык: английский
Proceedings of ESRI Users Conference series (by ESRI California); - This book provides discussions on the usage of the specific software like ArcGIS Pro, thus, unlike the intended book which is more advanced solutions and methods. Proceedings of 31st ACM International Conference (by ACM); - This book offers specific solutions to the computing and spatial science community but more for system developers etc, whereas this intended book has broader knowledge spectrum. Proceedings of 18th 3D Geoinfo International Conference (Springer). - This book specifically discusses on 3D GIS research, whereas the intended book gives more breadth thus offers extra insights to the knowledge. |
Разместил: Dovegone 26-05-2025, 20:06 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Hands-on Penetration Testing for Web Applications: Web security testing on modern applications - 2nd Edition Автор: Richa Gupta Издательство: BPB Publications Год: 2025 Страниц: 334 Язык: английский Формат: epub (true) Размер: 17.7 MB
Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehensive overview of web application security testing methodologies. Each chapter offers key insights and practical applications that align with the objectives of the course. Students will explore critical areas such as vulnerability identification, penetration testing techniques, using open-source pen test management and reporting tools, testing applications hosted on cloud, and automated security testing tools. Throughout the book, readers will encounter essential concepts and tools such as OWASP Top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), authentication and authorization testing, and secure configuration practices. The target audience for this book includes students, security enthusiasts, penetration testers, and web application developers. Individuals who are new to security testing will be able to build an understanding about testing concepts and find this book useful. People will be able to gain expert knowledge on pentesting tools and concepts. |
Разместил: Ingvar16 26-05-2025, 18:27 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: The OSINT Bible: The Complete Guide to Mastering Open-Source Intelligence | Discover Critical Information, Protect Sensitive Data, and Gain a Competitive Edge Автор: Trevor Shelwick Издательство: Independently published Год: 2025 Страниц: 357 Язык: английский Формат: pdf, epub, mobi Размер: 10.1 MB
Are you ready to gather critical information that others often overlook? Do you want to use OSINT techniques to uncover the truth and expose hidden threats? In today’s data-driven world, finding the right information can be overwhelming. For professionals in cybersecurity, corporate investigations, or intelligence, missing a critical piece of data could lead to disastrous outcomes. Traditional methods aren’t enough as digital threats evolve, and without the right tools, you risk overlooking vital insights, slowing down your investigations, and falling behind in an ever-changing landscape. Inside this book, you will discover: - 7 Exclusive OSINT Tools: Gain access to unique and powerful tools that will elevate your investigative capabilities; - Master Social Media Investigations: Uncover hidden information from platforms like Facebook, Instagram, and Twitter with advanced techniques; - Image and Video Analysis: Learn how to perform reverse image searches and video forensics to gather critical data; - Anonymity and Security: Protect your identity and secure your OSINT operations with advanced privacy techniques. |
Разместил: Ingvar16 25-05-2025, 20:43 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AIoT: Artificial Intelligence of Things Автор: Arun Sekar Rajasekaran, Fadi Al-Turjman, Suganyadevi S. Издательство: CRC Press Серия: Innovations in Intelligent Internet of Everything (IoE) Год: 2025 Страниц: 421 Язык: английский Формат: pdf (true), epub Размер: 48.4 MB
AIoT: Artificial Intelligence of Things explores the integration of Artificial Intelligence (AI) into everyday objects and devices to allow them to analyze data, make decisions, and communicate with each other, which leads to improved efficiency, convenience, and new possibilities in various aspects of daily life. With a wide-ranging scope, the book covers various aspects of Artificial Intelligence of Things (AIoT) from fundamental concepts to advanced applications. It begins with an introduction to AI, Internet of Things (IoT), and their synergistic relationship and explains how AI technologies enhance the capabilities of IoT devices. The book then explores the key components of AIoT, including sensors, connectivity, data processing, and Machine Learning algorithms. The book presents AIoT architectures, such as cloud-based, edge-based, and hybrid systems, and discusses their advantages and challenges. Exploring the role of Big Data analytics in AIoT, it highlights how large-scale data collection and analysis can drive intelligent decision-making and predictive insights. It delves into such AI techniques employed in AIoT systems as natural language processing (NLP), computer vision, Deep Learning, and Reinforcement Learning. |
Разместил: Ingvar16 25-05-2025, 07:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape Автор: Harpreet Singh, Himanshu Sharma Издательство: Orange Education Pvt Ltd, AVA Год: 2024 Страниц: 435 Язык: английский Формат: pdf (true) Размер: 41.1 MB
Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies. Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise. Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice. |
Разместил: Ingvar16 23-05-2025, 04:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AIoT Innovations in Digital Health: Emerging Trends, Challenges, and Solutions Автор: Inam Ullah Khan, Salma El Hajjami, Shashi Kant Gupta, Hameedur Rahman Издательство: CRC Press Год: 2025 Страниц: 173 Язык: английский Формат: pdf (true), epub Размер: 28.2 MB
Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs. This book discusses the use of AI to improve diagnostic accuracy, patient monitoring, the use of remote diagnostic tools, identification of life-threatening diseases, medical robotics applications, drug discovery, technology-driven solutions, and much more. AIoT Innovations in Digital Health: Emerging Trends, Challenges, and Solutions presents integrated technologies such as Green Computing, IoT, and Big Data using AI, Machine Learning, Deep Learning, and Federated Learning for Healthcare. It discusses the future of medical robotics using Machine Learning and highlights the use of Federated Learning-based patient monitoring applications. This book also elaborates on the role that AI and Machine Learning play in drug discovery. Interested readers will include anyone working in or involved in smart healthcare research which includes, but is not limited to, healthcare specialists, computer science engineers, electronics engineers, systems engineers, and pharmaceutical practitioners. |
Разместил: Ingvar16 23-05-2025, 03:07 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|