|
|
|
|
|
|
|
| |
|
Название: Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls Автор: Jason Edwards Издательство: Apress Год: 2024 Страниц: 585 Язык: английский Формат: pdf, epub Размер: 10.1 MB
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats. The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world. For IT and cybersecurity professionals, business leaders and executives, small business owners and managers, students and academics in cybersecurity fields, government and on-profit sector professionals, and cybersecurity consultants and trainers. |
Разместил: Ingvar16 28-09-2024, 11:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC Автор: Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar Издательство: Wiley Год: 2025 Страниц: 480 Язык: английский Формат: pdf, azw3, epub (true), mobi Размер: 10.1 MB
A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment. In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You'll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. SOCs use a variety of tools and technologies, including security information and event management (SIEM) systems, intrusion detection and prevention systems (IDPSs), threat intelligence platforms, and endpoint detection and response (EDR) solutions, to accomplish the objectives they want to achieve. SOC team members utilize these technologies to detect, investigate, and respond to security incidents. Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products. |
Разместил: Ingvar16 27-09-2024, 18:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Key Technologies for On-Demand 6G Network Services Автор: Jianxin Liao, Bo He, Jing Wang, Jingyu Wang, Qi Qi Издательство: Springer Серия: Wireless Networks Год: 2024 Страниц: 251 Язык: английский Формат: pdf (true), epub Размер: 34.5 MB
This book delves into the confluence of AI and the transformative potential it holds for the future of 6G network services. It uncovers how the integration of AI technologies as well as redefines the landscape of network management and control. This book also offers a new paradigm for delivering on-demand services that are immersive, personalized and of ultimate performance. A detailed exploration of AI-driven network management systems is presenting in this book, discussing the development of knowledge-defined networking, the construction of all-scenario on-demand service systems and the critical role of network management and control in achieving 6G’s vision. This book begins by examining the historical evolution of communication networks and the pivotal shift towards technology-driven demands in the 6G era. It outlines the book’s coverage of the foundational theories, wireless technologies as well as network architectures that will underpin the next generation of mobile services. Further, this book provides a comprehensive analysis of the key technologies required to support 6G on-demand services, such as trusted and autonomous access control, intelligent resource allocation and service capability coordination. This book targets advanced-level students and researchers working in this field serving as both a technical guide and a visionary outlook on the role of AI in shaping 6G networks. |
Разместил: Ingvar16 27-09-2024, 03:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Guide to SRv6 Network Deployment Автор: Minwei Jin, Zhenbin Li, Lanjun Luo, Weidong Li Издательство: CRC Press Год: 2025 Страниц: 534 Язык: английский Формат: pdf (true) Размер: 50.2 MB
This book shows how SRv6 can be used in real-world network deployments, providing real-world project cases from multiple carriers and enterprises. Segment Routing (SR) has matured significantly over the past decade. Its derivative, SR over IPv6 data plane (SRv6), has experienced rapid development in recent years and has gained wide acceptance among carriers. However, despite the growing interest in SRv6 deployment and the desire for detailed information, no reference material is available. This book aims to fill this gap by providing a comprehensive description of how SRv6 can be used in real network deployment scenarios. Written by participants in Huawei’s SRv6 project, this book provides an in-depth look at the project’s solution design and deployment guidelines. It also provides insights into the latest progress of SRv6 header compression standards and provides examples. As a protocol born in the Software-Defined Network (SDN) era, Segment Routing (SR) provides a flexible semi-centralized and semi-distributed architecture. With this architecture, SR reduces the number of protocols that are required. In addition, it allows network paths to be programmed more flexibly than traditional traffic engineering (TE) after network controllers are introduced. With the development and practice of technologies, SRv6 is inherently compatible with native IPv6 route forwarding and can implement interworking between different networks based on IP reachability. Therefore, SRv6 is deployed along with the IPv6-oriented upgrade of customer networks. SRv6 provides users with more network services, including In-situ Flow Information Telemetry (IFIT) and network slicing through various IPv6 extension headers. |
Разместил: Ingvar16 26-09-2024, 14:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Базовая математика для искусственного интеллекта Автор: Нельсон Хала Издательство: bhv Год: 2024 Формат: PDF Страниц: 594 Размер: 39 Mb Язык: Русский
Книга дает прочные знания математики, лежащей в основе работы современных систем ИИ. Приведены необходимые и достаточные сведения для успешной работы в области ИИ, без углубления в сложные академические теории, с акцентом на практическом применении и современных моделях. Даны основы машинного обучения и науки о данных. Рассмотрены регрессия, нейронные сети, свертка, оптимизация, вероятность, марковские процессы, дифференциальные уравнения и многое другое исключительно в контексте искусственного интеллекта. Показано, как объединять модели машинного обучения и естественного языка, работать с графовыми и сетевыми данными, визуализировать преобразования пространства, уменьшать размерность, обрабатывать изображения, выбирать модели и для проектов, основанных на данных.
|
Разместил: Chipa 26-09-2024, 12:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Generative AI and Cyberbullying Автор: Ravindra Das Издательство: CRC Press Год: 2025 Страниц: 124 Язык: английский Формат: pdf (true), epub Размер: 13.6 MB
Ever since the COVID-19 pandemic occurred in 2020, the world has transformed itself greatly. For example, not only is the near-99% remote workforce now a reality, but businesses today are taking incident response and disaster recovery much more seriously these days as well. But another area that has blossomed in the last couple of years has been that of Generative AI. It is actually a subfield of Artificial Intelligence (AI), which has been around since the 1950s. But Gen AI (as it is also called) has been fueled by the technology of ChatGPT, which has been developed and created by OpenAI. Given the GPT4 algorithms Gen AI is powered by, an end user can merely type in, or even speak into the platform a query, and an output that is specific to that query will be automatically generated. The answer (or "output") can be given as a text, video, image, or even an audio file. The scalability and diversity of Gen AI has allowed it to be used in a myriad of industries and applications. But although it has been primarily designed to serve the greater good, it can also be used for very nefarious purposes, such as online harassment and Cyberbullying. In this particular book, we actually take the good side of Gen AI and provide an overview as to how it can be used to help combat Cyberbullying. |
Разместил: Ingvar16 25-09-2024, 15:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Biotech and IoT: An Introduction Using Cloud-Driven Labs Автор: Alok Kumar Srivastav, Priyanka Das, Ashish Kumar Srivastava Издательство: Apress Год: 2024 Страниц: 462 Язык: английский Формат: pdf (true), epub Размер: 15.6 MB
Dive into the intricacies of biotech and IoT integration with a meticulously crafted journey through the chapters. This book unveils the synergies between lab-based biotech processes and cloud-connected technologies, promising a paradigm shift in healthcare, agriculture, and beyond. Beginning with an introduction to IoT applications and biotechnological principles, the book navigates historical developments and convergence. Chapters unfold transformation of laboratories into smart spaces, revolutionizing healthcare through remote patient monitoring and personalized medicine. Explore the world of IoT-enabled biomedical devices and their impact, while delving into data management, security challenges, and ethical considerations. The narrative extends to precision agriculture, environmental monitoring, and synergy of biometric security systems with wearable devices. Bioinformatics and cloud analytics take center stage, unraveling their role in the biotech IoT landscape. Finally, gaze into the future, anticipating trends, innovations, and global collaborations, concluding with practical insights for professionals and enthusiasts alike. On completion, you will emerge from this enlightening journey equipped with a deep understanding of the transformative power at the intersection of biotechnology and IoT. Gain insights into the historical context, current applications, and future trends shaping the landscape. Armed with a wealth of technical knowledge, readers will navigate smart laboratories, healthcare revolutions, environmental interventions, and more. This book not only opens doors to the intricacies of biotech IoT but also provides practical guidance for navigating the evolving field. |
Разместил: Ingvar16 25-09-2024, 12:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Wireless Multimedia Computational Communications Автор: Xiaoming Tao, Yiping Duan, Zhijin Qin, Danlan Huang Издательство: Springer Серия: Wireless Networks Год: 2024 Страниц: 217 Язык: английский Формат: pdf (true), epub Размер: 50.1 MB
This book discusses the evolving designs and applications of multimedia content delivery and focuses on computing-based methods. It offers readers an in-depth understanding of how computational resources at both the source and the destination of the networking continuum can be exploited. This enhances the overall performance of multimedia data networking. This book also presents novel designs and applications focusing on information delivery based on computing. It starts with an overview of the multimedia computational communications as well as spanning topics. The topics range in experience evaluation using electroencephalography, semantic knowledge bases with the next generation of multiple access, end-to-end semantic communication framework and cloud-edge-end intelligent coordination computing. The authors believe this book offers readers a clear picture of the current state and the next steps in multimedia computational communication networks. Alongside the developments in Artificial Intelligence (AI), this book spans the framework of wireless multimedia communication powered by computing. Graduate students majoring in the areas of communication networks, Computer Science and engineering and electrical engineering will find this book useful as a secondary text or reference book. Professionals and researchers working in computational transmission solutions for multimedia communication networks will find this book to be a valuable resource as well. |
Разместил: Ingvar16 24-09-2024, 19:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Internet of Things and Big Data Analytics-Based Manufacturing Автор: Arun Kumar Rana, Sudeshna Chakraborty, Pallavi Goel, Sumit Kumar Rana, Ahmed A. Elngar Издательство: CRC Press Год: 2025 Страниц: 288 Язык: английский Формат: pdf (true), epub Размер: 28.9 MB
By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries. Modern businesses can more readily implement new data-driven strategies and deal with the pressure of international competition thanks to Industrial IoT. But as the use of IoT grows, the amount of created data rises, turning industrial data into Industrial Big Data. Internet of Things and Big Data Analytics-Based Manufacturing shows how Industrial Big Data can be produced as a result of IoT usage in manufacturing, considering sensing systems and mobile devices. Different IoT applications that have been developed are demonstrated and it is shown how genuine industrial data can be produced, leading to Industrial Big Data. This book is organized into four sections discussing IoT and technology, the future of Big Data, algorithms, and case studies demonstrating the use of IoT and Big Data in a variety of industries, including automation, industrial manufacturing, and healthcare. This reference title brings all related technologies into a single source so that researchers, undergraduate and postgraduate students, academicians, and those in the industry can easily understand the topic and further their knowledge. |
Разместил: Ingvar16 24-09-2024, 04:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security Автор: Russ Miles, Stephen Giguere, Taylor Smith Издательство: O’Reilly Media, Inc. Год: 2024 Страниц: 204 Язык: английский Формат: epub (true) Размер: 10.1 MB
Cloud native security isn't a game for individual players. It requires team collaboration with a platform that can help cloud security engineers, developers, and operations people do their best work. That's what the cloud native application protection platform (CNAPP) delivers. With this practical guide, you'll learn how CNAPPs can help you consolidate security through DevSecOps across cloud native technologies, practices, and application lifecycles. Through real-life attack scenarios, authors Russ Miles, Steve Giguere, and Taylor Smith help you explore how CNAPP not only mitigates multidimensional threats, but also reduces complexity and helps your team stay one step ahead of attackers. CNAPP provides a holistic approach to your cloud native development across identities, workloads, networks, and infrastructure. Security is everyone’s job, and this book has something for all technology areas, from DevOps to SecOps, but most certainly, it is for those daring to secure the murky waters of cloud native application development. The book does assume that users have a basic understanding of the cloud native ecosystem. |
Разместил: Ingvar16 23-09-2024, 19:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|