|
|
|
|
|
|
|
| |
|
Название: The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime Автор: Jon DiMaggio Издательство: No Starch Press Год: 2022 Формат: ePUB Страниц: 241 Размер: 10 Mb Язык: English
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you’re an individual researcher or part of a team within a Security Operations Center (SoC), you’ll learn to approach, track, and attribute attacks to these advanced actors. |
Разместил: vitvikvas 10-02-2022, 03:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Security For Dummies Автор: Ted Coombs Издательство: For Dummies Год: 2022 Формат: PDF Страниц: 387 Размер: 19 Mb Язык: English
Embrace the cloud and kick hackers to the curb with this accessible guide on cloud security Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world. |
Разместил: vitvikvas 9-02-2022, 10:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Azure Virtual Desktop Автор: Marco Moioli Издательство: Syncfusion, Inc Год: 2022 Формат: PDF Страниц: 99 Размер: 10 Mb Язык: English
Put simply, Azure Virtual Desktop is a way to serve Windows resources over the internet. You can deliver an entire desktop or specific applications, and your users can access them anywhere, on any device. In Azure Virtual Desktop Succinctly, author Marco Moioli provides a thorough overview of the service, covering how it can enhance your organization’s security, productivity, and cost savings. |
Разместил: vitvikvas 8-02-2022, 11:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Dynamically Enabled Cyber Defense Автор: Lin Yang, Quan Yu Издательство: World Scientific Publishing Год: 2021 Страниц: 389 Язык: английский Формат: pdf (true) Размер: 18.6 MB
The book puts forward dynamically enabled cyber defense technology as a solution to the system homogenization problem. Based on the hierarchy of the protected information system entity, the book elaborates on current mainstream dynamic defense technologies from four aspects: the internal hardware platform, software service, information data and external network communication. It also ascertains their possible evolution routes, clarifies their relationship with existing security products, and makes macro analyses and discussions on security gain and overall system efficiency of these technologies. |
Разместил: Ingvar16 7-02-2022, 16:02 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Access Control Models and Architectures For IoT and Cyber Physical Systems Автор: Maanak Gupta, Smriti Bhatt Издательство: Springer Год: 2022 Страниц: 182 Язык: английский Формат: pdf (true), epub Размер: 29.6 MB
This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms. |
Разместил: Ingvar16 7-02-2022, 04:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Federated Learning for IoT Applications Автор: Satya Prakash Yadav, Bhoopesh Singh Bhati, Dharmendra Prasad Mahato Издательство: Springer Год: 2022 Страниц: 269 Язык: английский Формат: pdf (true) Размер: 10.2 MB
This book presents how federated learning helps to understand and learn from user activity in Internet of Things (IoT) applications while protecting user privacy. The authors first show how federated learning provides a unique way to build personalized models using data without intruding on users’ privacy. The authors then provide a comprehensive survey of state-of-the-art research on federated learning, giving the reader a general overview of the field. The book also investigates how a personalized federated learning framework is needed in cloud-edge architecture as well as in wireless-edge architecture for intelligent IoT applications. To cope with the heterogeneity issues in IoT environments, the book investigates emerging personalized federated learning methods that are able to mitigate the negative effects caused by heterogeneities in different aspects. The book provides case studies of IoT based human activity recognition to demonstrate the effectiveness of personalized federated learning for intelligent IoT applications, as well as multiple controller design and system analysis tools including model predictive control, linear matrix inequalities, optimal control, etc. |
Разместил: Ingvar16 6-02-2022, 06:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Технологии связи пятого поколения 5G Автор: Коллектив авторов Издательство: М.: Агентство промышленного развития города Москвы Год: 2020 Формат: pdf Страниц: 74 Размер: 44 mb Язык: Русский
Сегодня телекоммуникационная отрасль в России и во всем мире стоит на пороге внедрения нового, пятого поколения мобильной связи. Подобно предыдущим поколениям, 5G даст толчок развитию не только телекоммуникационной, но и другим отраслям экономики. Ожидаемые технологические инновации стандарта пятого поколения приведут к росту пропускной способности сетей мобильных операторов и скорости передачи данных, а также к появлению новых сценариев использования мобильной связи и развитию инновационных цифровых услуг. Это будет способствовать экономическому развитию за счет увеличения производительности, автоматизации и внедрения новых технологий в различных сферах экономики и деятельности человека. |
Разместил: na5ballov 5-02-2022, 15:17 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Security and Digital Forensics: Challenges and Future Trends Автор: Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar Издательство: Wiley-Scrivener Серия: Advances in Cyber Security Год: 2022 Страниц: 415 Язык: английский Формат: pdf (true), epub Размер: 21.9 MB
Cyber security and digital forensics are an important topic nowadays, which provides many challenging issues in relation to security, identity, intrusion detection, advanced threat detection, privacy preservation etc. The goal of this edited book is to outline the cyber security and digital forensic challenges and future trends. The book focuses on how to secure computers from hackers and how to deal with obtaining, storing, evaluating, analysing and presenting electronic evidences. Current threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing, and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The main focus of this book is to provide the reader with a broad coverage of the topics that includes different concepts, models, and terminology along with examples and illustrations to show substantial technical field details. |
Разместил: Ingvar16 4-02-2022, 16:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: AI and IoT for Sustainable Development in Emerging Countries Автор: Zakaria Boulouard, Mariya Ouaissa Издательство: Springer Год: 2022 Страниц: 638 Язык: английский Формат: pdf (true) Размер: 14.8 MB
This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in a large pool of fields where AI and IoT can open up new horizons. Artificial intelligence and Internet of Things have introduced themselves today as must-have technologies in almost every sector. Ranging from agriculture to industry and health care, the scope of applications of AI and IoT is as wide as the horizon. Nowadays, these technologies are extensively used in developed countries, but they are still at an early stage in emerging countries. |
Разместил: Ingvar16 4-02-2022, 02:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Dynamic Resource Management in Service-Oriented Core Networks Автор: Weihua Zhuang, Kaige Qu Издательство: Springer Серия: Wireless Networks Год: 2021 Страниц: 182 Язык: английский Формат: pdf (true), epub Размер: 34.1 MB
The service-oriented fifth-generation (5G) and beyond core networks are featured by customized network services with differentiated quality-of-service (QoS) requirements, which can be provisioned through network slicing enabled by the software-defined networking (SDN) and network function virtualization (NFV) paradigms. Multiple network services are embedded in a common physical infrastructure, generating service-customized network slices (also referred to as virtual networks). Each network slice supports a composite service via virtual network function (VNF) chaining, with dedicated packet processing functionality at each VNF. For a network slice with a target traffic load, the end-to-end (E2E) service delivery is enabled by VNF placement at NFV nodes (e.g., data centers and commodity servers) and traffic routing among corresponding NFV nodes, with static resource allocations. When data traffic actually enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. |
Разместил: Ingvar16 2-02-2022, 04:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|