|
|
|
|
|
|
|
| |
|
Название: CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide Автор: Joseph Muniz, James Risler, Steven Chimes Издательство: Cisco Press Год: 2022 Страниц: 456 Язык: английский Формат: epub Размер: 32.2 MB
This is Cisco's official, comprehensive self-study resource for Ciscos SVPN 300-730 exam (Implementing Secure Solutions with Virtual Private Networks), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Security certification. It will thoroughly prepare network professionals to deliver secure solutions based on Cisco VPN technologies. Designed for all CCNP Security candidates, CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide covers every SVPN #300-730 objective concisely and logically, with extensive teaching features designed to promote retention and understanding.
|
Разместил: Ingvar16 21-10-2021, 02:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cognitive Radio: Computing Techniques, Network Security and Challenges Автор: Budati Anil Kumar, Peter Ho Chiung Ching Издательство: CRC Press Год: 2022 Страниц: 147 Язык: английский Формат: pdf (true) Размер: 11.99 MB
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that has yet to be addressed. In order to address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CR’S include that of ensuring secure device operations and data transmission with advanced computing techniques. This book gathers together the latest research works focusing on the issues, challenges and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems facing Industry 4.0 and will be an essential resource for the scholars in all areas of the field.
|
Разместил: Ingvar16 20-10-2021, 16:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Securing Mobile Devices and Technology Автор: Kutub Thakur and Al-Sakib Khan Pathan Издательство: CRC Press Год: 2022 Формат: PDF Страниц: 277 Размер: 12 Mb Язык: English
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners. |
Разместил: vitvikvas 20-10-2021, 09:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The CISO’s Transformation: Security Leadership in a High Threat Landscape Автор: Raj Badhwar Издательство: Springer Год: 2021 Страниц: 180 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. The Cybersecurity industry is very new and faces plethora of challenges such as widening gap between digital innovations and security controls, ever increasing and complex digital threat landscape due to rise and adoption of cloud, AI, IOT, 5G etc., the rise of the threat adversaries and severe shortage of Cybersecurity talent in the industry. The CISO role has evolved to a level which requires a well-rounded skill to ensure success.
|
Разместил: Ingvar16 20-10-2021, 04:48 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information Security Автор: Sanil Nadkarni Издательство: BPB Publications Год: 2021 Страниц: 292 Язык: английский Формат: pdf, epub Размер: 10.2 MB
An Ultimate Guide to Building a Successful Career in Information Security. The book starts by introducing the fundamentals of Information Security. You will deep dive into the concepts and domains within Information Security and will explore the different roles in Cybersecurity industry. The book includes a roadmap for a technical and non-technical student who want to make a career in Information Security. You will also understand the requirement, skill and competency required for each role. The book will help you sharpen your soft skills required in the Information Security domain. The book will help you with ways and means to apply for jobs and will share tips and tricks to crack the interview.
|
Разместил: Ingvar16 19-10-2021, 20:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals Автор: Yuri Diogenes, Nicholas DiCola Издательство: Microsoft Press/Pearson Education Год: 2022 Страниц: 224 Язык: английский Формат: epub Размер: 24.0 MB
Prepare for Microsoft Exam SC-900 and help demonstrate your real-world knowledge of the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. Designed for business stakeholders, new and existing IT professionals, functional consultants, and students, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Security, Compliance, and Identity Fundamentals level.
|
Разместил: Ingvar16 18-10-2021, 14:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain for Information Security and Privacy Автор: Udai Pratap Rao, Piyush Kumar Shukla, Chandan Trivedi Издательство: CRC Press Год: 2022 Страниц: 441 Язык: английский Формат: pdf (true) Размер: 52.8 MB
Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains.
|
Разместил: Ingvar16 17-10-2021, 15:30 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Edge Computing: Fundamentals, Advances and Applications Автор: K. Anitha Kumari, G. Sudha Sadasivam, D. Dharani Издательство: CRC Press Год: 2022 Страниц: 181 Язык: английский Формат: pdf (true) Размер: 16.9 MB
This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate the readers to setup edge-based environment and work with edge analytics. It covers important topics including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication.
|
Разместил: Ingvar16 17-10-2021, 15:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Инфокоммуникационные системы. Программное обеспечение Автор: Журавлев А. Е., Макшанов А. В., Иванищев А. В. Издательство: Лань Год: 2021 Cтраниц: 376 Формат: pdf Размер: 21 мб Язык: русский
В учебнике подробно рассмотрены вопросы, связанные с актуальным программным обеспечением, обеспечивающим функционирование современных инфокоммуникационных систем и сетей, например, операционные системы и среды, типичные протоколы и программные интерфейсы и т. п. Также уделено отдельное внимание технологиям и подходам в сфере виртуализации. В заключении освещены основные особенности и нюансы проектирования современных высоконагруженных систем и сетей корпоративного уровня. |
Разместил: rivasss 17-10-2021, 08:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Online Terrorist Propaganda, Recruitment, and Radicalization Автор: John R. Vacca Издательство: CRC Press Год: 2019 Формат: PDF Страниц: 532 Размер: 16,2 Mb Язык: English
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online 'footprints' to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment. With contributions from leading experts in the field—including practitioners and terrorism researchers—the coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism. |
Разместил: vitvikvas 17-10-2021, 07:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|