|
|
|
|
|
|
|
| |
|
Название: Recent Trends in Blockchain for Information Systems Security and Privacy Автор: Ajith Abraham, Amit Kumar Tyagi Издательство: CRC Press Год: 2022 Страниц: 362 Язык: английский Формат: pdf (true) Размер: 23.3 MB
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry.
|
Разместил: Ingvar16 16-10-2021, 16:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition Автор: Mike Chapple, David Seidl Издательство: Sybex Год: 2022 Страниц: 579 Язык: английский Формат: pdf (true), epub Размер: 57.2 MB
Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing. In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field. You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems.
|
Разместил: Ingvar16 16-10-2021, 14:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide Автор: Jason Ball, Thomas Arneson Издательство: Cisco Press Год: 2022 Страниц: 592 Язык: английский Формат: epub Размер: 10.1 MB
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. |
Разместил: Ingvar16 16-10-2021, 14:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Where Attackers Infiltrate Your Network and How to Beat Them Автор: David Wolpoff, Keegan Henckel-Miller Издательство: Randori Год: 2021 Формат: PDF Размер: 12 Мб Язык: английский / English
As someone regularly hired to hack Fortune 500 companies, I’ve gone up against many different types of organizations — some are adept at stopping me and making my life harder, others leave the door wide open. What I’ve found is that the most challenging organizations to break into are the ones anticipating my every move. They have experience protecting what matters most. I wrote this book to take you through the attacker’s kill chain step-by-step, as seen and performed by an actual attacker. The goal isn’t to scare you into buying a new security product — there is plenty of that already. I want organizations to understand the attacker’s perspective — a hacker’s logic used to break into organizations. Because once you see your environment the way a hacker does, your security strategy will change. You’ll prioritize like an attacker does, and figure out how to protect what matters most. |
Разместил: black 16-10-2021, 09:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin Автор: Paul C. van Oorschot Издательство: Springer Год: 2021 Формат: PDF Страниц: 464 Размер: 10 Mb Язык: English
Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years. Computer Security and the Internet is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details. The book reinforces fundamental academic concepts with examples and also relates these concepts to practical challenges and real-world incidents. Its overriding focus is brevity, without sacrificing breadth of core topics or technical detail within them; it designates selected content as optional to help readers prioritize topics. While knowledge of elementary operating-system and networking concepts is helpful, review sections summarize the essential background. |
Разместил: vitvikvas 14-10-2021, 06:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Machine Learning for Cloud Management Автор: Jitendra Kumar, Ashutosh Kumar Singh, Anand Mohan Издательство: CRC Press Год: 2022 Страниц: 199 Язык: английский Формат: pdf (true) Размер: 28.9 MB
Cloud computing offers subscription-based on-demand services, and it has emerged as the backbone of the computing industry. It has enabled us to share resources among multiple users through virtualization, which creates a virtual instance of a computer system running in an abstracted hardware layer. Unlike early distributed computing models, it offers virtually limitless computing resources through its large scale cloud data centers. It has gained wide popularity over the past few years, with an ever-increasing infrastructure, a number of users, and the amount of hosted data. The large and complex workloads hosted on these data centers introduce many challenges, including resource utilization, power consumption, scalability, and operational cost. Therefore, an effective resource management scheme is essential to achieve operational efficiency with improved elasticity. Machine learning enabled solutions are the best fit to address these issues as they can analyze and learn from the data.
|
Разместил: Ingvar16 12-10-2021, 14:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments Автор: Ric Messier Издательство: McGraw-Hill Education Год: 2020 Формат: true pdf, epub Страниц: 320 Размер: 29 Mb, 24.3 Mb Язык: English
Manage your own robust, inexpensive cybersecurity testing environment
|
Разместил: bomboane 12-10-2021, 11:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computer Networking: A Top-Down Approach, Global Edition, 8th Edition Автор: James F. Kurose, Keith W. Ross Издательство: Pearson Год: 2022 Формат: PDF Страниц: 797 Размер: 59 Mb Язык: English
A top-down,layered approach to computer networking. Unique among computernetworking texts, the 8th Edition, Global Edition, of thepopular Computer Networking: A Top Down Approach buildson the authors’ long tradition of teaching this complex subject through alayered approach in a “top-down manner.” The text works its way from theapplication layer down toward the physical layer, motivating students byexposing them to important concepts early in their study of networking.Focusing on the Internet and the fundamentally important issues of networking,this text provides an excellent foundation for students in computer science andelectrical engineering, without requiring extensive knowledge of programming ormathematics. The 8th Edition, Global Edition, has been updatedto reflect the most important and exciting recent advances in networking,including the importance of software-defined networking (SDN) and the rapidadoption of 4G/5G networks and the mobile applications they enable. |
Разместил: vitvikvas 12-10-2021, 11:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain in Telecom: An Insight into the Potential Benefits of Combining Blockchain, 5G, IoT, Cloud Computing, and AI/ML in the Telecom Business Автор: Shibaji Sankar Biswas Издательство: BPB Publications Год: 2022 Страниц: 250 Язык: английский Формат: pdf, epub Размер: 10.28 MB
Exploring the future of the Telecom industry with the power of Blockchain technology. ‘Blockchain in Telecom’ delves deeper into the Blockchain architecture and its potential benefits of implementation in the telecommunications industry. This book also provides an overview of how blockchain supports 5G, IoT, Cloud, and AI/ML in telecom businesses. Readers will benefit from reading the chapters as they establish plans for integrating Blockchain technology into the telecoms industry alongside other new technologies such as 5G and IoT, as well as AI/ML, cloud computing, and edge computing. Additionally, this book will help them in managing implementation plans through risk mitigation for implementation and migration.
|
Разместил: Ingvar16 12-10-2021, 04:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions Автор: Ahmed A. Abd El-Latif, Bassem Abd-El-Atty Издательство: Springer Год: 2022 Страниц: 283 Язык: английский Формат: pdf (true), epub Размер: 40.7 MB
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many others. Moreover, it proposes new models, practical solutions and technological advances related to transmitted data in 5G networks with IoT, cloud computing, and other applications in Smart Cities. Finally, it highlights and discusses the techniques and security challenges of data processing in IoT and 5G networks.
|
Разместил: Ingvar16 11-10-2021, 01:24 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|