Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Accelerating Cloud Adoption: Optimizing the Enterprise for Speed and Agility (Final)Название: Accelerating Cloud Adoption: Optimizing the Enterprise for Speed and Agility, First Edition
Автор: Michael Kavis
Издательство: O'Reilly Media
Год: 2020
Страниц: 192
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB, 10.1 MB

Many companies move workloads to the cloud only to encounter issues with legacy processes and organizational structures. How do you design new operating models for this environment? This practical book shows IT managers, CIOs, and CTOs how to address the hardest part of any cloud transformation: the people and the processes. Author Mike Kavis (Architecting the Cloud) explores lessons learned from enterprises in the midst of cloud transformations. You’ll learn how to rethink your approach from a technology, process, and organizational standpoint to realize the promise of cost optimization, agility, and innovation that public cloud platforms provide.
Разместил: Ingvar16 23-08-2021, 19:49 | Комментарии: 0 | Подробнее
Название: Cyber Threats and Nuclear Weapons
Автор: Lin, Herbert
Издательство: Stanford University Press
Год: 2021
Формат: ePUB, PDF
Страниц: 218
Размер: 11,5 Mb
Язык: English

The technology controlling United States nuclear weapons predates the Internet. Updating the technology for the digital era is necessary, but it comes with the risk that anything digital can be hacked. Moreover, using new systems for both nuclear and non-nuclear operations will lead to levels of nuclear risk hardly imagined before. This book is the first to confront these risks comprehensively.
With Cyber Threats and Nuclear Weapons, Herbert Lin provides a clear-eyed breakdown of the cyber risks to the U.S. nuclear enterprise. Featuring a series of scenarios that clarify the intersection of cyber and nuclear risk, this book guides readers through a little-understood element of the risk profile that government decision-makers should be anticipating. What might have happened if the Cuban Missile Crisis took place in the age of Twitter, with unvetted information swirling around? What if an adversary announced that malware had compromised nuclear systems, clouding the confidence of nuclear decision-makers?
Cyber Threats and Nuclear Weapons, the first book to consider cyber risks across the entire nuclear enterprise, concludes with crucial advice on how government can manage the tensions between new nuclear capabilities and increasing cyber risk. This is an invaluable handbook for those ready to confront the unique challenges of cyber nuclear risk.
Разместил: vitvikvas 23-08-2021, 10:35 | Комментарии: 0 | Подробнее
Network Ethical Hacking and Penetration TestingНазвание: Network Ethical Hacking and Penetration Testing (Version 2.0)
Автор: Albert Samuel
Издательство: Amazon.com Services LLC
Год: 2021
Страниц: 387
Язык: английский
Формат: pdf, epub
Размер: 52.4 MB

This book is a comprehensive guide to performing network penetration testing (a.k.a., ethical hacking) according to international standards such as, the Penetration Testing Execution Standard (PTES). The book is highly technical with practical demonstration and tutorials on using different open-source tools. The first module gives an introduction to penetration testing and explains the different standards available in the industry. Then, there is a small module on pre-engagement preparation - a necessary step in any ethical hacking engagement where you interact with your client and agree upon a scope.
Разместил: Ingvar16 22-08-2021, 02:43 | Комментарии: 0 | Подробнее
Cyber Security And Supply Chain Management: Risks, Challenges, And SolutionsНазвание: Cyber Security And Supply Chain Management: Risks, Challenges, And Solutions
Автор: Steven Carnovale, Sengun Yeniyurt
Издательство: World Scientific
Год: 2021
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 12.2 MB

What are the cyber vulnerabilities in supply chain management? How can firms manage cyber risk and cyber security challenges in procurement, manufacturing, and logistics? Today it is clear that supply chain is often the core area of a firm's cyber security vulnerability, and its first line of defense. This book brings together several experts from both industry and academia to shine light on this problem, and advocate solutions for firms operating in this new technological landscape. Specific topics addressed in this book include: defining the world of cyber space, understanding the connection between supply chain management and cyber security, the implications of cyber security and supply chain risk management, the "human factor" in supply chain cyber security, the executive view of cyber security, cyber security considerations in procurement, logistics, and manufacturing among other areas.
Разместил: Ingvar16 21-08-2021, 14:28 | Комментарии: 0 | Подробнее
Название: Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
Автор: Dr. Rajesh Kumar Goutam
Издательство: BPB Publications,
Год: 2021
Формат: True ePUB, PDF
Страниц: 260
Размер: 10 Mb
Язык: English

Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of 'Cybersecurity' as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally.
The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays.
Разместил: vitvikvas 21-08-2021, 11:18 | Комментарии: 0 | Подробнее
Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and ApplicationsНазвание: Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications
Автор: Giovanni Sansavini, Huadong Mo
Издательство: Wiley
Год: 2021
Страниц: 227
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB, 17.1 MB

Gather detailed knowledge and insights into cyber-physical systems behaviors from a cutting-edge reference written by leading voices in the field. In Cyber-Physical Distributed Systems: Modeling, Reliability Analysis and Applications, distinguished researchers and authors Drs. Huadong Mo, Giovanni Sansavini, and Min Xie deliver a detailed exploration of the modeling and reliability analysis of cyber physical systems through applications in infrastructure and energy and power systems. The book focuses on the integrated modeling of systems that bring together physical and cyber elements and analyzing their stochastic behaviors and reliability with a view to controlling and managing them. The book offers a comprehensive treatment on the aging process and corresponding online maintenance, networked degradation, and cyber-attacks occurring in cyber-physical systems.
Разместил: Ingvar16 19-08-2021, 16:22 | Комментарии: 0 | Подробнее
Название: The Official (ISC)2 CISSP CBK Reference, 6th Edition
Автор: Arthur Deane, Aaron Kraus
Издательство: John Wiley & Sons
Год: 2021
Формат: True PDF, ePUB
Страниц: 674
Размер: 10,8 Mb
Язык: English

The only official, comprehensive reference guide to the CISSP
Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024.
This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security.
Разместил: vitvikvas 19-08-2021, 14:31 | Комментарии: 0 | Подробнее
CompTIA Network+ N10-008 Exam Cram, 7th EditionНазвание: CompTIA Network+ N10-008 Exam Cram, 7th Edition
Автор: Emmett Dulaney
Издательство: Pearson Education, Inc.
Год: 2022
Страниц: 320
Язык: английский
Формат: epub
Размер: 10.1 MB

CompTIA Network+ N10-008 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.
Разместил: Ingvar16 18-08-2021, 19:55 | Комментарии: 0 | Подробнее
Название: Digital Influence Warfare in the Age of Social Media
Автор: James J. F. Forest
Издательство: Praeger
Год: 2021
Формат: PDF
Страниц: 321
Размер: 21,1 Mb
Язык: English

This timely book spotlights how various entities are using the Internet to shape people's perceptions and decision-making. Also describes detailed case studies as well as the tools and methods used to identify automated, fake accounts.
This book brings together three important dimensions of our everyday lives. First is digital―the online ecosystem of information providers and tools, from websites, blogs, discussion forums, and targeted email campaigns to social media, video streaming, and virtual reality. Second, influence―the most effective ways people can be persuaded, in order to shape their beliefs in ways that lead them to embrace one set of beliefs and reject others. And finally, warfare―wars won by the information and disinformation providers who are able to influence behavior in ways they find beneficial to their political, social, and other goals.
Разместил: vitvikvas 18-08-2021, 07:19 | Комментарии: 0 | Подробнее
Название: Deep Learning for Internet of Things Infrastructure
Автор: Uttam Ghosh, Mamoun Alazab, Ali Kashif Bashir, and Al-Sakib Khan Pathan
Издательство: CRC Press
Год: 2022
Формат: PDF
Страниц: 267
Размер: 10 Mb
Язык: English

This book promotes and facilitates exchanges of research knowledge and findings across different disciplines on the design and investigation of deep learning (DL)–based data analytics of IoT (Internet of Things) infrastructures. Deep Learning for Internet of Things Infrastructure addresses emerging trends and issues on IoT systems and services across various application domains. The book investigates the challenges posed by the implementation of deep learning on IoT networking models and services. It provides fundamental theory, model, and methodology in interpreting, aggregating, processing, and analyzing data for intelligent DL-enabled IoT. The book also explores new functions and technologies to provide adaptive services and intelligent applications for different end users.
Разместил: vitvikvas 15-08-2021, 08:51 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности