|
 |
|
 |
|
|
 |
|  |
|
Название: CEH v11 Certified Ethical Hacker Study Guide Автор: Ric Messier Издательство: Sybex Год: 2021 Формат: PDF Страниц: 701 Размер: 28 Mb Язык: English
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. |
Разместил: vitvikvas 5-08-2021, 11:53 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AI-Enabled Threat Detection and Security Analysis for Industrial IoT Автор: Hadis Karimipour, Farnaz Derakhshan Издательство: Springer Год: 2021 Страниц: 252 Язык: английский Формат: pdf (true), epub Размер: 38.6 MB
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. |
Разместил: Ingvar16 4-08-2021, 14:19 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Designing Secure Systems Автор: Michael Melone Издательство: CRC Press Год: 2021 Страниц: 220 Язык: английский Формат: pdf (true) Размер: 13.1 MB
Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. In Designing Secure Systems, we begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. |
Разместил: Ingvar16 4-08-2021, 12:54 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Полный курс по сетевым технологиям Автор: Олег Тундайкин Издательство: Интернет-издание Год: 2021 Формат: HTML, pdf Страниц: много Размер: 1.17 Gb Язык: Русский
Если вы начинающий специалист и хотите прокачать свои скилы и знания по сетевым технологиям, то мы обучим вас с нуля всему необходимому.
|
Разместил: Chipa 3-08-2021, 14:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Teach Yourself VISUALLY Microsoft Teams Автор: Wade Matt; Seidenberg Sven Издательство: Visual Год: 2021 Формат: PDF Страниц: 695 Размер: 31 Mb Язык: English
Discover the power of Microsoft Teams with this intuitive and timely new guide Microsoft Teams is unlocking the potential of remote work and virtual meetings at a time when they couldn’t be more necessary. Its feature-rich interface and ease-of-use promise to bring your team together―as long as you can harness its full suite of capabilities. In Teach Yourself VISUALLY Microsoft Teams, Microsoft experts and authors Matt Wade and Sven Seidenberg turn their years of engineering and IT experience loose on the virtual collaboration software now used by over one hundred million people across the globe. |
Разместил: vitvikvas 3-08-2021, 11:22 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Machine Learning Approach for Cloud Data Analytics in IoT Автор: Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Monika Mangla, Suneeta Satpathy, Sirisha Potluri Издательство: Wiley Год: 2021 Формат: True PDF Страниц: 528 Размер: 36,9 Mb Язык: English
In this era of IoT, edge devices generate gigantic data during every fraction of a second. The main aim of these networks is to infer some meaningful information from the collected data. For the same, the huge data is transmitted to the cloud which is highly expensive and time-consuming. Hence, it needs to devise some efficient mechanism to handle this huge data, thus necessitating efficient data handling techniques. Sustainable computing paradigms like cloud and fog are expedient to capably handle the issues of performance, capabilities allied to storage and processing, maintenance, security, efficiency, integration, cost, energy and latency. However, it requires sophisticated analytics tools so as to address the queries in an optimized time. Hence, rigorous research is taking place in the direction of devising effective and efficient framework to garner utmost advantage. |
Разместил: vitvikvas 2-08-2021, 19:16 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Creating an Information Security Program from Scratch Автор: Walter Williams Издательство: CRC Press Год: 2021 Формат: PDF Страниц: 223 Размер: 10 Mb Язык: English
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize.
There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. |
Разместил: vitvikvas 1-08-2021, 17:58 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications Автор: Gautam Kumar, Om Prakash Singh, Hemraj Saini Издательство: CRC Press Год: 2021 Страниц: 238 Язык: английский Формат: pdf (true) Размер: 45.1 MB
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics. Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0. |
Разместил: Ingvar16 1-08-2021, 13:33 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cloud Native Security Автор: Chris Binnie, Rory McCune Издательство: Wiley Год: 2021 Страниц: 334 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB, 10.1 MB
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack. Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today’s Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates. The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. |
Разместил: Ingvar16 1-08-2021, 13:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Безопасность веб-приложений. Разведка, защита, нападение Автор: Эндрю Хоффман Издательство: Питер Год: 2021 Страниц: 336 Язык: русский Формат: pdf Размер: 10.6 MB
Эта книга не просто поможет защитить ваше веб-приложение от хакеров, но также расскажет об их тактике поиска уязвимостей и взлома. Мы обсудим множество приемов, которыми пользуются современные хакеры для взлома веб-приложений, поддерживаемых корпорациями, правительствами, а иногда и любителями. После тщательного изучения этих методов мы перейдем к средствам защиты. Вы сможете по-новому взглянуть на архитектуру приложений, а также научитесь применять передовой опыт обеспечения безопасности при их разработке. Мы оценим различные методы защиты от наиболее распространенных и опасных типов атак на сегодняшний день. |
Разместил: Ingvar16 31-07-2021, 02:18 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|