|
 |
|
 |
|
|
 |
|  |
|
Название: Auditing Information and Cyber Security Governance; A Controls-Based Approach Автор: Robert E. Davis Издательство: CRC Press Год: 2021 Страниц: 299 Язык: английский Формат: pdf (true) Размер: 10.1 MB
A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule. |
Разместил: Ingvar16 8-08-2021, 12:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Software-Defined Networking for Future Internet Technology: Concepts and Applications Автор: Kshira Sagar Sahoo, Bibhudatta Sahoo, Brojo Kishore Mishra Издательство: CRC Press, Apple Academic Press Inc. Год: 2022 Страниц: 308 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security. |
Разместил: Ingvar16 7-08-2021, 15:16 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Active Directory глазами хакера Автор: Ralf Hacker Издательство: БХВ-Петербург Год: 2021 Страниц: 178 Язык: русский Формат: pdf Размер: 65.7 MB
Рассмотрена архитектура системы безопасности Active Directory. Приведены сведения об используемом хакерами инструментарии. Последовательно и подробно описываются все этапы атаки на домен глазами злоумышленника: поиск уязвимостей и разведка в атакуемой сети, повышение привилегий, боковое перемещение, поиск и сбор критически важных данных. Описаны способы противодействия обнаружению атаки с применением различных инструментальных средств. Рассматриваются методы сохранения доступа к скомпрометированной сети как с помощью сторонних инструментов, так и с использованием групповых политик домена. |
Разместил: Ingvar16 7-08-2021, 14:23 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Securing Social Networks in Cyberspace Автор: Al-Sakib Khan Pathan Издательство: CRC Press Год: 2021 Формат: True PDF Страниц: 317 Размер: 13 Mb Язык: English
This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. |
Разместил: vitvikvas 7-08-2021, 12:14 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: The Art of Attack: Attacker Mindset for Security Professionals Автор: Maxie Reynolds Издательство: Wiley Год: 2021 Страниц: 307 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB, 19.6 MB
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers. In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. |
Разместил: Ingvar16 7-08-2021, 11:37 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Autonomous Airborne Wireless Networks Автор: Muhammad Ali Imran, Oluwakayode Onireti Издательство: Wiley-IEEE Press Год: 2021 Формат: PDF Размер: 10 Мб Язык: английский / English
Autonomous Airborne Wireless Networks delivers an insightful exploration of recent advances in the theory and practice of using airborne wireless networks to provide emergency communications, coverage and capacity expansion, information dissemination, and more. The distinguished engineers and editors have selected resources that cover the fundamentals of airborne networks, including channel models, recent regulation developments, self-organized networking, AI-enabled flying networks, and notable applications in a variety of industries. The book evaluates advances in the cutting-edge of unmanned aerial vehicle wireless network technology while offering readers new ideas on how airborne wireless networks can support various applications expected of future networks. The rapidly developing field is examined from a fresh perspective, one not just concerned with ideas of control, trajectory optimization, and navigation. |
Разместил: black 6-08-2021, 18:06 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: CEH v11 Certified Ethical Hacker Study Guide Автор: Ric Messier Издательство: Sybex Год: 2021 Формат: PDF Страниц: 701 Размер: 28 Mb Язык: English
As protecting information continues to be a growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v11) certification. The CEH v11 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instructions. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include common attack practices like reconnaissance and scanning. Also covered are topics like intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things (IoT) and more. |
Разместил: vitvikvas 5-08-2021, 11:53 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AI-Enabled Threat Detection and Security Analysis for Industrial IoT Автор: Hadis Karimipour, Farnaz Derakhshan Издательство: Springer Год: 2021 Страниц: 252 Язык: английский Формат: pdf (true), epub Размер: 38.6 MB
This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications. |
Разместил: Ingvar16 4-08-2021, 14:19 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Designing Secure Systems Автор: Michael Melone Издательство: CRC Press Год: 2021 Страниц: 220 Язык: английский Формат: pdf (true) Размер: 13.1 MB
Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. In Designing Secure Systems, we begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity. |
Разместил: Ingvar16 4-08-2021, 12:54 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Полный курс по сетевым технологиям Автор: Олег Тундайкин Издательство: Интернет-издание Год: 2021 Формат: HTML, pdf Страниц: много Размер: 1.17 Gb Язык: Русский
Если вы начинающий специалист и хотите прокачать свои скилы и знания по сетевым технологиям, то мы обучим вас с нуля всему необходимому.
|
Разместил: Chipa 3-08-2021, 14:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|