|
|
|
|
|
|
|
| |
|
Название: Network Security Empowered by Artificial Intelligence Автор: Yingying Chen, Jie Wu, Paul Yu, Xiaogang Wang Издательство: Springer Год выхода: 2024 Страниц: 443 Формат: True PDF, EPUB Размер: 44,1 MB Язык: английский
This book introduces cutting-edge methods on security in spectrum management, mobile networks and next-generation wireless networks in the era of artificial intelligence (AI) and machine learning (ML). This book includes four parts: (a) Architecture Innovations and Security in 5G Networks, (b) Security in Artificial Intelligence-enabled Intrusion Detection Systems. (c) Attack and Defense in Artificial Intelligence-enabled Wireless Systems, (d) Security in Network-enabled Applications. |
Разместил: Dovegone 1-07-2024, 16:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain and DLT: A comprehensive guide to getting started with Blockchain and Web3 Автор: Nakul Shah Издательство: BPB Publications Год: 2024 Страниц: 360 Язык: английский Формат: epub (true) Размер: 10.1 MB
Blockchain secures individual transactions with cryptography, creating a tamper-proof chain. In contrast, distributed ledger technologies cover various technologies that may not adhere strictly to blockchain's specific structure. We will start the book by defining blockchain elements, comparing it to DLT, exploring security mechanisms, and looking at Bitcoin's history, transactions, wallets, keys, mining, and forensics. Further in the book, we will explore Ethereum's evolution, Ethereum virtual machine, and smart contracts. We will also discover permissioned blockchains with Hyperledger Fabric and understand crypto assets, ERC20, ERC721 tokens, NFTs, and cryptocurrencies. With real-world examples and practical insights, you will gain a solid grasp of the fundamentals and practical applications that make blockchain a game-changer in various industries. By the end of this book, you will be equipped with the understanding of blockchain technology, its potential applications, and its impact on the future. You will be able to confidently discuss blockchain concepts and evaluate its potential for your own projects. |
Разместил: Ingvar16 30-06-2024, 19:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: ISC2 Certified Cloud Security Professional (CCSP) Exam Guide: Essential strategies for compliance, governance and risk management Автор: Kim van Lavieren Издательство: BPB Publications Год: 2024 Страниц: 514 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP). Cloud security is a rapidly evolving field, demanding professionals with specialized knowledge and expertise. This book equips you with the foundational understanding and practical skills necessary to excel in this critical domain, preparing you to confidently pass the CCSP exam. Discover cloud computing basics, security, and risk management in this book. Learn about data security intricacies, infrastructure protection, and secure configuration. Proactively manage risks with vulnerability assessments, threat mitigation, and incident response. Understand legal and privacy considerations, including international regulations. Dive into identity and access management using tools like SSO and CASBs. Explore cloud application architecture, incorporating security tools like WAFs and API gateways. Get ready for certifications like CCSP with dedicated exam preparation sections. Arm yourself with the knowledge and practical skills cultivated throughout this guide. Confidently navigate the ever-evolving landscape, tackle real-world challenges, and stand out as a CCSP certified professional. This book is intended for security architects, security consultants, security engineers, security analysts, cloud architects, cloud engineers, cloud consultants, cloud administrators, cloud security analysts, and professional cloud developers who wish to secure cloud environments, architectures, designs, applications, and operations. |
Разместил: Ingvar16 30-06-2024, 18:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyberpsychology Can Help Us Understand Cybercrime Автор: Bradley Fowler, Bruce G. Chaundy Издательство: Nova Science Publishers, Inc. Год: 2024 Страниц: 162 Язык: английский Формат: pdf (true) Размер: 14.2 MB
Cyberpsychology is a growing central phenomenon that helps us understand human behavior as it correlates with technology. This book provides knowledge about cyberpsychology and its ability to help us understand the mental and emotional motivation behind cybercriminals deployment of cybercrime and cyber-attacks, domestically and internationally. Research in this book examines forty-two countries’ experiences with cyberattacks and explores how cyberpsychology can help us deter cybercriminals from engaging in cybercrime activities. However, to effectively implement methods of deterrence requires understanding the psychology behind those who engage in cyberattack, cyberespionage, cyberwarfare, cyberterrorism, and cybercrime. The introduction of cyberpsychology has created a clear path to understanding the motivation behind many cybercriminals' malicious acts of terror and attack. Although still in its infancy of development, cyberpsychology can enable governments, psychologists, forensic psychologists, and leaders of academia to begin assessing acts of cyberattack through a lens of mental and emotional human behavior to discover the hidden motivation behind cybercriminals malicious cyber incidents. This book provides some insight into the knowledge of cyberpsychology, helping readers comprehend the role cyberpsychology plays in helping thwart and deter successful cyberattacks, cyberwarfare, cyberterrorism, cybercrime, and cyberespionage. |
Разместил: Ingvar16 29-06-2024, 08:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Google User Manual - 5th Edition 2024 Автор: Papercut Издательство: Papercut Limited Год: 2024 Страниц: 146 Формат: True PDF Размер: 50,2 MB Язык: английский
Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Начав со скромной поисковой системы, Google теперь предоставляет электронную почту с бесплатным онлайн-хранилищем, управление и редактирование фотографий, социальные сети с миллионами пользователей, один из лучших интернет-браузеров, крупнейший в мире видеосайт, ведущую на рынке операционную систему для смартфонов Android, интерактивные карты и навигацию, бесплатную платформу для ведения блогов и многое, многое другое. 100% неофициальное руководство. |
Разместил: Dovegone 28-06-2024, 23:24 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain: the Chain for the Changing Marketing Sphere Автор: Amandeep Singh, Sandhir Sharma, Amrinder Singh, Geetika Madaan Издательство: Nova Science Publishers, Inc. Год: 2024 Страниц: 162 Язык: английский Формат: pdf (true) Размер: 12.0 MB
Marketing has changed a lot in the past decade, but it is about to go through another revolution, thanks in large part to the blockchain. Yes, while most of us associate digital marketing with things like AI and analytics, blockchain may be the most disruptive technology yet to hit marketers in every industry. Blockchain is changing digital marketing, and you may be surprised who will benefit. Blockchain has brought a drastic change to the technology in the last few years and it is referred to as Distributed Ledger Technology (DLT), making the historical backdrop of any computerized resource unalterable and straightforward using decentralization and cryptographic hashing. This book will be useful to all who are involved in using Blockchain technology along with Researchers and policymakers. No doubt, the intermediary of Blockchain technology and its marketers are also be benefited from going through the book. It is assumed that the book will provide proper insights into Blockchain technology to the students and creates a topical interest. Blockchain gained its fame through bitcoin cryptocurrency at the beginning stages. But nowadays blockchain is not only used in digital currencies. It is a decentralized ledger for recording, sharing, and confidential maintenance of transactions that cannot be changed or disrupted. The data are stored digitally in blocks i.e., the customers’ data are stored in digital format, which cannot be altered by any common person. |
Разместил: Ingvar16 28-06-2024, 20:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Comptia Network+ N10-009 Exam Cram Автор: Emmett Dulaney Издательство: Pearson Education Серия: Exam Cram Год: 2025 Страниц: 878 Язык: английский Формат: epub (true) Размер: 21.3 MB
CompTIA Network+ N10-009 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The Network+ exam has become the leading introductory-level network certification available today. It is recognized by both employers and industry giants as providing candidates with a solid foundation of networking concepts, terminology, and skills. The Network+ exam covers a broad range of networking concepts to prepare candidates for the technologies they are likely to work with in today’s network environments. Exam Crams are designed to give you the information you need to know to prepare for a certification exam. They cut through the extra information, focusing on the areas you need to get through the exam. With this in mind, the elements within the Exam Cram titles are aimed at providing the exam information you need in the most succinct and accessible manner. |
Разместил: Ingvar16 28-06-2024, 04:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Smart Cities: Blockchain, AI, and Advanced Computing Автор: Bhisham Sharma, Manik Gupta, Gwanggil Jeon Издательство: CRC Press Год выхода: 2025 Страниц: 273 Формат: True PDF Размер: 10,2 MB Язык: английский
Smart Cities: Blockchain, AI, and Advanced Computing is structured with independent chapters, each highlighting the current and future state-of-the-art technologies addressing smart city challenges. The book covers a variety of application areas, including healthcare, transportation, smart grids, supply chain management, and financial systems. |
Разместил: Dovegone 27-06-2024, 23:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Real Internet Architecture: Past, Present, and Future Evolution Автор: Pamela Zave, Jennifer Rexford Издательство: Princeton University Press Год: 2024 Страниц: 256 Язык: английский Формат: epub (true) Размер: 10.1 MB
A new way to understand the architecture of today's Internet, based on an innovative general model of network architecture that is rigorous, realistic, and modular. This book meets the long-standing need for an explanation of how the Internet's architecture has evolved since its creation to support an ever-broader range of the world's communication needs. The authors introduce a new model of network architecture that exploits a powerful form of modularity to provide lucid, insightful descriptions of complex structures, functions, and behaviors in today's Internet. Countering the idea that the Internet's architecture is "ossified" or rigid, this model—which is presented through hundreds of examples rather than mathematical notation—encompasses the Internet's original or "classic" architecture, its current architecture, and its possible future architectures. For practitioners, the book offers a precise and realistic approach to comparing design alternatives and guiding the ongoing evolution of their applications, technologies, and security practices. For educators and students, the book presents patterns that recur in many variations and in many places in the Internet ecosystem. Each pattern tells a compelling story, with a common problem to be solved and a range of solutions for solving it. For researchers, the book suggests many directions for future research that exploit modularity to simplify, optimize, and verify network implementations without loss of functionality or flexibility. We expect this book to be interesting to anyone involved with today’s computer networks, regardless of whether they are engineers (network designers and operators), academics (faculty and graduate students), researchers, or product developers. The book is not an introductory text, however, and readers will get the most out of this book if they have the kind of general knowledge taught in an undergraduate networking course. |
Разместил: Ingvar16 27-06-2024, 17:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition (Final) Автор: Amanda Berlin, Lee Brotherston, William F. Reyor III Издательство: O’Reilly Media, Inc. Год: 2024 Страниц: 417 Язык: английский Формат: epub Размер: 10.1 MB
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book is designed to serve as a Security 101 handbook that is applicable to as many environments as possible, in order to drive maximum improvement in your security posture for the minimum financial spend. Types of positions that will be able to take away knowledge and actionable data from this include upper-level chief information officers (CIOs), directors, security analysts, systems administrators, and other technological roles. |
Разместил: Ingvar16 27-06-2024, 09:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|