Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Ultimate AWS Certified AI Practitioner (AIF-C01) Exam Guide: Supercharge Your Career in AI with the AWS AI Practitioner (AIF-C01) Certification Using Real-World Applications, Exam Tips and Practical Insights
Автор: Gaurav H Kankaria
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 335
Язык: английский
Формат: epub (true)
Размер: 61.3 MB

Your Complete Roadmap to AWS AI Practitioner Success—Simplified, Practical, and Designed to Help You Pass with Confidence. In today’s AI-powered world, earning the AWS Certified AI Practitioner (AIF-C01) certification is a powerful way to validate your skills, boost your credibility, and stand out in the competitive cloud job market. Ultimate AWS Certified AI Practitioner (AIF-C01) Exam Guide is a comprehensive, beginner-friendly roadmap for professionals, students, and decision-makers looking to master AI and Machine Learning on AWS—and crack the AIF-C01 exam with confidence. Covering everything from AI and ML fundamentals to core AWS services like SageMaker, Bedrock, and Rekognition, this guide also explores Generative AI, vision and language-based AI use cases, and practical tools for personalization, security, and governance. This book is ideal for aspiring AI/cloud professionals, tech sales teams, business leaders, and students seeking a foundational understanding of Artificial Intelligence using AWS.
Разместил: Ingvar16 17-07-2025, 05:12 | Комментарии: 0 | Подробнее
Название: Computer Security Fundamentals
Автор: Nastaran Nazar Zadeh
Издательство: Toronto Academic Press
Год: 2025
Страниц: 212
Язык: английский
Формат: pdf (true)
Размер: 17.3 MB

This book aims to provide a thorough understanding of the fundamental concepts of computer security. Topics include cryptography, network security, malware, and risk management. The book also addresses emerging threats and the latest security technologies. Practical examples and case studies help students understand the application of security principles in various contexts. Computer security fundamentals encompass a range of principles, practices, and technologies aimed at protecting computer systems, networks, and data from unauthorized access, attacks, damage, or theft. These fundamentals form the bedrock of a robust security posture and are essential in maintaining the confidentiality, integrity, and availability of information in digital environments. Designed for both undergraduate students and professionals, it lays a solid foundation for further studies in cybersecurity.
Разместил: Ingvar16 16-07-2025, 18:49 | Комментарии: 0 | Подробнее
Название: Data and Computer Communications
Автор: Nastaran Nazar Zadeh
Издательство: Toronto Academic Press
Год: 2025
Страниц: 252
Язык: английский
Формат: pdf (true)
Размер: 13.1 MB

The aim of this book is to provide a comprehensive understanding of data and computer communications. Topics include network architecture, protocols, wireless communication, and network security. The book covers both fundamental concepts and advanced technologies in data communication. Practical examples and case studies illustrate the application of concepts in real-world network environments. It is designed for undergraduate and graduate courses in computer science, engineering, and information systems. Data and computer communications refer to the exchange of data between devices or systems with the help of a network. This field encompasses various protocols, technologies and concepts aimed at ensuring efficient and reliable communication. Understanding the foundations of data and computer communications is crucial in an era that is marked by the constant impact of data and the rapid advancement of communication technology. This book aims to provide a thorough exploration of this field through eight insightful chapters.
Разместил: Ingvar16 16-07-2025, 18:05 | Комментарии: 0 | Подробнее
Название: Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies
Автор: Dale Meredith
Издательство: BPB Publications
Год: 2025
Страниц: 327
Язык: английский
Формат: epub (true)
Размер: 20.4 MB

Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you through the entire hacking lifecycle, starting with fundamental rules and engagement phases, then moving into extensive reconnaissance using public data, search engines, and social networks to gather intelligence. You will learn active network scanning for live systems, port identification, and vulnerability detection, along with advanced enumeration techniques like NetBIOS, SNMP, and DNS. It also proceeds to explain practical system, exploitation, covering password cracking, social engineering, and specialized tools. It also includes dedicated sections on Wi-Fi network hacks, followed by crucial post-exploitation strategies for maintaining access and meticulously covering your tracks to remain undetected. This book is for IT administrators and security professionals aiming to master hacking techniques for improved cyber defenses.
Разместил: Ingvar16 15-07-2025, 19:02 | Комментарии: 0 | Подробнее
Название: Privileged Access Management: Strategies for Zero Trust in the Enterprise
Автор: Gregory C. Rasner, Maria C. Rasner
Издательство: Apress
Год: 2025
Страниц: 295
Язык: английский
Формат: pdf
Размер: 10.1 MB

Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into. Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.
Разместил: Ingvar16 15-07-2025, 08:11 | Комментарии: 0 | Подробнее
Название: Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Автор: Ahmed A. Abd El-Latif, Mohammed A ElAffendi, Mohamed Ali AlShara, Yassine Maleh
Издательство: CRC Press
Год: 2026
Страниц: 405
Язык: английский
Формат: pdf (true), epub
Размер: 37.1 MB

This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing our digital world. It highlights critical themes such as the application of AI and Machine Learning in threat detection and automation, the security implications of blockchain and distributed ledger technologies, safeguarding critical infrastructure and the IoT, addressing data privacy and governance, and advancing malware analysis and detection techniques. It also delves into technological breakthroughs in Deep Learning for fake account detection, blockchain for secure data exchange, DDoS mitigation strategies, and novel approaches to malware analysis. These findings provide valuable insights into current and emerging cyber threats and effective countermeasures. This book is an essential resource for researchers, cybersecurity professionals, policymakers, and anyone seeking to understand the complex landscape of cybersecurity in the digital age.
Разместил: Ingvar16 15-07-2025, 03:45 | Комментарии: 0 | Подробнее

Название: Создаём кино и Reels с помощью ИИ — быстро и просто
Автор: EverMade School
Издательство: Stepik
Год: 2025
Формат: PDF
Страниц: много
Размер: 12 Mb
Язык: Русский

Научитесь создавать видеоконтент с помощью ИИ, даже если у вас нет опыта. Курс подойдёт любому, кто хочет попробовать себя в съёмках видео, Reels или мини-фильмов — без сложных программ, дорогой техники и временных затрат. Вы освоите простые ИИ-инструменты, научитесь использовать пробные периоды сервисов, превращать идеи в ролики и создавать контент буквально за часы, а не дни.


Разместил: Chipa 14-07-2025, 16:04 | Комментарии: 0 | Подробнее

Название: Grok 3 для начинающих: практическое применение ИИ от Илона Маска
Автор: Future Academy
Издательство: stepik
Год: 2025
Формат: PDF
Страниц: много
Размер: 2 Mb
Язык: Русский

Grok 3 — это искусственный интеллект от xAI, созданный Илоном Маском, чтобы ускорить ваши открытия и упростить жизнь. Этот курс — ваш билет в мир практического применения ИИ! Прямо во время обучения вы зарегистрируетесь в Grok 3 (даже из России с VPN), сделаете первые шаги с реальными заданиями и разберёте все его функции: от поиска данных до генерации картинок.

Разместил: Chipa 14-07-2025, 14:41 | Комментарии: 0 | Подробнее

Название: DeepSeek в действии
Автор: Яценков В.
Издательство: дмк
Год: 2025
Формат: PDF
Страниц: 407
Размер: 17 Mb
Язык: Русский

DeepSeek – это генеративная модель искусственного интеллекта с открытым исходным кодом, основанная на архитектуре Transformer и объединяющая передовые технологии, такие как архитектура MoE, обучение с переменной разрядностью и распределенная оптимизация. Она хорошо зарекомендовала себя в области генерации текста, мультимодальной обработки и адаптации под конкретные прикладные задачи. В книге описаны особенности глубоко оптимизированной архитектуры DeepSeek-V3 и способы применения модели на практике.


Разместил: Chipa 13-07-2025, 19:47 | Комментарии: 0 | Подробнее
Название: Practical Cloud Security Handbook: Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud
Автор: Shiv Kumar
Издательство: BPB Publications
Год: 2025
Страниц: 358
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional—it is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native architectures. This handbook systematically guides you from cloud security fundamentals, including the shared responsibility model, through various cloud-native architectural patterns and top cloud workloads like IAM, VPC, and containerization. You will gain a deep understanding of core security concepts, such as encryption and protocols, and then explore the practical, multi-cloud configurations for securing storage, network services, and identity access management across AWS, Azure, IBM, and GCP. The book progresses to vital operational security aspects like monitoring, encryption application, and robust testing. This book is designed for cloud engineers, DevOps professionals, security analysts, and IT architects. It assumes a foundational understanding of cloud computing concepts and basic IT security principles for aspiring cloud security professionals.
Разместил: Ingvar16 11-07-2025, 08:09 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности