|
 |
|
 |
|
|
 |
|  |
|
Название: Short-Reach Optical Wireless Communication: By Directed Narrow Beams Автор: Ton Koonen Издательство: Wiley-IEEE Press Год: 2025 Страниц: 315 Язык: английский Формат: pdf (true), epub Размер: 47.3 MB
A deep dive into indoor optical wireless communication networks. In Short-Reach Optical Wireless Communication: By Directed Narrow Beams , distinguished researcher Ton Koonen delivers an in-depth discussion of the design of indoor optical wireless networks and their key functions. The book explores the steering function for directing beams two-dimensionally to devices, the localization function for device finding and the receive function for devices in order to maximize the range of angles and aperture through which light can be captured. These functions have been analyzed, designed, realized, and validated, as well as integrated in a laboratory setting for proof of concept of bidirectional all-optical wireless communication. Perfect for academic and industrial researchers with an interest in optical wireless communication, Short-Reach Optical Wireless Communication: By Directed Narrow Beams will also benefit professionals working and studying in the areas of optical communication modules and systems. |
Разместил: Ingvar16 7-05-2025, 07:07 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Internet Security User Manual - 25th Edition 2025 Автор: Papercut Limited Издательство: Papercut Limited Год: 2025 Страниц: 190 Язык: английский Формат: pdf Размер: 30.2 MB
Вирусы, вредоносное ПО, ransomware, фишинг, аферы, социальная инженерия... Разных видов сетевые угрозы растут с каждым днем, и все чаще появляются новости о различных кибератаках. Данные сегодня стоят дороже нефти или золота, и ваши личные данные становятся мишенью для киберпреступников, мошенников и хакеров. Готовы ли вы встретить новую эру цифровых диверсий и краж? Сможет ли ваш досашний компьютер с Windows выдержать неумолимый натиск современного кибермира? Мы составили это простое руководство, которое поможет вам защитить свой компьютер, сеть и устройства от этих угроз, обезопасив вас от потенциальных угроз и атак. Родители и опекуны также могут узнать, как защитить своих детей в Интернете, и получить советы от экспертов отрасли. Оставайтесь в безопасности и будьте готовы к предстоящим сетевым атакам. |
Разместил: Ingvar16 7-05-2025, 05:40 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Recent Advances in Internet of Things Security Автор: Mourade Azrour, Jamal Mabrouki Издательство: CRC Press Год: 2025 Страниц: 231 Язык: английский Формат: pdf (true), epub Размер: 27.7 MB
The growth of the Internet of Things (IoT) technology has indeed led to an increase in cybersecurity issues. While the Internet of Things enhances accessibility, integrity, availability, scalability, confidentiality, and interoperability among devices, it also faces vulnerabilities due to its diverse attack sources and lack of standardization in security protocols. This makes Internet of Things systems particularly susceptible to cyberattacks. It is essential to ensure proper security measures are in place to protect Internet of Things devices and networks, given their critical role in modern communications and the evolving threat landscape. Always remember to verify important security information from trusted sources. The book provides a comprehensive overview of Internet of Things security, emphasizing the significance of securing Internet of Things products and applications. |
Разместил: Ingvar16 6-05-2025, 17:34 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cyberology: An Optimized Approach to the Cyber-World Автор: Mohd. Shahid Husain, Mohammad Faisal, Halima Sadia, Tasneem Ahmed, Saurabh Shukla, Adil Kaleem Издательство: CRC Press Год: 2025 Страниц: 381 Язык: английский Формат: pdf, epub Размер: 11.4 MB
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cybersecurity, including cybercrime laws, cyberbullying and emerging technologies. It discusses challenges in detecting and preventing cyber threats and analyzes trends in cyber warfare and resilience. This book serves as a resource for understanding the complex relationship between technology and society, equipping readers with the knowledge needed to navigate the evolving cyber landscape. It is for scholars, students, and professionals interested in cybersecurity and challenges. The convergence of Artificial Intelligence (AI) and cybersecurity represents a transformative leap forward in combating the ever-evolving landscape of cyber threats, enhancing the need to strengthen the overall defense systems of nations. This synergy automates analysis, identifies patterns, predicts potential vulnerabilities in large datasets, and employs real-time monitoring to mitigate risks. |
Разместил: Ingvar16 5-05-2025, 07:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity in Robotic Autonomous Vehicles: Machine Learning Applications to Detect Cyber Attacks Автор: Ahmed Alruwaili, Sardar M.N. Islam, Iqbal Gondal Издательство: CRC Press Год: 2025 Страниц: 107 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
Cybersecurity in Robotic Autonomous Vehicles introduces a novel intrusion detection system (IDS) specifically designed for AVs, which leverages data prioritisation in CAN IDs to enhance threat detection and mitigation. It offers a pioneering intrusion detection model for AVs that uses Machine Learning and Deep Learning algorithms. Presenting a new method for improving vehicle security, the book demonstrates how the IDS has incorporated Machine Learning and Deep Learning frameworks to analyse CAN bus traffic and identify the presence of any malicious activities in real time with high level of accuracy. It provides a comprehensive examination of the cybersecurity risks faced by AVs with a particular emphasis on CAN vulnerabilities and the innovative use of data prioritisation within CAN IDs. |
Разместил: Ingvar16 5-05-2025, 06:49 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: A Cybersecurity Leaders Journey: Speaking the Language of the Board Автор: Edward Marchewka Издательство: CRC Press Год: 2025 Страниц: 106 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
In today’s cybersecurity landscape, the role of a cybersecurity leader goes beyond technical expertise. Communicating cybersecurity risks and initiatives to executives and boards demands a unique blend of strategic insight and business language. A Cybersecurity Leader’s Journey: Speaking the Language of the Board takes readers on a transformative path from technical talk to business-savvy communication. Follow Nick, a newly appointed CISO, as he navigates the challenges of bridging the gap between complex cybersecurity concepts and the business-focused concerns of board members. Struggling to convey the impact of cybersecurity initiatives, Nick quickly realizes that his technical knowledge alone isn’t enough to gain the board’s trust. With guidance from a mentor, he learns how to address the board’s priorities, answer the critical question of “What’s in it for me?”, and deliver insights that resonate. This book offers more than just a narrative—it provides actionable takeaways for cybersecurity leaders and other professionals who want to master the art of strategic communication. |
Разместил: Ingvar16 5-05-2025, 05:52 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Это не бред, это Чат! Как говорить с ИИ, получая результат и удовольствие Автор: Альфред Лао Издательство: Автор Год: 2025 Формат: epub, fb2, fb3, ios.epub, mobi, pdf, txt, zip Страниц: 134 Размер: 42 Mb Язык: Русский
Мануал нового поколения в формате бизнес-эссе, для продвинутых и начинающих. Как стать мастером общения с ИИ.
|
Разместил: Chipa 4-05-2025, 17:11 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Exploitology: Web Apps Exploits: Exploitation strategies for pentesters Автор: Mahdi Alemi Издательство: Leanpub Год: 2025-05-01 Страниц: 609 Язык: английский Формат: pdf (true), epub (true) + Code Размер: 13.4 MB
"Exploitology: Web Apps Exploits" explores web app security, focusing on vulnerabilities, exploitation methods, and advanced strategies. With practical examples and real-world scenarios, this book helps readers understand, exploit, and defend against web app threats. Whether you're new to security or an experienced pro, it sharpens your penetration testing skills for the evolving cybersecurity world. Exploitology explores various common vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, Server-Side Request Forgery (SSRF), and many more well-known and emerging vulnerabilities. In addition, it delves into the concepts of attack analysis and how to exploit these vulnerabilities, simulating attacks in controlled environments, and using these exploits to strengthen the defensive capabilities of systems and networks. You should be comfortable with the fundamentals of programming. It’s not necessary to be an expert, but familiarity with at least one programming language will be highly beneficial. Ideally, you should know: PHP, Python, jаvascript/Node.js. |
Разместил: Ingvar16 3-05-2025, 17:05 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Deep Learning in Ad-Hoc Wireless Networks Автор: Gokhan Altan, Ipek Abasikeleş Turgut Издательство: Springer Год: 2025 Страниц: 128 Язык: английский Формат: pdf (true), epub Размер: 23.9 MB
This book presents innovative applications of Deep Learning techniques in wireless ad-hoc networks, addressing critical challenges such as trust, routing, traffic management, and intrusion detection. By combining advanced AI models with real-world network scenarios, the chapters explore novel solutions for improving network reliability, security, and efficiency. Readers benefit from a multidisciplinary approach that bridges Deep Learning and wireless communication, offering both theoretical insights and practical frameworks. Targeting researchers, engineers, and graduate students, this work serves as a valuable resource for understanding and implementing deep learning strategies to optimize modern wireless systems. Whether improving IoT networks, securing controller area networks, or enabling smart mobility, the book provides actionable knowledge on Deep Learning applications for solving current and future challenges in ad-hoc wireless networks. |
Разместил: Ingvar16 2-05-2025, 20:56 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Основы современной криптографии и стеганографии (2013) Автор: Рябко Б.Я., Фионов А.Н. Издательство: Издательство "Горячая линия-Телеком" Год: 2013 - 2-е издание Cтраниц: 232 Формат: pdf Размер: 12 мб Язык: русский
В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации. Рассмотрены основные шифры с открытыми ключами, методы цифровой подписи, основные криптографические протоколы, блоковые и потоковые шифры, криптографические хеш-функции, а также редко встречающиеся в литературе вопросы о конструкции доказуемо невскрываемых криптосистем криптографии на эллиптических кривых. Рассмотрены вопросы, связанные с использованием случайных и псевдослучайных чисел в системах защиты информации. |
Разместил: rivasss 30-04-2025, 17:58 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|