|
|
|
|
|
|
|
| |
|
Название: Home Networking Tricks and Tips - 4th Edition 2024 Автор: Papercut Limited Издательство: Papercut Limited Год: 2024 Язык: английский Формат: pdf Размер: 37.8 MB
"Советы и рекомендации по созданию домашних сетей" - это совершенная цифровая публикация для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их из всего "умного дома". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий. |
Разместил: Ingvar16 25-05-2024, 14:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA Network+ Study Guide: Exam N10-009 (6th Edition) Автор: Todd Lammle, Jon Buhagiar Издательство: Sybex Год: 2024 Страниц: 1024 Язык: английский Формат: epub Размер: 16.6 MB
Prepare for the Network+ certification and a new career in network installation and administration. In the newly revised Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009, bestselling authors and network experts Todd Lammle and Jon Buhagiar deliver thorough and accurate coverage of how to install, configure, and troubleshoot today's networking hardware peripherals and protocols. This book shows you how to succeed on the in-demand CompTIA Network+ certification exam, impress interviewers in the networking industry, and excel in your first role as a network administrator, support technician, or related position. The accomplished authors draw on their combined 30+ years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam: N10-009: Networking concepts, implementation, operations, security, and troubleshooting. Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam: N10-009, the Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009 is a must-have resource for network admins seeking to enhance their skillset with foundational skills endorsed by industry pros and thought leaders from around the world. |
Разместил: Ingvar16 23-05-2024, 22:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Нейронные сети для обработки информации Автор: Осовский С. Издательство: М.: Финансы и статистика Год: 2002 Cтраниц: 345 Формат: pdf Размер: 12 мб Язык: русский
Представлены важнейшие разделы теории искусственных нейронных сетей. Основное внимание уделяется алгоритмам обучения и их применению для обработки измерительной информации. Дается детальный обзор и описание важнейших методов обучения сетей различной структуры, иллюстрируемые численными экспериментами с практически подтвержденными результатами. |
Разместил: rivasss 23-05-2024, 08:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Нечеткая логика и искусственные нейронные сети - Круглов В.В., Дли М.И., Голунов Р.Ю. Автор: Круглов В.В., Дли М.И., Голунов Р.Ю. Издательство: М.: ФИЗМАТЛИТ Год: 2001 Cтраниц: 221 Формат: pdf Размер: 12 мб Язык: русский
В книге рассмотрены теоретические аспекты подобных сетей,именно, аппарат нечеткой логики,основы теории искусственных нейронных сетей и собственно гибридных сетей применительно к задачам управлениям и принятия решения в условиях неопределенности. |
Разместил: rivasss 23-05-2024, 07:20 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release) Автор: Omar Santos Издательство: Pearson IT Certification Год: 2024 Страниц: 657 Язык: английский Формат: epub Размер: 32.2 MB
Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and plans-and the differences among them. You will also learn how threat actors are launching attacks against their victims-compromising confidentiality, integrity, and availability of systems and networks. Santos starts by providing an overview of cybersecurity policy and governance, and how to create cybersecurity policies and develop a cybersecurity framework. He then provides details about governance, risk management, asset management, and data loss prevention. This book begins with a foundational overview of cybersecurity policy and governance to set the stage for the need for balance between policy and practicality in cybersecurity programs. It then goes into detail on cybersecurity policy organization, format, and styles, providing insights into crafting effective and adaptable policies. As the book progresses, it covers topics such as cloud security, governance and risk management, and asset management and data loss prevention, which are just some of the multifaceted challenges organizations face in securing their assets. Cloud security is paramount in today’s environments because of the need to protect data, applications, and infrastructures operated over the cloud. As businesses and organizations increasingly use cloud services, the complexity and volume of cyber threats escalate. Cloud security is important to ensure compliance with rigorous regulatory requirements and industry standards. It plays a crucial role in enabling the safe adoption of cloud technologies, enabling innovation and agility. |
Разместил: Ingvar16 22-05-2024, 10:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response planning Автор: Richard Bingley Издательство: IT Governance Publishing Ltd Год: 2024 Страниц: 315 Язык: английский Формат: pdf (true), epub (true) Размер: 10.4 MB
In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals. |
Разместил: Ingvar16 22-05-2024, 10:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: MAC Protocol Design in Full-Duplex Enabled Wireless Networks Автор: Liqun Fu, Shengbo Liu, Wen Wu, Ning Zhang Издательство: Springer Серия: Wireless Networks Год: 2024 Страниц: 158 Язык: английский Формат: pdf (true), epub Размер: 24.1 MB
This book thoroughly examines the design of full-duplex medium access control (MAC) protocols in wireless networks. It is organized into three main sections: (a) Fundamentals and preliminaries of full-duplex communications, (b) A comprehensive review of the existing full-duplex MAC protocols, and Designs of full-duplex MAC protocols in three typical wireless networks, i.e., wireless local access networks (WLANs), multi-hop networks and millimeter-wave networks. Also, the authors extensively address key challenges in these three wireless full-duplex networks, such as the hidden-node problem, accumulative interference, and deafness and blockage problems. Solutions to these challenges are meticulously devised to enhance the overall network performance. Full-duplex (FD) communication has emerged as one of the most promising technologies in future wireless networks, enabling simultaneous transmission and reception in the same frequency band. Compared with the current half-duplex (HD) system, FD communication can theoretically double the link capacity and spectrum efficiency, hence attracting extensive attention from academia and industry. To fully exploit the benefits of FD communication in wireless networks, medium access control (MAC) protocols should be appropriately designed for FD-enabled wireless networks. We hope this monograph can provide insight into understanding the fundamental performance of FD wireless networks in different network scenarios, including WLANs, multi-hop networks, and mmWave networks. |
Разместил: Ingvar16 21-05-2024, 10:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Нейронные сети, генетические алгоритмы и нечеткие системы Автор: Рутковская Д., Пилиньский М., Рутковский Л. Издательство: М.: Горячая линия - Телеком Год: 2006 Cтраниц: 452 Формат: pdf Размер: 52 мб Язык: русский
Книга посвящена вопросам "интеллектуальных вычислений". Содержит базовые знания о генетических алгоритмах, эволюционном программировании, нечетких системах, а также связях этих направлений с нейронными сетями. Для научных и инженерно-технических работников в области информатики и вычислительной техники,занимающихся созданием и использованием интеллектуальных систем, а также аспирантов и студентов различных специальностей в области компьютерных технологий. |
Разместил: rivasss 20-05-2024, 07:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Social Engineering in Cybersecurity: Threats and Defenses Автор: Gururaj H L, Janhavi V, Ambika V Издательство: CRC Press Год: 2024 Страниц: 241 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It covers a wide range of social engineering attack vectors, including phishing, vishing, pretexting, baiting, tailgating, impersonation, and more. Each attack vector is dissected, with detailed explanations of how they work, real-world examples, and countermeasures. A packet sniffer is a technique for intercepting network packets or a type of spyware that hackers use to track individuals connected to a network. Although packet sniffing technologies are used by network administrators to monitor and verify network traffic, hackers may employ similar tools for unethical objectives. A WIFI adapter with monitor mode and packet sniffing capability is the most crucial item for packet sniffing. It is recommended to use a guest operating system, such as Kali Linux, to carry out packet sniffing. For packet sniffing, a person must be familiar not only with using terminals and sniffer tools such as Wireshark, Ettercap, Driftnet, etc. but also with network layer protocols. |
Разместил: Ingvar16 17-05-2024, 18:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities Автор: Puthiyavan Udayakumar, R. Anandan Издательство: Apress Год: 2024 Страниц: 365 Язык: английский Формат: pdf, epub, mobi Размер: 10.1 MB
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems. The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure. This book equips IoT engineers, developers, and cybersecurity architects with knowledge and practical insights, guiding them in implementing a robust security framework using Microsoft Defender for IoT. By doing so, it ensures a more secure and resilient IoT infrastructure. |
Разместил: Ingvar16 15-05-2024, 21:48 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|