Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Taking Control of Your Personal Data
Автор: Jennifer Golbeck
Издательство: The Teaching Company
Год: 2020
Формат: PDF
Страниц: 132
Размер: 10,6 Mb
Язык: English

You hear the stories every day: Your household devices are spying on you. Your private social media data has been leaked to the world. Another big online company has had a data breach and your personal information has been exposed. An algorithm has decided what product you should buy. Every day, it seems your control slips away.
Разместил: vitvikvas 6-02-2020, 18:14 | Комментарии: 0 | Подробнее
Название: Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services
Автор: Silvano Gai
Издательство: Addison-Wesley Professional
Год: 2020
Формат: EPUB
Страниц: 272
Размер: 10 Mb
Язык: English

Prepare for the future of cloud infrastructure: Distributed Services Platforms
By moving service modules closer to applications, Distributed Services (DS) Platforms will future-proof cloud architectures–improving performance, responsiveness, observability, and troubleshooting. Network pioneer Silvano Gai demonstrates DS Platforms’ remarkable capabilities and guides you through implementing them in diverse hardware.

Focusing on business benefits throughout, Gai shows how to provide essential shared services such as segment routing, NAT, firewall, micro-segmentation, load balancing, SSL/TLS termination, VPNs, RDMA, and storage–including storage compression and encryption. He also compares three leading hardware-based approaches–Sea of Processors, FPGAs, and ASICs–preparing you to evaluate solutions, ask the right questions, and plan strategies for your environment.
Разместил: vitvikvas 6-02-2020, 16:01 | Комментарии: 0 | Подробнее
Название: Intrusion Detection: A Data Mining Approach
Автор: Nandita Sengupta, Jaya Sil
Издательство: Springer
Год: 2020
Страниц: 151
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.
Разместил: Ingvar16 5-02-2020, 19:02 | Комментарии: 0 | Подробнее
Название: Data Science in Cybersecurity and Cyberthreat Intelligence
Автор: Leslie F. Sikos, Kim-Kwang Raymond Choo
Издательство: Springer
Год: 2020
Страниц: 140
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence, allowing complex and previously unknown cyberthreats to be identified and classified, and countermeasures to be incorporated in novel incident response and intrusion detection mechanisms.
Разместил: Ingvar16 5-02-2020, 18:31 | Комментарии: 0 | Подробнее
Название: Adaptive Autonomous Secure Cyber Systems
Автор: Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang , Michael Wellman
Издательство: Springer
Год: 2020
Формат: PDF
Страниц: 291
Размер: 12 Mb
Язык: English

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:
Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;
Разместил: vitvikvas 5-02-2020, 04:32 | Комментарии: 0 | Подробнее
Название: Mobility Internet of Things 2018: Mobility IoT
Автор: Dagmar Cagáňová and Natália Horňáková
Издательство: Springer
Год: 2020
Формат: PDF
Размер: 11 Мб
Язык: английский / English

The scientific monograph Mobility IoT deals with innovative technologies influencing industry and connectivity sectors in the future industrial, urban, social and sustainable development. The mobility and Internet of Things are worldwide phenomena almost in everyday life. It is a challenge in many industries, not only in car manufacturing sector but additionally in e-mobility, smart cities, smart factories (Industry 4.0), smart logistics, social mobility, technological innovations, sustainability, multicultural development, Internet of Things sectors, etc., belonging to the topic of SMART Mobility IoT issue.
Разместил: black 4-02-2020, 19:26 | Комментарии: 0 | Подробнее
Название: Applied Incident Response
Автор: Steve Anson
Издательство: Wiley
Год: 2020
Формат: True PDF
Страниц: 464
Размер: 17.5 Mb
Язык: English

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network
Разместил: bomboane 3-02-2020, 13:09 | Комментарии: 0 | Подробнее
Название: (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Second Edition
Автор: Ben Malisow
Издательство: Sybex
Год: 2020
Формат: True PDF
Страниц: 400
Размер: 10 Mb
Язык: English

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you’ve already mastered.
Разместил: bomboane 3-02-2020, 12:51 | Комментарии: 0 | Подробнее
Название: Cryptography Arithmetic: Algorithms and Hardware Architectures (Advances in Information Security)
Автор: Amos R. Omondi
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 336
Размер: 10 Mb
Язык: English

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.
Разместил: bomboane 3-02-2020, 00:18 | Комментарии: 0 | Подробнее

Название: Effective Cybersecurity A Guide to Using Best Practices and Standards (2019)
Автор: William Stallings
Издательство: Pearson Education Limited
Год: 2019
Формат: pdf
Страниц: 893
Размер: 17 mb
Язык: Английский

In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action.
Разместил: na5ballov 2-02-2020, 13:38 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности