Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
Автор: Travis DeForge
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 195
Язык: английский
Формат: pdf, epub (true)
Размер: 11.6 MB

Master one of the most essential tools a professional pen tester needs to know. This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension, contribute positively to the cyber security posture of organizations through the use of Nmap. This book starts at the ground floor by establishing a baseline understanding of what Penetration Testing is, how it is similar but distinct from other types of security engagements, and just how powerful of a tool Nmap can be to include in a pen tester’s arsenal. By systematically building the reader's proficiency through thought-provoking case studies, guided hands-on challenges, and robust discussions about how and why to employ different techniques, the reader will finish each chapter with new tangible skills. With practical best practices and considerations, you'll learn how to optimize your Nmap scans while minimizing risks and false positives.
Разместил: Ingvar16 8-04-2024, 02:33 | Комментарии: 0 | Подробнее
Название: Cloud Computing For Beginners - 18th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 98
Язык: английский
Формат: pdf
Размер: 35.1 MB

Что такое облачные вычисления? В этом руководстве по облачным вычислениям вы узнаете, как получить максимальную отдачу от облачных вычислений и связанных с ними технологий. Хотите узнать, как получить максимальную отдачу от Google, iCIoud и OneDrive и как облачные вычисления могут помочь вашему бизнесу? Ответы вы найдете в этой книге.
Разместил: Ingvar16 4-04-2024, 05:38 | Комментарии: 0 | Подробнее
Название: Google For Beginners - 18th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 37.1 MB

"Google - для начинающих" - это первый и единственный выбор, если вы новичок и хотите узнать все, что вам нужно для начала работы с бесплатными приложениями Google. Это независимое руководство наполнено полезными руководствами и пошаговыми полностью иллюстрированными статьями, написанными на простом, легким для понимания английском языке. На страницах этого нового руководства пользователя вы узнаете все, что вам нужно знать о настройке "из коробки", освоении более продвинутых функций и откроете для себя огромное количество удивительных приложений. С этим неофициальным руководством ни одна проблема не будет неразрешимой, ни один вопрос не останется без ответа, пока вы учитесь, изучаете и улучшаете свой пользовательский опыт.
Разместил: Ingvar16 2-04-2024, 04:04 | Комментарии: 0 | Подробнее
Название: Ethical Hacking: Guide to Safeguarding the Cyber World
Автор: Programming Hub
Издательство: Programming Hub, Inc.
Год: 2024
Страниц: 190
Язык: английский
Формат: pdf
Размер: 45.1 MB

Embark on Your Cybersecurity Journey with "Ethical Hacking: Guide to Safeguarding the Cyber World". In the digital age, where threats loom at every corner of the internet, the mastery of ethical hacking emerges as an essential skill set for anyone aspiring to protect the cyber world. "Ethical Hacking: Guide to Safeguarding the Cyber World," meticulously crafted by the experts at Programming Hub, stands as a comprehensive beacon of knowledge. It welcomes beginners and seasoned professionals alike into the intricate and thrilling domain of cybersecurity. Whether you're looking to safeguard your personal digital space, enhance your professional career, or contribute to a safer internet for all, "Ethical Hacking: Guide to Safeguarding the Cyber World" offers an unparalleled exploration into the tools, techniques, and ethical considerations of ethical hacking. Embark on this journey and transform your curiosity into mastery with a guide that's as engaging as it is enlightening. Prepared to be captivated by the world of ethical hacking, where every page promises a new discovery, equipping you with the knowledge and skills to embark on a fulfilling path towards becoming a guardian of the cyber world. Your key to unlocking the full potential of cybersecurity awaits. Dive into the world of ethical hacking — your adventure starts now.
Разместил: Ingvar16 1-04-2024, 04:35 | Комментарии: 0 | Подробнее
Название: Google Tips & Tricks - 20th Edition, 2024
Автор: Drew Sleep, Andy Downes
Издательство: Future Publishing Ltd.
Год: 2024
Страниц: 132
Язык: английский
Формат: pdf
Размер: 62.4 MB

Google полон сюрпризов. Очень немногие компании могут вызвать такие дискуссии, когда они меняют свой логотип. Но есть гораздо больше того, чем Google встречает глаз и предназначение этой книги - провести вас через глубины океана Google, так что вам никогда не придется гуглить это когда-нибудь снова.
There are three tech companies in the world that most of us will have heard of: Microsoft, Apple and Google. However, only Google has managed to infiltrate our lives in a complete way in a relatively short period and the reach is growing all of the time. Millions of us use Google services for email and even more utilise the company for web searches on desktop computers, laptops, phones and tablets. It does not stop there, though, because the superbly reliable calendar software organises individuals and companies alike, and even online video is dominated by Google thanks to YouTube. All of this is incredibly impressive, but it is just the tip of an ever-growing iceberg and the more we think about Google, the more advantages we find. We can navigate for free anywhere in the world and view 3D re-creations of famous places using Google Maps. We can store and share our photos online whenever the mood strikes us and Google Now is there to automatically prompt us when an event is happening, or to offer information that is pertinent to what we are doing next.
Разместил: Ingvar16 28-03-2024, 07:23 | Комментарии: 0 | Подробнее
Название: Metasurfaces for Wireless Communications: Designs and Implementations
Автор: Yifei Yuan, Yuhong Huang, Fa-Long Luo
Издательство: CRC Press
Год: 2024
Страниц: 321
Язык: английский
Формат: pdf (true)
Размер: 48.2 MB

This book provides a comprehensive coverage of reconfigurable intelligent surface (RIS) based wireless communications by covering all the technology stages from working principles, theories and algorithms, system architectures, real-world implementations, and programming platforms through performance measurements and system testing. Metasurfaces for Wireless Communications: Designs and Implementations serves as a must-be read for everything related to the use of RIS in wireless networks. Authored by three experts in the field, the book is organized into five in-depth and well-designed chapters. The first chapter discusses the fundamentals of metasurfaces for wireless communications as well as the related evolution and requirements of RIS in 6G. The second chapter is devoted to the modeling and analyses of RIS for wireless communications by including electromagnetic field modeling and theoretical analyses of both large- and small-scale channel models. In Chapter 3, the authors mainly address properties’ characterizations and system design of metasurface devices. This book serves not only as a comprehensive reference for professional engineers, researchers, manufacturers, network operators, software developers, service providers, and regulatory bodies aiming at the development, standardization, deployment, and applications of B5G and 6G mobile communications, but also as a textbook for graduate students in circuits, signal processing, wireless communications, information theory, microwave technology, and antenna and propagation.
Разместил: Ingvar16 28-03-2024, 04:03 | Комментарии: 0 | Подробнее
Название: IP Multicast Routing Protocols: Concepts and Designs
Автор: James Aweya
Издательство: CRC Press
Год: 2024
Страниц: 483
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book discusses the fundamental concepts that are essential to understanding IP multicast communication. The material covers the well‑known IP multicast routing protocols, along with the rationale behind each protocol. The book starts with the basic building blocks of multicast communications and networks, then progresses into the common multicast group management methods used, and finally into the various, well‑known multicast routing protocols used in today’s networks. IP multicast provides significant benefits to network operators by allowing the delivery of information to multiple receivers simultaneously with less network bandwidth consumption than using unicast transmission. Applications that can benefit greatly from multicast communications and multicast‑enabled networks include audio and video conferencing, collaborative computing, online group learning and training, multimedia broadcasting, multi‑participant online gaming, and stock market trading. This book’s goal is to present the main concepts and applications, allowing readers to develop a better understanding of IP multicast communication. IP Multicast Routing Protocols: Concepts and Designs presents material from a practicing engineer’s perspective, linking theory and fundamental concepts to common industry practices and real‑world examples.
Разместил: Ingvar16 27-03-2024, 22:04 | Комментарии: 0 | Подробнее
Название: Communication Technologies and Security Challenges in IoT: Present and Future
Автор: Ajay Prasad, Thipendra P. Singh, Samidha Dwivedi Sharma
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 562
Язык: английский
Формат: pdf (true), epub
Размер: 47.6 MB

This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.
Разместил: Ingvar16 26-03-2024, 22:44 | Комментарии: 0 | Подробнее
Название: Networks Attack Detection on 5G Networks using Data Mining Techniques
Автор: Sagar Dhanraj Pande, Aditya Khamparia
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies
Год: 2024
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Artificial Intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using Machine Learning and Artificial Intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, Deep Learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.
Разместил: Ingvar16 26-03-2024, 03:25 | Комментарии: 0 | Подробнее
Название: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
Автор: Jennifer L. Bayuk
Издательство: Wiley
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support.
Разместил: Ingvar16 23-03-2024, 22:20 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности