|
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity and Privacy in Cyber Physical Systems Автор: Yassine Maleh (Editor), Shojafar Mohammad (Editor), Darwish Ashraf (Editor), Haqiq Abdelkrim (Editor) Издательство: CRC Press Год: 2019 Формат: True PDF Страниц: 454 Размер: 20.5 Mb Язык: English
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader’s awareness of cybersecurity and privacy in CPSs... |
Разместил: bomboane 25-09-2019, 21:47 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы Автор: А.А. Болотов, С.Б. Гашков Жанр: Криптография Издательство: КомКнига Год: 2006 Страниц: 328 Язык: Русский Формат: djvu Размер: 14,61 Mb
Настоящая книга посвящена перспективному направлению в области защиты информации, математическую основу которого составляет теория эллиптических кривых. |
Разместил: rogas86 25-09-2019, 13:19 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Optical Wireless Communications: System and Channel Modelling with MATLAB®, 2nd Edition Автор: Z. Ghassemlooy, W. Popoola, S. Rajbhandari Издательство: CRC Press Год: 2019 Формат: True PDF Страниц: 540 Размер: 35.7 Mb Язык: English
The 2nd Edition of Optical Wireless Communications: System and Channel Modelling with MATLAB® with additional new materials, is a self-contained volume that provides a concise and comprehensive coverage of the theory and technology of optical wireless communication systems (OWC). The delivery method makes the book appropriate for students studying at undergraduate and graduate levels as well as researchers and professional engineers working in the field of OWC.
|
Разместил: bomboane 25-09-2019, 12:26 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Emerging Security Algorithms and Techniques Автор: Khaleel Ahmad (Editor), M. N. Doja (Editor), Nur Izura Udzir (Editor), Manu Pratap Singh (Editor) Издательство: Chapman and Hall/CRC Год: 2019 Формат: True PDF Страниц: 330 Размер: 10.5 Mb Язык: English
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. |
Разместил: bomboane 25-09-2019, 11:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Protecting Information Assets and IT Infrastructure in the Cloud Автор: Ravi Das, de Guise, Preston Издательство: Auerbach Publications Год: 2019 Формат: True PDF Страниц: 318 Размер: 4.8 Mb Язык: English
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
|
Разместил: bomboane 25-09-2019, 10:40 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Zen of Cloud: Learning Cloud Computing by Examples, 2nd Edition Автор: Haishi Bai Издательство: CRC Press Год: 2019 Формат: True PDF Страниц: 316 Размер: 10.2 Mb Язык: English
This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.
|
Разместил: bomboane 25-09-2019, 10:06 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: AWS Certified SysOps Administrator Associate (SOA-C01) Cert Guide (Rough Cuts) Автор: Anthony Sequeira Издательство: Pearson IT Certification Год: 2019 Страниц: 127 Язык: английский Формат: pdf Размер: 10.1 MB
The AWS Certified Sysops Administrator Associate certification demonstrates your expertise in deploying, managing, securing, optimizing, and automating solutions on the world's leading cloud platform, Amazon Web Services. AWS Certified Sysops Administrator Associate Cert Guide is the comprehensive self-study resource for Amazon's valuable new exam. |
Разместил: Ingvar16 24-09-2019, 13:06 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Искусство быть невидимым. Как сохранить приватность в эпоху Big Data Автор(ы): Кевин Митник Издательство: Эксмо Год: 2019 Страниц: 464 Формат: PDF Размер: 11 Мб Язык: русский
Думаете, ваши данные в Интернете хорошо защищены? Так глубоко вы никогда не заблуждались! Кевин Митник — самый разыскиваемый хакер планеты в прошлом, а ныне один из ведущих специалистов по кибербезопасности — знает, насколько опасна неосведомленность в вопросах защиты данных в Сети. |
Разместил: MIHAIL62 22-09-2019, 04:47 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Ethical Hacking: A Comprehensive Beginner’s Guide to Learn and Master Ethical Hacking Автор: Hein Smith, Hilary Morrison Издательство: Amazon Digital Services LLC Год: 2018 Страниц: 63 Язык: английский Формат: epub (true), azw3, pdf (conv) Размер: 10.1 MB
If you wish to enter the world of ethical hacking, this book is for you. Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking will walk you through the processes, skills, and tools you need to succeed. If you want to master ethical hacking, then this is the book you have been looking for. Inside you will learn the important lessons you need to master the basics of ethical hacking. No matter if you are a beginner or a knowledgeable IT professional, this book will enhance your skills and make you the best ethical hacker you can be. When it comes to honing your talents and seeking certification, this book provides you with the information you need to take the next step. This book covers everything you need to get started and move forward with ethical hacking. |
Разместил: Ingvar16 21-09-2019, 14:43 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybercrime Investigators Handbook Автор: Graeme Edwards Издательство: Wiley Год: 2019 Формат: True PDF Страниц: 320 Размер: 2 Mb Язык: English
The investigator’s practical guide for cybercrime evidence identification and collection Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money—safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce. The Cybercrime Investigators Handbook is an innovative guide that approaches cybercrime investigation from the field-practitioner’s perspective. |
Разместил: bomboane 21-09-2019, 14:00 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|