|
 |
|
 |
|
|
 |
|  |
|
Название: The Cybersecurity Control Playbook: From Fundamentals to Advanced Strategies Автор: Jason Edwards Издательство: Wiley Год: 2025 Страниц: 544 Язык: английский Формат: epub (true) Размер: 10.1 MB
Implement effective cybersecurity measures for all organizations. Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers a step-by-step guide for implementing cybersecurity controls that will protect businesses and prepare them to compete in an overwhelmingly networked landscape. With balanced coverage of both foundational and advanced topics, and concrete examples throughout, this is a must-own resource for professionals looking to keep their businesses safe and secure. Cybersecurity controls comprise a comprehensive set of processes, policies, tools, and techniques to safeguard information systems, data, and digital infrastructure from risks and malicious activities. By implementing these controls, organizations aim to ensure their digital assets' Confidentiality, Integrity, and Availability—collectively known as the CIA triad. In today's interconnected world, where cyber threats are as pervasive as the air we breathe, understanding and deploying these controls is beneficial and essential. |
Разместил: Ingvar16 9-04-2025, 17:39 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: The Comprehensive Guide to Cybersecurity’s Most Infamous Hacks: 70 Case Studies of Cyberattacks Автор: Jason Edwards Издательство: J. Ross Publishing Год: 2025 Страниц: 320 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
Understanding the evolving nature of cybersecurity threats has never been more important in a world increasingly reliant on digital technology. The Comprehensive Guide to Cybersecurity's Most Infamous Hacks offers readers a guided journey through the history of cyberattacks, examining key incidents that have defined and shaped modern cybersecurity. This book dissects major cyber events and their impact, from early hacking exploits like the Phreaking era to sophisticated breaches affecting corporations and governments. Each chapter is dedicated to a specific type of cyberattack, highlighting notorious breaches, malware outbreaks, and nation-state operations. These case studies are paired with a “Lessons Learned” section that offers readers insights into how these attacks were conducted, what vulnerabilities were exploited, and how the affected organizations responded. While the incidents discussed are technical, this book simplifies complex cyber topics to make them accessible to a broad audience, whether you're a cybersecurity enthusiast, a student, or an industry professional. |
Разместил: Ingvar16 8-04-2025, 18:37 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Taming the Hacking Storm: A Framework for Defeating Hackers and Malware Автор: Roger A. Grimes Издательство: Wiley Год: 2025 Страниц: 336 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
A transformative new approach to Internet security from an experienced industry expert. Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat—one that rests on a foundation of identity verification—and explains exactly how to implement it in the real world. Secure coding includes all the education, policies, tools, and methods that are used to reduce the number of vulnerabilities and exposure to vulnerabilities when developing software and firmware code. All developers (and anyone else in the development delivery chain, such as managers) need to be taught secure programming, including common vulnerabilities, common exploitation techniques, access control, least privilege, and fail-safe defaults. All developers should understand the CIA (confidential, integrity, availability) triad that drives the cybersecurity industry. Programmers need to understand authentication, access control, authorization, impersonation, delegation, accounting, auditing, and logging. |
Разместил: Ingvar16 6-04-2025, 17:29 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Нейросеть ChatGPT - расширенная версия Автор: Дмитрий Зверев Издательство: Интернет-издание Год: 2025 Формат: PDF Страниц: 1222 Размер: 211 Mb Язык: Русский
Контент-планы, посты, письма, pdf-отчеты, статьи, истории, сценарии для видео и презентаций, продающие тексты, закрытие возражений, выжимки, подборки, Dalle, Sora, GPTs, холсты, проекты, документы, голосовой и видео-режимы и другие функции
|
Разместил: Chipa 6-04-2025, 12:51 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Cybersecurity Education and Training Автор: Razvan Beuran Издательство: Springer Год: 2025 Страниц: 328 Язык: английский Формат: pdf (true), epub Размер: 11.7 MB
This book provides a comprehensive overview on cybersecurity education and training methodologies. The book uses a combination of theoretical and practical elements to address both the abstract and concrete aspects of the discussed concepts. The book is structured into two parts. The first part focuses mainly on technical cybersecurity training approaches. Following a general outline of cybersecurity education and training, technical cybersecurity training and the three types of training activities (attack training, forensics training, and defense training) are discussed in detail. The second part of the book describes the main characteristics of cybersecurity training platforms, which are the systems used to conduct the technical cybersecurity training activities. This part includes a wide-ranging analysis of actual cybersecurity training platforms, namely Capture The Flag (CTF) systems and cyber ranges that are currently being used worldwide, and a detailed study of an open-source cybersecurity training platform, CyTrONE. A cybersecurity training platform capability assessment methodology that makes it possible for organizations that want to deploy or develop training platforms to objectively evaluate them is also introduced. |
Разместил: Ingvar16 5-04-2025, 17:27 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Immutability: Recipe for Cloud Migration Success: Strategies for Cloud Migration, IaC Implementation, and the Achievement of DevSecOps Goals Автор: Sachin G. Kapale Издательство: BPB Publications Год: 2023 Страниц: 242 Язык: английский Формат: pdf (true), epub (true) Размер: 27.0 MB
Cloud Migration is More Than Infrastructure Migration and Crucial to Business Economy. When migrating to the cloud, how can you minimize the time and effort spent on technical fixes? Creating a fault-tolerant, secure, automated, and scalable cloud on-demand infrastructure is a costly and time-consuming organizational operation. This book teaches you how to migrate infrastructure to the cloud utilizing programmable infrastructure. This book explains various ways to implement immutable infrastructure for scalable and secure infrastructure. To begin with, the book educates you on how to spot problems in today's infrastructure. The book explores how to use programmable infrastructure to provide immutability at each tier level of a multitier application. It also explains how to use the Unified Modeling Language (UML) to create high-level design architecture artifacts since it is the most straightforward tool for depicting the layout of a sophisticated program. Finally, the book discusses a detailed CI/CD workflow for 3-tier custom-developed application infrastructure. |
Разместил: Ingvar16 5-04-2025, 16:49 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Bluesky For Dummies Автор: Eric Butow, Rebecca Bollwitt Издательство: For Dummies Год: 2025 Страниц: 192 Язык: английский Формат: epub (true) Размер: 15.9 MB
The first and most trustworthy guide to the hot new social media platform. Bluesky has been taking the social media world by storm. The platform offers users a high degree of control over what information they view and share, abilities they've lost on other platforms. Bluesky For Dummies serves as your guidebook to navigating the new platform. Learn to import your contacts, control your feed, and share content, with easy-to-follow instructions. This book also shows you how to manage who can contact you and access your content, so you can avoid bots, trolls, and other unsavory characters. For business owners, this Dummies guide is a breath of fresh air—learn how to set up Bluesky for your business and enjoy a peaceful and profitable social experience. Refugees from other social media sites, as well as social media beginners, can find out what it's like to be social without the downsides, thanks to Bluesky For Dummies. |
Разместил: Ingvar16 5-04-2025, 03:54 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Simultaneously Transmitting and Reflecting Surfaces for Wireless Communications Автор: Yuanwei Liu, Xidong Mu, Jiaqi Xu, Junshan Zhang Издательство: Springer Серия: Wireless Networks Год: 2025 Страниц: 217 Язык: английский Формат: pdf (true), epub Размер: 32.5 MB
This book begins with discussing the fundamentals of Simultaneously Transmitting and Reflecting Surfaces (STARS) from the electromagnetic (EM) and communication perspectives. The basic signal and channel models for employing STARS in wireless communications is introduced as well. Then, the different categories and possible hardware implementation of STARS are highlighted. Next, the authors focus on attention to the STARS-aided wireless communications. The authors provide a comprehensive performance analysis of STARS with the outage probability, diversity gain and power scaling laws. Moreover, the operating protocols and corresponding beamforming design of STARS are discussed under different phase-shift models. As a further advance, the application of Machine Learning tools in STAR-aided wireless communications is introduced for addressing the beamforming design and resource allocation problems. The novel STARS-aided integrated sensing and communications (ISAC) in future wireless networks are also discussed with several case studies. This book targets graduate, undergraduate, and postgraduate students as well as researchers working in wireless communications. Wireless communication engineers in industry and government will also want to purchase this book. |
Разместил: Ingvar16 4-04-2025, 05:10 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Smart Infrastructures in the IoT Era Автор: Fadi Al-Turjman Издательство: Springer Год: 2025 Страниц: 1247 Язык: английский Формат: pdf (true) Размер: 35.5 MB
This book provides a comprehensive overview of advanced digital disruptive technologies that can be used or currently used in Construction, and Smart Infrastructures. It provides a holistic collection of such disruptive technologies to address issues or otherwise uplift the technological aspects of various aspects of human lives and projects, impacting the overall culture and society sustainability. These pertinent technologies explored in this book are Artificial Intelligence (AI), Internet of Things (IoT), Unmanned Aerial Vehicles (UAVs), Clouds, and Big Data. It is expected that the book will unify the fields of construction and project management through the integration AI frameworks provided in various chapters. |
Разместил: Ingvar16 4-04-2025, 02:49 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Computer Networking Bible - Your Complete Guide to Mastering Network Fundamentals, Enhancing Security, and Designing Scalable Networks in Just 7 Days Автор: Kevin Sims Издательство: Independently published Год: 2025 Страниц: 702 Язык: английский Формат: pdf, epub (true), mobi Размер: 10.1 MB
Design, secure, and optimize computer networks—master networking from beginner to expert with this complete guide! Do you want to understand how computer networks really work? Are you looking for a simple, step-by-step guide to networking? Do you need practical skills to build and secure your own network? With technology evolving rapidly, networking skills are in high demand. Whether you're setting up a home network, preparing for IT certifications, or managing large-scale systems, this three-book bundle gives you everything you need to learn networking the right way—from the basics to advanced techniques. Even if you've never configured a router before, this book will guide you every step of the way. With real-world examples, hands-on projects, and expert insights, you'll gain the confidence to build, manage, and secure any network. Whether you're a student, an aspiring IT professional, or a business owner looking to improve your infrastructure, this guide is your shortcut to mastering networking faster than ever before. |
Разместил: Ingvar16 2-04-2025, 19:03 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|