Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: The Art of Cyber Warfare: Strategic and Tactical Approaches for Attack and Defense in the Digital Age
Автор: Peter Kestner
Издательство: Springer
Год: 2024
Страниц: 300
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.1 MB

The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources – but not the laws of physics – it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars?
Разместил: Ingvar16 5-05-2024, 16:32 | Комментарии: 0 | Подробнее
Название: Advanced Manufacturing and Supply Chain with IoT: Revolutionizing Industries Through Smart Technologies and Connectivity
Автор: Ameya Deshpande, Bidyut Sarkar, Deep Dave, Ravi Dave
Издательство: BPB Publications
Год: 2024
Страниц: 414
Язык: английский
Формат: pdf, epub (true)
Размер: 11.0 MB

In the world of industrial manufacturing and supply chain, the lack of real-time visibility and insights into processes poses a significant challenge. However, IoT is set to bring about a profound transformation. This technological revolution promises efficiency gains, operational optimization, and unprecedented business insights. Step into the world of Industry 4.0 and 5.0 with IoT and discover how it revolutionizes production and logistics. Learn about real-time monitoring, predictive maintenance, and quality control while ensuring a secure IoT infrastructure. Explore practical examples in manufacturing, including smart factories, personalized transit, and sustainability practices. Use the potential of AI, predictive analytics, and 3D printing to align your IoT strategies with business goals for enhanced performance. Completing this book equips readers to excel in leveraging IoT for industrial manufacturing and supply chain advancements. They will master IoT concepts, optimize processes, and handle integration challenges. With the acquired knowledge, readers can develop strong IoT strategies, assess project outcomes effectively, and introduce significant improvements to their manufacturing and supply chain operations.
Разместил: Ingvar16 4-05-2024, 19:24 | Комментарии: 0 | Подробнее
Название: Google Tricks and Tips - 18th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 33.0 MB

"Google Tips and Tricks" - идеальное цифровое издание для тех, кто хочет поднять свои навыки на новый уровень. Хотите улучшить пользовательский опыт? Или хотите получить новые знания? Хотите учиться непосредственно у экспертов в этой области? Хотите изучить приемы, используемые многими профессионалами? В этом новом руководстве для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, квалифицированным и опытным пользователем. Станьте пользователем, который сможет полностью реализовать потенциал ваших приложений и, в свою очередь, ваших умных приборов и домашних компьютеров. Мы научим вас навыкам, которые нарабатывались десятилетиями.
Разместил: Ingvar16 4-05-2024, 04:40 | Комментарии: 0 | Подробнее
Название: 5G Edge Computing: Technologies, Applications and Future Visions
Автор: Xiao Ma, Mengwei Xu, Qing Li, Yuanzhe Li
Издательство: Springer
Год: 2024
Страниц: 209
Язык: английский
Формат: pdf (true), epub
Размер: 29.5 MB

Edge computing has been identified as one of the key technologies for 5G networks and beyond due to two prominent advantages: low network latency and reduced core network load. By empowering cloud capabilities and IT service environments at the network edge, edge computing can well support applications of 5G and beyond, such as augmented/virtual reality (AR/VR), vehicular network (ultra-reliable low-latency communication services),Internet of Things (massive machine type communication services), and mobile high-definition video (enhanced mobile broadband services). Therefore, edge computing has attracted the attention of both industry and academia since its emergence. In specific, the book is important for the research community for the following four reasons. First, we present the first comprehensive measurement study on a leading public edge platform, and critical concerns on edge computing are studied in depth through passive-active integrated measurements (Chaps. 2–3). The dataset is open-sourced, which will benefit researchers and practitioners of edge computing and cloud computing significantly. Second, following the measurement results, several key technologies of 5G edge computing are investigated to improve the quality of experience for end users, and optimize the system performance/minimize system cost for edge service providers (Chaps. 4–7). Third, this book explores the integration of edge computing with 5G networks. We implement an end-to-end edge computing system following the 5G standard 3GPP TS 23.501, which supports edge functions such as edge service migration (Ch. 8). Fourth, this book discusses visions of edge computing in the future 6G networks and presents our pioneering exploration (both research and practice) toward edge computing in the 6G era (Ch. 9).
Разместил: Ingvar16 2-05-2024, 19:12 | Комментарии: 0 | Подробнее
Название: Home Networking For Beginners - 6th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 103
Язык: английский
Формат: pdf
Размер: 44.2 MB

Руководство "Home Networking For Beginners - 6th Edition 2024" - это первый и единственный выбор для начинающих, чтобы узнать все, что им нужно знать о создании домашнего сетевого центра и безопасном использовании Интернета. Написанное простым английским языком, это руководство содержит множество полезных советов и пошаговых иллюстрированных инструкций. Это совершенно новое руководство пользователя расскажет вам все, что нужно знать о домашних сетях, интеллектуальных устройствах, VPN, сетевой безопасности и др. С этим неофициальным руководством у вас не останется вопросов без ответов, поскольку вы будете учиться, изучать и совершенствовать свои навыки работы с сетью.
Разместил: Ingvar16 29-04-2024, 06:32 | Комментарии: 0 | Подробнее
Название: AWS Certified SysOps Administrator Study Guide: Associate SOA-C02 Exam (Sybex Study Guide), 3rd Edition
Автор: Jorge T. Negron, Christoffer Jones, George Sawyer
Издательство: Sybex
Год: 2024
Страниц: 544
Язык: английский
Формат: epub (true)
Размер: 22.3 MB

Prepare for success on the AWS SysOps exam, your next job interview, and in the field with this handy and practical guide. The newly updated Third Edition of AWS Certified SysOps Administrator Study Guide: Associate (SOA-C02) Exam prepares you for the Amazon Web Services SysOps Administrator certification and a career in the deployment, management, and operation of an AWS environment. Whether you're preparing for your first attempt at the challenging SOA-C02 Exam, or you want to upgrade your AWS SysOps skills, this practical Study Guide delivers the hands-on skills and best practices instruction you need to succeed on the test and in the field. The first part of the book starts with the foundational topics that you need to know and understand before you dig into the rest of the book content. These topics include account creation, using the management console, using the command-line interface (CLI), and the Personal Health dashboard. This is basically a review of concepts that should be familiar to you already. The second chapter covers identity and access management, Access Analyzer, AWS Organizations, AWS Directory Service, AWS Control Tower, and AWS License Management. This chapter concentrates on account creation and the different modalities to implement authentication and authorization for users and administrators.
Разместил: Ingvar16 26-04-2024, 20:27 | Комментарии: 0 | Подробнее
Название: Защита сетей. Подход на основе анализа данных
Автор: Коллинз М.
Издательство: ДМК Пресс
Год: 2020
Cтраниц: 308
Формат: pdf (ocr)
Размер: 12 мб
Язык: русский

Традиционных способов обнаружения вторжений и анализа системных журналов уже недостаточно для защиты сложных современных сетей. В данной книге специалист по проблемам безопасности Майкл Коллинз предлагает различные методы и инструменты для сбора и анализа данных о трафике. Вы поймете, как используется ваша сеть и что необходимо для обеспечения ее безопасности. Рассматриваются процессы сбора и организации данных, инструменты для их анализа, а также различные аналитические сценарии и методики. Описывается активный контроль и управление трафиком, обнаружение внутренней угрозы, интеллектуальный анализ данных, регрессия и машинном обучении и другие темы.
Разместил: rivasss 23-04-2024, 00:17 | Комментарии: 0 | Подробнее
Название: Wireless Communication in Cyber Security
Автор: S. Sountharrajan, R. Maheswar, Geetanjali Rathee
Издательство: Wiley-Scrivener
Год: 2023
Страниц: 284
Язык: английский
Формат: pdf (true)
Размер: 15.7 MB

Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies. This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial Intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered.
Разместил: Ingvar16 20-04-2024, 05:23 | Комментарии: 0 | Подробнее
Название: Computational Intelligence and Blockchain in Biomedical and Health Informatics
Автор: Pankaj Bhambri, Sita Rani, Muhammad Fahim
Издательство: CRC Press
Год: 2024
Страниц: 361
Язык: английский
Формат: pdf (true)
Размер: 30.6 MB

Advancements in computational intelligence, which encompasses Artificial Intelligence, Machine Learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data. These techniques offer novel approaches to understanding complex biological systems, improving disease diagnosis, optimizing treatment plans, and enhancing patient outcomes. Computational Intelligence and Blockchain in Biomedical and Health Informatics introduces the role of computational intelligence and blockchain in the biomedical and health informatics fields and provides a framework and summary of the various methods. The book emphasizes the role of advanced computational techniques and offers demonstrative examples throughout. Techniques to analyze the impacts on the biomedical and health Informatics domains are discussed along with major challenges in deployment. Rounding out the book are highlights of the transformative potential of computational intelligence and blockchain in addressing critical issues in healthcare from disease diagnosis and personalized medicine to health data management and interoperability along with two case studies. This book is highly beneficial to educators, researchers, and anyone involved with health data. Machine Learning, on the other hand, takes advantage of methods that allow computers to discover patterns and make predictions without being explicitly programmed to do so. Models are trained using labelled data in supervised learning, while unlabelled data is used in unsupervised learning. Decision trees, support vector machines, and neural networks are all examples of common Machine Learning methods.
Разместил: Ingvar16 20-04-2024, 03:59 | Комментарии: 0 | Подробнее
Название: Ransomware and Data Extortion: The Shifting Threat Landscape
Автор: Ryan Golden, Anthony M. Freed
Издательство: O’Reilly Media, Inc.
Год: 2024-04-19
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Ransomware poses an existential threat to organizations of all sizes in any vertical. These attacks are extremely lucrative, with ransom demands and recovery costs bleeding victim organizations out of millions of dollars. This book provides an overview of the ransomware economy, including the threat that this complex attack ecosystem poses to organizations, and reveals how you can best prepare to be resilient in the face of this threat and remain operational. Ransomware is a major threat to businesses and organizations of all kinds. Ransomware and data extortion attacks are not only disruptive to business operations but also costly to resolve. They spur regulatory actions and civil litigation, including class action lawsuits against victim organizations, and more recently have even resulted in criminal charges being lodged against company officers. A dedicated anti-ransomware solution utilizes Artificial Intelligence (AI) and Machine Learning (ML) with behavioral analytics to identify and stop polymorphic and repacked variants of ransomware that EPP, EDR, and XDR continue to miss. This is because AI/ML endpoint protection models were trained on characteristics that all malware share, including a subset of ransomware.
Разместил: Ingvar16 19-04-2024, 21:08 | Комментарии: 0 | Подробнее



 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности