Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Multimedia Security: Tools, Techniques, and Applications
Автор: Bhaskar Mondal, Shyam Singh Rajput
Издательство: Apple Academic Press/CRC Press
Год: 2025
Страниц: 370
Язык: английский
Формат: epub (true)
Размер: 24.2 MB

Multimedia security has become one of the most important topics for organizations and individuals. Presenting important state-of-the art multimedia security techniques and algorithms, this book focuses on data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pan sharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. It also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security.
Разместил: Ingvar16 8-06-2025, 03:31 | Комментарии: 0 | Подробнее
Название: The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Автор: Ravi Das
Издательство: CRC Press
Год: 2026
Страниц: 200
Язык: английский
Формат: pdf, epub (true)
Размер: 14.4 MB

The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done. One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. A penetration test, or “pen test,” is a security test that launches a mock cyberattack to find vulnerabilities in a computer system. Penetration testers are security professionals skilled in the art of ethical hacking, which is the use of hacking tools and techniques to fix security weaknesses rather than cause harm. Companies hire pen testers to launch simulated attacks against their apps, networks, and other assets.
Разместил: Ingvar16 5-06-2025, 23:12 | Комментарии: 0 | Подробнее
Название: Advances in AI for Cloud, Edge, and Mobile Computing Applications
Автор: Shrikaant Kulkarni, P. William
Издательство: CRC Press
Год: 2026
Страниц: 364
Язык: английский
Формат: epub (true)
Размер: 12.2 MB

This new book presents some exciting advances in AI applications, highlighting trends and innovations in edge, cloud, and mobile computing and how they can be integrated with advanced AI for enhancing services, privacy, and security. It explores algorithms, architectures, reliable AI-powered IoTs, and other aspects in networking and applications in diverse frontier areas. These state-of-the-art technologies have a comparative advantage in terms of very low latency, fast response time, low bandwidth cost, and improved resilience. First focusing on advanced cloud AI services, the authors look at a power trading framework of cloud-edge computing in an AI bazaar, the use of anomaly detection in AI in a cloud-fuzzy environment, holistic resource management based on AI and sustainable cloud computing, the application of AI for enhanced privacy and security in smart environments, AI in wireless sensor networks, and more. The volume also presents advances in state-of-the-art edge AI services, along with problems that may be confronted during the application and execution of computing services.
Разместил: Ingvar16 5-06-2025, 20:30 | Комментарии: 0 | Подробнее
Название: Cybersecurity of Industrial Internet of Things (IIoT)
Автор: Atdhe Buja
Издательство: CRC Press
Год: 2026
Страниц: 160
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

While the Industrial Internet of Things (IIoT) continues to redefine industrial infrastructure, the need for thriving Cybersecurity measures has never been more pressing. Cybersecurity of Industrial Internet of Things (IIoT) contends with the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and professionals pursuing to understand and implement effective Cybersecurity solutions. It covers the fundamentals of cyber-physical systems (CPS), Internet of Things (IoT), and IT systems, while handing insights into prevailing and emerging cyber threats targeting industrial environments. This book is thoughtful for cybersecurity professionals working in cyber-physical systems and critical infrastructure domains, including smart cities, aerospace, manufacturing, etc. It is also a valuable resource for Chief Information Officers (CIOs), industrial engineers, and researchers engaged in industrial engineering. Whether you are a practitioner, a professional, or a student casting to upskill, this book provides the essential tools and insights to navigate the emerging perspective of industrial cybersecurity.
Разместил: Ingvar16 5-06-2025, 19:17 | Комментарии: 0 | Подробнее
Название: Systematic Security: A CISO's Playbook
Автор: Timur Qader
Издательство: CRC Press
Год: 2026
Страниц: 204
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

In today’s rapidly evolving digital landscape, safeguarding critical data and systems has never been more vital—or more challenging. Systematic Security: A CISO’s Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation. Timur begins with describing the current state of security and the landscape security professionals find themselves in that offer both opportunity and risk. He goes on to systematically address strategic design, operational efficiency, risk-based modeling, and a rapidly growing regulatory landscape. This essential resource provides step-by-step strategies for implementing a comprehensive security framework. Whether you're launching a new security program or transforming an existing one, this book delivers actionable insights on governance, compliance, and advanced security operations. Whether you’re an aspiring CISO, a security professional, or a business leader looking to fortify your organization’s defenses, Systematic Security delivers the strategies and tools to create lasting security excellence.
Разместил: Ingvar16 5-06-2025, 18:32 | Комментарии: 0 | Подробнее

Название: Создавайте уникальные фотографии с помощью искусственного интеллекта
Автор: Анастасия Мизгир
Издательство: Интернет-издание
Год: 2025
Формат: Docx/jpg
Страниц: много
Размер: 846 Mb
Язык: Русский

Это полный гайд по работе с нейросетями, где ты научишься создавать крутой контент: оживлять фото, генерировать видео, делать профессиональные нейрофотосессии и даже продвигать свои услуги с помощью ИИ.


Разместил: Chipa 5-06-2025, 14:54 | Комментарии: 0 | Подробнее
Название: Надежность компьютерных сетей
Автор: Цвитун А.А., Корнейчук В.И.
Издательство: Корнійчук
Год: 2010
Страниц: 116
Формат: pdf
Размер: 52 мб
Качество: хорошее
Язык: русский

Описана методика расчета локальных и корпоративных компьютерных сетей на основе собранных и обобщенных справочных данных по интенсивности отказов и ремонтопригодности электронных компонент сетей. На конкретных примерах рассмотрены методы повышения надежности компьютерных сетей с математическим анализом их эффективности и целесообразности применения.
Разместил: gol8425 4-06-2025, 17:39 | Комментарии: 0 | Подробнее
Название: The Cybersecurity Workforce of Tomorrow
Автор: Michael Nizich
Издательство: Emerald Publishing Limited
Год: July 31, 2023
Страниц: 224
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

The field of cybersecurity - the protection of electronic data - offers one of the fastest growing job markets today. As the sector grows in importance there will be a rapidly growing demand for qualified analysts, cryptographers, engineers, architects, managers, and executive leaders. The Cybersecurity Workforce of Tomorrow discusses the current requirements of the cybersecurity worker and analyses the ways in which these roles may change in the future as attacks from hackers, criminals and enemy states become increasingly sophisticated. So what is a malicious cyberattack? A malicious cyberattack, if successful, allows unwanted access to unauthorized actors, resulting in potential loss of information integrity. There are also nonmalicious acts that threaten the confidentiality, integrity, and availability of information within a system. For instance, if access is mistakenly granted to an unauthorized employee outside a project team, any intentional or unintentional change in the data leading to serious implications is counted as a cyber breach. There are different forms of cyberattacks which might cause damage or disrupt the assets.
Разместил: Ingvar16 4-06-2025, 05:58 | Комментарии: 0 | Подробнее
Название: Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
Автор: Mike Chapple, Joe Shelley, James Michael Stewart
Издательство: Wiley
Год: 2025
Страниц: 320
Язык: английский
Формат: PDF, True/Retail EPUB, RTF, Mobi
Размер: 10.1 MB

A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere. Information security and privacy roles demand up-to-date knowledge coming from a seemingly countless number of sources, including several certifications—like the CISM, CIPP, and CISSP—legislation and regulations issued by state and national governments, guidance from local and industry organizations, and even international bodies, like the European Union. The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems. Information Security and Privacy Quick Reference is a must-have resource for CISOs, CSOs, Chief Privacy Officers, and other information security and privacy professionals seeking a reliable, accurate, and fast way to answer the questions they encounter at work every single day.
Разместил: Ingvar16 3-06-2025, 05:47 | Комментарии: 0 | Подробнее
Название: CCISO Exam Guide and Security Leadership Essentials: Essential strategies for today's security leaders
Автор: Gopi Thangavel
Издательство: BPB Publications
Год: 2025
Страниц: 480
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you with the skills to navigate the complexities of the modern CISO role. This comprehensive guide delves deep into all five CCISO domains. You will learn to align security with business goals, communicate with boards, and make informed security investment decisions. It also explores operational security, including incident handling, vulnerability assessments, and BCDR planning, with real-world case studies and hands-on exercises. By mastering the content within this book, you will gain the confidence and expertise necessary to excel in the CCISO exam and effectively lead information security initiatives, becoming a highly competent and sought-after cybersecurity professional. This book is tailored for seasoned information security professionals, including security managers, IT directors, and security architects, preparing for CCISO certification and senior leadership roles, seeking to strengthen their strategic security acumen.
Разместил: Ingvar16 3-06-2025, 05:36 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности