|
|
|
|
|
|
|
| |
|
Название: Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets Автор: Erdal Ozkaya Издательство: BPB Publications Год: 2022 Страниц: 536 Язык: английский Формат: pdf Размер: 17.4 MB
Knowing your threat actors together with your weaknesses and the technology will master your defense. This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information. The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause. The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly. |
Разместил: Ingvar16 6-10-2023, 08:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Dark World: A Book on the Deep Dark Web Автор: Atif Ali, Muhammad Qasim Издательство: CRC Press Год: 2024 Страниц: 303 Язык: английский Формат: pdf (true) Размер: 57.6 MB
Discover the hidden depths of the digital underworld in this comprehensive, interdisciplinary exploration of the Dark Web. Ideal for security agencies, professionals, counter-terrorism experts, and policymakers alike, this work offers invaluable insights that will enhance understanding and fortify strategies. By shedding particular light on the nuances of the ‘dark market,’ this book provides readers with a detailed understanding of the dark web, encompassing both its sinister underbelly and unexpected potential. This book also uncovers the latest trends and cutting-edge mitigation techniques. From illicit transactions to thriving business ventures, it examines the key domains and sectors that thrive within this clandestine environment. This book consolidates myriad perspectives on security and threats on the Dark Web. Internet and World Wide Web (WWW) are far more extensive than we see when we’re just browsing in the digital environment. New information technology (IT) applications are causing the internet and its users to increase, which is expected to continue. Everything that isn’t indexable on the Surface Web is included in the Deep Web. This book’s objective is to present an interdisciplinary and easily understandable book on the Dark Web. This research will benefit security agencies, security professionals, counter-terrorism experts, and policymakers. |
Разместил: Ingvar16 4-10-2023, 14:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Internet-ontologies-Things: Smart Objects, Hidden Problems, and Their Symmetries Автор: Sungyong Ahn Издательство: Bloomsbury Academic Год: 2023 Страниц: 209 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Internet-ontologies-Things explores how power mobilizes algorithmic and ontological objects, for example smartwatches and smart buildings, to uncover hidden problems within the physical domains of the IoT. One popular approach of software studies in recent times is to think of algorithmic objects - like the 'things' in what is known as the “Internet of Things” (IoT) - as ontological agents to the same extent as the humans who use them. While post-humanist philosophies, such as speculative realism and object-oriented ontology, have provided a theoretical foundation for this methodological elevation of objects to autonomous and sentient beings, the complicity between this philosophical discourse and the material transformation of our everyday lives, which are embedded with these “smart” objects, remains relatively underexplored. Within this constantly changing infrastructure, Smart Objects, Hidden Problems, and their Symmetries reveals a new form of economic and political power whose algorithmic governance finds its legitimacy in our newly cultivated paranoia about unknown and perhaps unknowable computational problems. In its examination of our smart world, this book illuminates the mechanisms by which this power mobilizes various algorithmic and ontological objects, from smart wearables to smart buildings, to identify a greater number of hidden problems within the physical domains of the IoT, from city sidewalks to the nerves and organs of our very own bodies. |
Разместил: Ingvar16 3-10-2023, 21:43 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybercrime and Cybersecurity Автор: Paul A. Watters Издательство: CRC Press Год: 2024 Страниц: 183 Язык: английский Формат: pdf (true) Размер: 10.1 MB
The field of cybersecurity and cybercrime is a critical and rapidly evolving area of study. As our society becomes more and more reliant on technology, the risks of cybercrime increase. This book provides a comprehensive introduction to the field, covering both cybercrime and cybersecurity. The book starts by providing an overview of common threats and the risk management view of cybercrime. It explores the different types of threats, such as hacking, malware, phishing, and social engineering, and the various ways in which they can impact individuals, businesses, and society at large. It also introduces the concept of risk management and the different approaches that can be used to manage cyber risks, such as risk avoidance, mitigation, transfer, and acceptance. From there, the book delves into the three key areas of cybersecurity: people, process, and technology. It explores the role of people in cybersecurity, including staffing, psychological profiling, role sensitivity, awareness, training, and education. It also examines the importance of process, including strategy and governance, policy, configuration management, and physical security. Finally, the book explores the critical role of technology, including system security, identification and authentication, authorisation and access control, and cryptography. |
Разместил: Ingvar16 3-10-2023, 09:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam, 2nd Edition Автор: Todd Montgomery Издательство: Sybex Год: 2024 Страниц: 595 Язык: английский Формат: pdf (true) Размер: 16.9 MB
The latest edition of the official study guide for the AWS Advanced Networking certification specialty exam. The newly revised second edition of the AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam delivers an expert review of Amazon Web Services Networking fundamentals as they relate to the ANS-C01 exam. You’ll find detailed explanations of critical exam topics combined with real-world scenarios that will help you build the robust knowledge base you need for the test―and to succeed in the field as an AWS Certified Networking specialist. Learn about the design, implementation and deployment of AWS cloud-based Networking solutions, core services implementation, AWS service architecture design and maintenance (including architectural best practices), monitoring, Hybrid networks, security, compliance, governance, and network automation. The book coveted AWS Advanced Networking credential proves your skills with Amazon Web Services and hybrid IT network architectures at scale. It assesses your ability to apply deep technical knowledge to the design and implementation of AWS Networking services. This book provides you with comprehensive review and practice opportunities so you can succeed on the challenging ANS-C01 exam the first time around. |
Разместил: Ingvar16 2-10-2023, 19:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: SSL and TLS: Theory and Practice, 3rd Edition Автор: Rolf Oppliger Издательство: Artech House Год: 2023 Страниц: 383 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Now in its Third Edition, this completely revised and updated reference provides a thorough and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the details and technical subtleties and showing how the current design helps mitigate the attacks that have made press headlines in the past. The book tells the complete story of TLS, from its earliest incarnation (SSL 1.0 in 1994), all the way up to and including TLS 1.3. Detailed descriptions of each protocol version give you a full understanding of why the protocol looked like it did, and why it now looks like it does. You will get a clear, detailed introduction to TLS 1.3 and understand the broader context of how TLS works with firewall and network middleboxes, as well the key topic of public infrastructures and their role in securing TLS. You will also find similar details on DTLS, a close sibling of TLS that is designed to operate over UDP instead of TCP. The book helps you fully understand the rationale behind the design of the SSL, TLS, and DTLS protocols and all of its extensions. It also gives you an in-depth and accessible breakdown of the many vulnerabilities in earlier versions of TLS, thereby more fully equipping you to properly configure and use the protocols in the field and protect against specific (network-based) attacks. |
Разместил: Ingvar16 1-10-2023, 08:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hybrid Threats, Cyberterrorism and Cyberwarfare Автор: Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras Издательство: CRC Press Год: 2023 Страниц: 202 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict, etc., and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike. ‘Cyberconflict’ and ‘cyberwar’ serve as examples of the use of new technologies within the scope of hybrid threats. Cyberwar basically refers to a sustained computer-based cyberattack by a state against the information technology (IT) infrastructure of a target state. On the other hand, cybersecurity is a major factor that shapes productivity and efficiency of the modern industry in both technical and economic terms. |
Разместил: Ingvar16 1-10-2023, 08:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Google Tips & Tricks - 19th Edition, 2023 Автор: Jon White (Editor) Издательство: Future Publishing Ltd. Год: 2023 Страниц: 132 Формат: PDF Размер: 87,7 MB Язык: английский
Команда Google полна сюрпризов. Как только вы думаете, что она превзошла саму себя, она выдает очередное улучшение, которое полностью меняет все. Последним крупным изменением стал логотип, выполненный шрифтом "Alphabet" - от старого Times он перешел к новому и элегантному виду по всему периметру. Теперь, однако, Google повысил свой статус, выпустив собственное мобильное устройство Google Pixel и систему голосового управления Nest Audio. Компания, которая сделала интернет-поиск тем, чем он является сегодня, взяла разработанную ею ОС и выпустила собственное оборудование для нее. Устройства Google Nest полностью изменят взаимодействие пользователя со своими гаджетами и повседневные задачи, сделав даже самые утомительные процессы немного проще. Узнайте все, что вам нужно знать о возможностях Google: от советов по образу жизни до приемов повышения производительности. |
Разместил: Dovegone 28-09-2023, 21:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Testing in Metaverse: A practical guide to applying quality engineering principles to the metaverse Автор: Ajay Pandey Издательство: BPB Publications Год: 2024 Страниц: 673 Язык: английский Формат: pdf, epub Размер: 26.6 MB
A complete resource for testing metaverse platforms and products. The metaverse is an emerging technology that is growing exponentially. As the market for metaverse products and platforms continues to grow, it is important to ensure their quality. This book provides a practitioner's view of quality engineering techniques and best practices that can be leveraged in the metaverse. “Testing in Metaverse” is a comprehensive and engaging exploration of the metaverse, a vast and ever-evolving digital realm. It covers all aspects of the metaverse, from its platforms and technical complexities to its impact on different industries and sectors. It also discusses the importance of compliance and ethical considerations in the metaverse, as well as the allure of virtual worlds within this vast digital space. By the end of the book, you will have a comprehensive understanding of the metaverse and its potential for quality assurance. This book is for Quality Engineering/Testing professionals seeking to grasp the testing imperatives in the Metaverse and to readers who desire an overview and understanding of this transformative digital frontier. |
Разместил: Ingvar16 26-09-2023, 07:30 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computer Security Principles and Practice 5th Edition Автор: William Stallings, Lawrie Brown Издательство: Pearson Education Год: 2024 Страниц: 1641 Язык: английский Формат: pdf Размер: 33.5 MB
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts. The objective of this book is to provide an up-to-date survey of developments in computer security. Central problems that confront security designers and security administrators include defining the threats to computer and network systems, evaluating the relative risks of these threats, and developing cost-effective and user friendly countermeasures. The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one- or two-semester undergraduate course for Computer Science, computer engineering, and electrical engineering majors. |
Разместил: Ingvar16 25-09-2023, 20:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|