|
|
|
|
|
|
|
| |
|
Название: Wireless Mesh Networks Автор: Alvin Albuero De Luna Издательство: Arcler Press Год: 2022 Страниц: 258 Язык: английский Формат: pdf (true) Размер: 19.6 MB
Wireless mesh networks (WMNs) will dominate in the coming decade as they are one of the primary technologies. They will assist in understanding the awaited dream of network connectivity anywhere, at any time, at a low cost. As a result, in the next-generation Internet, they will play a significant part. Their ability to self-organize greatly minimizes the complexity of network implementation and maintenance, necessitating a low initial investment. Simple mesh clients and mesh routers make up these networks, which make the backbone of WMNs. Mesh routers have limited mobility. They connect mesh and traditional clients to the network. The bridge functionalities and the gateway in mesh routers can be used to connect WMNs to other networks like the cellular, Internet, IEEE 802.16, IEEE 802.15, IEEE 802.11, sensor networks, etc. Mesh clients can be mobile or motionless, and they can establish a client mesh network with mesh routers and other mesh clients. Wireless personal area networks (WPANs), wireless metropolitan area networks (MAN), Ad hoc networks, and wireless local area networks (WLANs) are expected to benefit from WMNs, which are expected to overcome restrictions and considerably increase performance. These networks provide wireless services to various applications in metropolitan locations, local, campus, and personal. |
Разместил: Ingvar16 24-09-2023, 02:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, 2nd Edition (Early Release) Автор: Jason Ball Издательство: Cisco Press Год: 2023 Страниц: 1310 Язык: английский Формат: epub Размер: 37.0 MB
Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, Second Edition, helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Jason Ball shares preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills. The Implementing Cisco Collaboration Core Technologies (CLCOR 350-801) exam is the required “core” exam for the CCNP Collaboration and CCIE Collaboration certifications. If you pass the CLCOR 350-801 exam, you also obtain the Cisco Certified Specialist–Collaboration Core certification. This exam covers core Collaboration technologies, including infrastructure and design; protocols, codecs, and endpoints; Cisco IOS XE gateways and media resources; call control; QoS; and Collaboration applications. |
Разместил: Ingvar16 24-09-2023, 01:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security Designs for the Cloud, IoT, and Social Networking Автор: Adele Kuzmiakova Издательство: Arcler Press Год: 2022 Страниц: 264 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and security challenges in cloud computing. It highlights the appplication safety and service vulnerability in cloud network. It also gives an introduction to IoT security and its open challenges, IoT architecture security and the introduction into the social network and its security issues, as well as the cyberspace security in the digital age. Currently, the world is facing rapid technological advancement in every field. Unarguably, the most affected area is digital technology. The use of digital devices has increased to a much greater extent in the last decade. In this book three major aspects of digital technology data, social media, cloud computing, and Internet of Things (IoT) are discussed. This book thoroughly examines the issues and vulnerabilities of IoT services. Due to the low cost of cloud services, almost every organization is storing their data in the cloud. This causes a big chunk of users’ personal data to be saved in the cloud, which can be a target for hackers who are always trying to get access to cloud storage. This book thoroughly examines the issues and vulnerabilities of IoT services. |
Разместил: Ingvar16 23-09-2023, 17:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud Автор: Bradley Fowler Издательство: Apress Год: 2023 Страниц: 158 Язык: английский Формат: pdf Размер: 20.7 MB
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology’s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you’ll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. |
Разместил: Ingvar16 23-09-2023, 03:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Информационная безопасность: защита и нападение, 3-е издание Автор: А.А. Бирюков Издательство: ДМК Пресс Год: 2023 Страниц: 442 Язык: русский Формат: pdf Размер: 23.1 MB
Книги по информационной безопасности (ИБ) преимущественно делятся на две группы: в одних большей частью присутствует нормативная информация и мало сведений о технической реализации угроз и защите от них, в других описываются только технические аспекты (серии «...глазами хакера»). Данная книга выдерживает уже третье издание, предлагая читателю глубокое погружение в практические аспекты реализации конкретных атак и средств защиты. Представлены как актуальная техническая информация, так и советы по организации процесса обеспечения информационной безопасности с соответствующими примерами. В числе рассматриваемых тем: атаки на беспроводные устройства; безопасность облачных систем; выявление уязвимостей; средства обнаружения и предотвращения вторжений; борьба с утечками; обзор методов шифрования; описание пакета Kali Linux; и многое другое. |
Разместил: Ingvar16 22-09-2023, 15:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust (Final) Автор: Ev Kontsevoy, Sakshyam Shah, Peter Conrad Издательство: O’Reilly Media, Inc. Год: 2023 Страниц: 163 Язык: английский Формат: True EPUB (Retail Copy), PDF (conv), MOBI (conv) Размер: 10.1 MB
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider. How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity. This book is for anyone facing the challenges of defending an ever-growing infrastructure, whether on-premises, in the cloud, or both. The book is accessible to a reader with a modicum of technical skill and a passing familiarity with IT, networking, and the Linux command line. Whether you’re an executive, an IT policymaker, or a DevOps engineer, if you have responsibility for helping secure heterogeneous computing infrastructure, this book is for you. |
Разместил: Ingvar16 21-09-2023, 22:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Data Analytics for Internet of Things Infrastructure Автор: Rohit Sharma, Gwanggil Jeon, Yan Zhang Издательство: Springer Серия: Internet of Things Год: 2023 Страниц: 330 Язык: английский Формат: pdf (true), epub Размер: 50.0 MB
This book provides techniques for the deployment of semantic technologies in data analysis along with the latest applications across the field such as Internet of Things (IoT). The authors focus on the use of the IoT and big data in business intelligence, data management, Hadoop, Machine Learning, cloud, smart cities, etc. They discuss how the generation of Big Data by IoT has ruptured the existing data processing capacity of IoT and recommends the adoption of data analytics to strengthen solutions. The book addresses the challenges in designing the web based IoT system, provides a comparative analysis of different advanced approaches in industries, and contains an analysis of databases to provide expert systems. The book aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of IoT and Big Data analytics. |
Разместил: Ingvar16 21-09-2023, 07:12 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Intelligent Data Analytics IoT and Blockchain Автор: Bashir Alam, Mansaf Alam Издательство: CRC Press Год: 2024 Страниц: 367 Язык: английский Формат: pdf (true) Размер: 73.6 MB
This book focuses on data analytics with Machine Learning (ML) using IoT and blockchain technology. Integrating these three fields by examining their interconnections, Intelligent Data Analytics, IoT, and Blockchain examines the opportunities and challenges of developing systems and applications exploiting these technologies. Written primarily for researchers who are working in this multi-disciplinary field, the book also benefits industry experts and technology executives who want to develop their organizations’ decision-making capabilities. The book presents novel ideas and insights on different aspects of data analytics, blockchain technology, and IoT. It views these technologies as interdisciplinary fields concerning processes and systems that extract knowledge and insights from data. Focusing on recent advances, the book offers a variety of solutions to real-life challenges with an emphasis on security. |
Разместил: Ingvar16 20-09-2023, 01:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hack the Airwaves: Advanced BLE Exploitation Techniques Автор: Josh Luberisse Издательство: Fortis Novum Mundum Год: 2023 Страниц: 172 Язык: английский Формат: pdf, epub, mobi Размер: 10.2 MB
In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced knowledge of BLE's potential risks and defenses. Drawing from hands-on experiences, real-world case studies, and practical demonstrations, Josh offers readers a unique blend of theoretical insights and actionable techniques. From understanding the core protocols of BLE to crafting custom payloads and defending against sophisticated attacks, "Hack the Airwaves" covers the full spectrum of BLE security. This book, " Hack the Airwaves: Advanced BLE Exploitation Techniques", is intended as a resource for cybersecurity professionals who are committed to the responsible and ethical use of their skills. The techniques, tools, and practices discussed within these pages are intended for use in authorized settings, with explicit permission from the relevant authorities, and for the purpose of improving security and protecting systems, data, and users from malicious activity. |
Разместил: Ingvar16 18-09-2023, 17:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Халява в Интернете Автор: Гладкий Алексей Издательство: Litres Год: 2013 Формат: rtf, fb2 Размер: 26 мб Качество: хорошее Язык: русский
Каждому человеку приятно заполучить что-нибудь «забесплатно». Сладкое слово «халява» ласкает слух, тешит иллюзиями, питает надеждами. Конечно, все мы знаем известную поговорку про бесплатный сыр в мышеловке, но это ничего не меняет. |
Разместил: gol8425 18-09-2023, 15:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|