Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: The OSINT Codebook: Cracking Open Source Intelligence Strategies
Автор: Alexandre DeGarmo
Издательство: Independently published
Год: 2023
Страниц: 265
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced strategies and techniques to leverage publicly available information for intelligence gathering, threat assessment, and decision-making. We explore the key features and benefits that readers can expect from The OSINT Codebook: Master the Art of OSINT: With Alexandre DeGarmo as your mentor, you will unravel the complexities of OSINT like never before. From understanding the fundamentals to advanced methodologies, this book provides a step-by-step learning experience to help you become an OSINT expert. Cutting-Edge Strategies: Stay ahead in the ever-evolving digital landscape with the latest OSINT strategies. Alexandre DeGarmo reveals his most coveted techniques, ensuring you are equipped to tackle emerging threats and challenges.
Разместил: Ingvar16 10-09-2023, 18:18 | Комментарии: 0 | Подробнее

Название: Хакинг на примерах. Уязвимости, взлом, защита (2023)
Автор: Ярошенко А.А.
Издательство: СПб.: Наука и техника
Год: 2023, 2-е изд., исправ. и допол.
Формат: pdf
Страниц: 352
Размер: 30 mb
Язык: Русский

Из этой книги вы не узнаете, как взламывать банки – ничего противозаконного описано здесь не будет. Мы не хотим, чтобы у наших читателей или кого-либо еще возникли какие-то проблемы из-за нашей книги.
Будет рассказано: об основных принципах взлома сайтов (а чтобы теория не расходилась с практикой, будет рассмотрен реальный пример взлома); отдельная глава будет посвящена угону почтового ящика (мы покажем, как взламывается почтовый ящик – будут рассмотрены различные способы).
Разместил: na5ballov 10-09-2023, 13:38 | Комментарии: 0 | Подробнее
Название: Blockchains: Empowering Technologies and Industrial Applications
Автор: Anwer Al-Dulaimi, Octavia A. Dobre, Chih-Lin I.
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 419
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

A comprehensive guide to the most recent developments in blockchains in theoretical and industrial perspectives. Originally introduced as a method to keep track of Bitcoin transactions over a peer-to-peer network, blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography into a chain held in public databases. The use of this technology has grown since its cryptocurrency creation and now store three types of information: 1) transactions, including the date, time, and value of purchases; 2) records of participates in transactions; and 3) unique code known as a “hash” that distinguishes one block from another. A single block on the blockchain can hold 1 MB of data, or potentially thousands of transactions – this then can allow for hundreds of thousands of transactions to be recorded as each block can join the state-of-the-art blockchain. Blockchains provides a detailed overview of the latest and most innovative concepts, techniques, and applications related to the developing blockchain. Aimed at novices and experts on the subject, the book focuses on blockchain technologies, integrated systems, and use cases, specifically by looking at three major technical areas: blockchain platforms and distributed database technologies, consensus and fault tolerance, and Blockchain as a Service (BaaS).
Разместил: Ingvar16 10-09-2023, 05:55 | Комментарии: 0 | Подробнее
Название: Artificial Intelligence and Blockchain in Industry 4.0
Автор: Rohit Sharma, Rajendra Prasad Mahapatra, Gwanggil Jeon
Издательство: CRC Press
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The book addresses the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence. It further provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology. Industry 4.0 has significantly exploded as a result of using the Internet of Things’ (IoT) recent large- scale growth, which executes the intricate data analysis of confidential material that must be safeguarded against cybersecurity attacks. In a number of industries, including home automation, healthcare, electricity, agriculture, automation, and industrial processes, cybersecurity threats have rapidly increased. IoT device sensors produce a lot of data due to their broad range of services, which necessitates authori- sation, security, and privacy. In the past, conventional frameworks and pro- cedures were employed to guarantee IoT security. But over time, the use of various Artificial Intelligence (AI) techniques for spotting cybersecurity breaches has grown in favour .
Разместил: Ingvar16 10-09-2023, 05:19 | Комментарии: 0 | Подробнее
Название: Network Basics for Hackers: How Networks Work and How They Break
Автор: Master OccupytheWeb
Издательство: InfoSec Press
Год: 2023
Страниц: 270
Язык: английский
Формат: pdf
Размер: 34.0 MB

Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. We will start with basic networking and TCP/IP concepts and then progress to tools for analyzing network packets and protocols.
Разместил: Ingvar16 9-09-2023, 21:04 | Комментарии: 0 | Подробнее
The Complete Cloud Computing Manual - 19th Edition 2023Название: The Complete Cloud Computing Manual - 19th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 164
Язык: английский
Формат: PDF
Размер: 27,6 MB

Learn how to make the most of the cloud for home & business! Cloud computing has been with us for a while now, giving home, small to medium business and enterprise users a new way in which to support and utilise their infrastructure and data. While the cloud may come with many concerns, chiefly that of security of data, it’s one of the fastest growing and interesting aspects of modern computing. With The Cloud Computing Guidebook we will show you how to implement and better utilise the cloud: personally or for your business. We also look at how to secure and even build your own cloud service. 100% unofficial.
Разместил: Dovegone 7-09-2023, 20:32 | Комментарии: 0 | Подробнее
Название: Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services
Автор: Puthiyavan Udayakumar
Издательство: Apress
Год: 2023
Страниц: 714
Язык: английский
Формат: pdf (true), epub (true)
Размер: 16.7 MB

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF. The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint. Since the dawn of the Internet, people, organizations, and governments have fallen victim to cyberattacks. Cybersecurity, cyberattacks, cybercriminals, and more have been frequently discussed in the IT and business world. You’ll need a basic understanding of these concepts to protect yourself and those around you. For cyber system administrators and architects working with Microsoft Azure integrated services.
Разместил: Ingvar16 6-09-2023, 05:46 | Комментарии: 0 | Подробнее
Название: Blockchain and Artificial Intelligence-Based Solution to Enhance the Privacy in Digital Identity and IoT
Автор: Fehmi Jaafar, Schallum Pierre
Издательство: CRC Press
Год: 2024
Страниц: 196
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Exploiting the data generated in the context of sensors, IoT and industrial environments remains a great challenge. It is estimated that today only 20% of industrial data has already been used. This amount of data needs to be valorized to be put at the service of research, citizens, and the advancement of the understanding of climate issues. This is why data plays a key role in digital transformation. It must be collected, stored, and processed. Because of their ability to deal with targeted and personalized information, IoT has become very present in our environment. Its place in our daily lives explains this scope: from the moment we wake up until late at night. Various categories of personnel data are generated by IoT: health data, geolocation data, financial data, sociodemographic data, biometric data, etc. Several standards govern IoT that are the source of unstructured data such as movement, gesture recognition, and biometric measurement, proximity; infrared luminosity; sound, and; smell. These standards include IEEE 802.11. Two technologies are helping to leverage this data and accelerate digital transformation: Artificial Intelligence (AI) and Blockchain.
Разместил: Ingvar16 6-09-2023, 04:37 | Комментарии: 0 | Подробнее
Название: Основы криптографии
Автор: Коржик В.И., Яковлев В.А.
Издательство: СПб.: ИЦ Интермедиа
Год: 2016
Формат: pdf
Страниц: 296
Размер: 14,3 Мб
Язык: русский

Настоящее издание предназначено в помощь студентам, изучающим "Основы криптографии" и "Основы криптографии с открытым ключом" по своим специальностям. Пособие также будет полезно для самостоятельного изучения криптографии и всем тем, кто интересуется ее практическими приложениями. При написании данного пособия использовались последние опубликованные научные результаты в области криптографии, а также учитывался опыт преподавания аналогичных курсов в отечественных и зарубежных университетах. Для понимания основного содержания данного пособия достаточно знать основы теории вероятностей в объеме программы технического вуза.
Разместил: sanek1235 5-09-2023, 13:26 | Комментарии: 0 | Подробнее

Название: Minecraft от А до Я. Неофициальная иллюстрированная энциклопедия
Автор: Меган Миллер
Издательство: Бомбора
Год: 2022
Формат: PDF
Страниц: 226
Размер: 16 Mb
Язык: Русский

Иллюстрированная энциклопедия для игроков Minecraft, одной из самых популярных компьютерных игр последних лет. От Меган Миллер, автора бестселлера «Все секреты Minecraft». Это руководство станет отличным помощником в постижении тайн игры. С его помощью вы достигнете небывалых успехов! Информация внутри отсортирована по алфавиту, поэтому можно с легкостью отыскать любую тему, которая вызывает интерес. Узнайте Minecraft от А до Я!

Разместил: Chipa 5-09-2023, 12:12 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности