|
 |
|
 |
|
|
 |
|  |
|
Название: Microsoft Defender for Endpoint: Endpoint security fundamentals deployment and cross-platform defense with MDE Автор: Shailender Singh Издательство: BPB Publications Год: 2025 Страниц: 598 Язык: английский Формат: epub (true) Размер: 30.0 MB
Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on with the daily challenges of IT infrastructure, it covers everything from on-prem data centers to cloud platforms like AWS, Azure, and GCP, across Windows, Linux, macOS, Android, and Kubernetes. This book offers a focused, practical guide to MDE, covering its architecture, evolution, and key features. While centered on MDE, it also addresses broader cybersecurity concepts relevant to DevOps, SREs, developers, system administrators, and newcomers entering the field. You will explore endpoint protection principles, the threat landscape, and frameworks like MITRE ATT&CK, along with deployment across Windows, macOS, and Linux. It covers EDR, SOC operations, data protection with Microsoft Purview, and incident response using Live Response. With rising threats powered by AI, deepfakes, and organized cybercrime, this guide prepares you to secure hybrid and cloud infrastructures using Microsoft Defender for Azure and Microsoft 365, backed by practical configurations, case studies, and a forward-looking view of endpoint security. This book is for college graduates, DevOps, SRE, software developers, system administrators who would like to switch to a security profile, or especially into the early starting roles like SOC analyst, security administrators, or would like to learn the Microsoft security products. A foundational understanding of endpoint security concepts and Windows/macOS/Linux operating systems will be beneficial for readers. |
Разместил: Ingvar16 25-06-2025, 02:15 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Digital Forensics for Enterprises Beyond Kali Linux: Navigate complex legal frameworks, ensure digital evidence admissibility, and establish robust forensics laboratory environments Автор: Abhirup Guha Издательство: BPB Publications Год: 2025 Страниц: 352 Язык: английский Формат: epub (true) Размер: 35.0 MB
Digital forensics is a key technology of the interconnected era, allowing investigators to recover, maintain, and examine digital evidence of cybercrime. With ever-increasingly sophisticated digital threats, the applications of digital forensics increase across industries, aiding law enforcement, business security, and judicial processes. This book provides a comprehensive overview of digital forensics, covering its scope, methods for examining digital evidence to resolve cybercrimes, and its role in protecting enterprise assets and ensuring regulatory compliance. It explores the field's evolution, its broad scope across network, mobile, and cloud forensics, and essential legal and ethical considerations. Kali Linux is renowned in the field of digital forensics owing to its immense potential in penetration testing and cybersecurity evaluation. The book also details the investigation process, discusses various forensic tools, and delves into specialized areas like network, memory, mobile, and virtualization forensics. This book is ideal for digital forensics analysts, cybersecurity professionals, law enforcement authorities, IT analysts, and attorneys who want to gain in-depth knowledge about digital forensics. |
Разместил: Ingvar16 22-06-2025, 21:09 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Mastering Microsoft 365 Security Technologies: Design and implement Microsoft security, compliance, and identity Автор: Pramiti Bhatnagar Издательство: BPB Publications Год: 2025 Страниц: 783 Язык: английский Формат: epub (true) Размер: 34.6 MB
Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape. This book will introduce readers to Microsoft security solutions. It covers Microsoft Defender, Microsoft Entra ID, and Microsoft Purview. Readers will learn how they can protect their organization across different attack vectors such as email, identity, data, endpoints, and applications. By the end of this book, you will possess the practical knowledge and skills to design, implement, and manage a strong security posture across your organization's Microsoft infrastructure, confidently protecting identities, data, and applications from modern cyberattacks. This book is ideal for IT professionals and administrators seeking careers in security administration using Microsoft security technologies. Readers need foundational cloud computing knowledge (IaaS, PaaS, SaaS), basic M365 cloud and Azure familiarity, plus awareness of Zero Trust, identity and access, and platform protection. |
Разместил: Ingvar16 22-06-2025, 06:04 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
 Название: Нейросети на практике: для себя, работы и бизнеса Автор: Коллектив Издательство: Eduson Academy Год: 2025 Формат: Docx/PDF Страниц: много Размер: 276 Mb Язык: Русский
Научитесь работать с востребованной технологией, чтобы выделиться среди других кандидатов или получить повышение. Оптимизируйте издержки на маркетинг, проанализируйте конкурентов и улучшите бизнес-процессы. Делегируйте нейросетям рутинные задачи, сократите время на поиск и реализацию идей
|
Разместил: Chipa 19-06-2025, 12:56 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Nginx by Example Vol. 1: From problem to pattern to production Автор: Jason Joseph Nathan Издательство: Leanpub Год: 2025-05-09 Страниц: 85 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
A collection of NGINX configurations that you’d actually use. NGINX by Example is a field manual for engineers who never want to Google configs again. It’s a curated collection of real-world NGINX configurations. Each one battle-tested and wrapped in the context you’d actually use in production. Volume I is split into three chapters, each covering a specific theme. Within each topic, I’ve framed a problem, introduced a usable pattern, and then expanded on its variations and caveats. Yes, this is a collection of battle-tested notes, but also a refinement of everything I’ve learned from other books & docs and late-night experiments, updated to reflect today’s best practices. This is where most developers get stuck. They treat NGINX as a simple router or static file server or a reverse proxy with just enough brains to get requests where they need to go. But NGINX is far more capable than that. It can manage trust. It can negotiate identity. It can serve as a rules engine, a security layer and a control tower, all in one place. |
Разместил: Ingvar16 19-06-2025, 07:11 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Blockchain Technology for the Engineering and Service Sectors Автор: V. Vaishnavi, R. Rajasekar, C. Moganapriya, P. Sathish Kumar Издательство: Wiley-Scrivener Год: 2025 Страниц: 429 Язык: английский Формат: pdf (true) Размер: 28.1 MB
Blockchain Technology for the Engineering and Service Sectors is essential for anyone looking to understand how to harness blockchain technology, driving innovation and efficiency across various sectors. Blockchain Technology for the Engineering and Service Sectors is designed to provide a comprehensive exploration of blockchain technology, divided into two key areas of study. The first section delves into the history and technical evolution of blockchain, tracing its development from the inception of Bitcoin to its integration with other advanced technologies like the Internet of Things. The second section focuses on the frameworks and applications of blockchain, examining its use across various industries, including supply chain management, tourism, banking, healthcare, and automation. Additionally, the book addresses current challenges, emerging trends, and the future potential of blockchain technology. |
Разместил: Ingvar16 18-06-2025, 00:44 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Achieve CompTIA Security+ SY0-701 Exam Success: The Concise Certification Guide for Today’s Busy Professional Автор: Jason Edwards Издательство: J. Ross Publishing Год: 2025 Страниц: 367 Язык: английский Формат: pdf, epub (true) Размер: 11.6 MB
Achieve CompTIA Security+ SY0-701 Exam Success is the most concise and complete Security+ study guide on the market. Designed for busy professionals who have a tighter timeframe for taking and passing the exam, it will help you master key objectives and concepts needed not only for the CompTIA Security+ SY0-701 exam but also as a cybersecurity professional to enhance your career. This easy-to-follow guide matches SY0-701 Domain Objectives so you can pass the exam on your first attempt in half the study time. |
Разместил: Ingvar16 17-06-2025, 09:02 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Edge Computing: Systems and Applications Автор: Lanyu Xu, Weisong Shi Издательство: Wiley-IEEE Press Год: 2025 Страниц: 275 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Understand the computing technology that will power a connected future. The explosive growth of the Internet of Things (IoT) in recent years has revolutionized virtually every area of technology. It has also driven a drastically increased demand for computing power, as traditional cloud computing proved insufficient in terms of bandwidth, latency, and privacy. Edge computing, in which data is processed at the edge of the network, closer to where it’s generated, has emerged as an alternative which meets the new data needs of an increasingly connected world. Edge Computing offers a thorough but accessible overview of this cutting-edge technology. Beginning with the fundamentals of edge computing, including its history, key characteristics, and use cases, it describes the architecture and infrastructure of edge computing and the hardware that enables it. The book also explores edge intelligence, where Artificial Intelligence is integrated into edge computing to enable smaller, faster, and more autonomous decision-making. |
Разместил: Ingvar16 17-06-2025, 08:35 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership Автор: Walt Powell Издательство: CRC Press Год: 2026 Страниц: 360 Язык: английский Формат: pdf, epub (true) Размер: 15.3 MB
This isn’t just a book. It is a roadmap for the next generation of cybersecurity leadership. In an era where cyber threats are more sophisticated and the stakes are higher than ever, Chief Information Security Officers (CISOs) can no longer rely solely on technical expertise. They must evolve into strategic business leaders who can seamlessly integrate cybersecurity into the fabric of their organizations. This book challenges the traditional perception of CISOs as technical leaders, advocating for a strategic shift toward business alignment, quantitative risk management, and the embrace of emerging technologies like Artificial Intelligence (AI) and Machine Learning. It empowers CISOs to transcend their technical expertise and evolve into business-savvy leaders who are fully equipped to meet the rising expectations from boards, executives, and regulators. This book directly addresses the increasing demands from boards and regulators in the wake of recent high-profile cyber events, providing CISOs with the necessary skills and knowledge to navigate this new landscape. |
Разместил: Ingvar16 15-06-2025, 02:55 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
 |
|
 |
|
|
 |
|  |
|
Название: Information Security Governance using Artificial Intelligence of Things in Smart Environments Автор: Mariyam Ouaissa, Mariya Ouaissa, Tarik Hidar, Ram Chandra Sachan, Akhil Mittal, Sanjay Poddar Издательство: CRC Press Год: 2026 Страниц: 294 Язык: английский Формат: epub (true) Размер: 10.8 MB
The book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments. It delves into how AI enhances the governance of information security by automating processes, detecting threats, and ensuring the protection of data in interconnected IoT systems. It covers theoretical foundations, practical frameworks, and case studies, offering insights into securing smart cities, homes, industries, and healthcare systems. It emphasizes governance models that leverage AI to manage security policies and risk in dynamic, data-driven ecosystems. The book focuses on the study and application of AI of Things in the field of information security governance. Intelligent environments, characterized by increasing connectivity of devices and systems, present unique challenges for information security. The use of AI of Things offers opportunities to enhance security in these complex environments. |
Разместил: Ingvar16 15-06-2025, 02:02 | Комментарии: 0 | Подробнее
| | | |
 |
|  |
br>
|