Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: How to Be OT Cybersecurity Professional
Автор: Nebras Alqurashi
Издательство: Austin Macauley Publishers
Год: 2023-07-31
Страниц: 238
Язык: английский
Формат: epub (true)
Размер: 12.4 MB

It's a bitter truth that we live in an age of vulnerable systems, where our existence is completely dependent on them. Cyber attacks can cause greater damage than actual war losses for a country that is unprepared for them. After several incidents that impacted social order, governments have realized this fact. During a cyber attack, the city will be paralyzed, food supply will be interrupted, and medical care will be disrupted. There would be human casualties and the worst of the people would emerge if fuel or electricity were unavailable. The age of cyber missiles has arrived, and as Dale Peterson pointed out, our infrastructure systems are insecure by design. We need to learn how to secure all operational technology, it's crucial, and it can only be done by understanding the bits and bytes of these operations. In this book, you'll learn Cybersecurity for Operational Technology, how to secure all types of Operational Technology, and how to save lives! For IT Cybersecurity professionals who would like to learn about OT Cybersecurity, this book is the best fit for engineers and managers alike.
Разместил: Ingvar16 3-08-2023, 07:23 | Комментарии: 0 | Подробнее
Название: Network Defense and Countermeasures: Principles and Practices, 4th Edition (Early Access)
Автор: Chuck Easttom
Издательство: Pearson Education
Год: 2024
Страниц: 640
Язык: английский
Формат: epub
Размер: 15.3 MB

All you need to know about defending networks, in one book. The hottest topic in the IT industry today is computer security. The news is replete with stories of hacking, viruses, and identity theft. The cornerstone of security is defending the organizational network. Network Defense and Countermeasures: Principles and Practices offers a comprehensive overview of network defense. It introduces students to network security threats and methods for defending the network. Three entire chapters are devoted to firewalls and intrusion-detection systems. There is also a chapter providing a basic introduction to encryption. Combining information on the threats to networks, the devices and technologies used to ensure security, as well as concepts such as encryption provides students with a solid, broad-based approach to network defense. This book provides a blend of theoretical foundations and practical applications. Each chapter ends with multiple choice questions and exercises, and most chapters also have projects. Students who successfully complete this textbook, including the end of chapter material, should have a solid understanding of network security.
Разместил: Ingvar16 2-08-2023, 21:23 | Комментарии: 0 | Подробнее
Название: Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools
Автор: Dr. Hedaya Alasooly
Издательство: BookRix GmbH & Co. KG
Год: 2023
Страниц: 232
Язык: английский
Формат: epub (true)
Размер: 13.6 MB

Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them. The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems, such as connectivity issues, and how to tackle them. An SMTP test tool can identify SMTP server issues and troubleshoot them to keep your email secure and safe. The SSL Checker tool can verify that the SSL Certificate on your web server is properly installed and trusted. Header Analyzers can help you view and analyze message headers by displaying the information in a user-friendly manner and also by calling out various issues, such as suspected delivery delays that may require your attention.
Разместил: Ingvar16 31-07-2023, 06:54 | Комментарии: 0 | Подробнее
Название: Методы и средства инженерно-технической защиты информации
Автор: Аверченков В.И., Рытов М.Ю., Кувыклин А.В., Гайнулин Т.Р.
Издательство: М.: Флинта
Год: 2011
Cтраниц: 187
Формат: pdf
Размер: 12 мб
Язык: русский

В данном учебном пособии рассматриваются общие вопросы теории информационной безопасности, основные положения технологии добывания информации и ведения технической разведки, технические методы и средства противодействия способам несанкционированного доступа к информации, организационное обеспечение инженерно-технической защиты информации, средства инженерной защиты и технической охраны объектов.
Разместил: rivasss 29-07-2023, 13:02 | Комментарии: 0 | Подробнее
Название: Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide
Автор: Jody Booth, Werner Metz
Издательство: Apress
Год: 2023
Страниц: 206
Язык: английский
Формат: pdf
Размер: 29.0 MB

Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation.
Разместил: Ingvar16 27-07-2023, 19:41 | Комментарии: 0 | Подробнее
Название: System Design Using the Internet of Things with Deep Learning Applications
Автор: Arpan Deyasi, Angsuman Sarkar, Soumen Santra
Издательство: Apple Academic Press, CRC Press
Год: 2024
Страниц: 282
Язык: английский
Формат: pdf (true)
Размер: 24.9 MB

This new volume aims to find real-world solutions to present-day problems by using IoT and related technologies. The volume explores the diverse applications of the Internet of Things in diverse areas―in healthcare, the construction industry, in wildlife monitoring, in home security systems, in agriculture, in cryptology, in hospitality employment, in data security, and more. The chapters illustrate the aspects of defining the architecture, product design, modules, interfaces, and data for a system to satisfy specified requirements of the IoT applications discussed. The chapters show the novel results that can safely be applied in their respective domains. In this context, the editors expect that the present solutions can meet the ever-increasing demand of industries. With chapters from both academics and industry professionals involved in IoT/AI solutions, System Design Using Internet of Things with Deep Learning Applications will be a valuable resource for students in this area as well as for those working in novel architecture design and system implementation.
Разместил: Ingvar16 25-07-2023, 21:37 | Комментарии: 0 | Подробнее
Название: Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Автор: Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 550
Язык: английский
Формат: pdf (true)
Размер: 23.4 MB

Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. Security and Privacy Schemes for Dense 6G Wireless Communication Networks is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, Data Science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization experts.
Разместил: Ingvar16 25-07-2023, 17:36 | Комментарии: 0 | Подробнее

Название: Linux. Сеть. Как она устроена и как это использовать
Автор: Цилюрик Олег
Издательство: Издание автора
Год: 2023
Формат: pdf
Страниц: 234
Размер: 15 mb
Язык: Русский

Автор являлся непосредственным участником разработок, на протяжении свыше 40 лет, в проектах из области системотехники и программного обеспечения разного масштаба и разной целевой ориентации. Практически все из которых, в большей или меньшей мере, были связаны с сетевыми обменами. Текущий текст является обобщением практического опыта автора. Но, как и всякий практический опыт, обладает некоторой фрагментарностью - с акцентом на те аспекты, которые попадали в поле деятельности автора.
Разместил: na5ballov 25-07-2023, 15:43 | Комментарии: 0 | Подробнее
Название: 5G and 6G Communication Technologies
Автор: Zoran Gacovski
Издательство: Arcler Press
Год: 2022
Страниц: 438
Язык: английский
Формат: pdf (true)
Размер: 16.2 MB

This book covers different topics from 5G and 6G mobile technologies, including: telecommunication, antenna and bandwidth aspects of 5G, business solutions enabled by 5G technology, different application scenarios of 5G, and topics from the 6G technology. Section 1 focuses on telecommunication, antenna and bandwidth aspects of 5G, describing mobile communication through 5G technology, a review in the core technologies of 5G: device-to-device communication, multi-access edge computing and network function virtualization, design of a multiband patch antenna for 5G communication systems, wideband reconfigurable millimeter-wave linear array antenna using liquid crystal for 5G networks, and FBMC vs OFDM waveform contenders for 5G wireless communication system. Section 2 focuses on business solutions enabled by 5G technology, describing the roles of 5G mobile broadband in the development of IoT, big data, cloud and SDN, planning and profit sharing in overlay Wi-Fi and LTE systems toward 5G networks, construction of enterprise 5G business ecosystem - case study of Huawei, and 5G new radio prototype implementation based on SDR.
Разместил: Ingvar16 24-07-2023, 22:01 | Комментарии: 0 | Подробнее
Название: Essentials of Cloud Computing: A Holistic, Cloud-Native Perspective, Second Edition
Автор: Chellammal Surianarayanan, Pethuru Raj Chelliah
Издательство: Springer
Год: 2023
Страниц: 368
Язык: английский
Формат: pdf (true), epub
Размер: 27.8 MB

Numerous advancements are being brought in and incorporated into the cloud domain with the aim of realizing a trove of deeper and decisive automations. Rather than discussing the cloud paradigm in isolation, this fully updated text examines how cloud computing can work collaboratively with other computing models to meet the needs of evolving trends.This multi-dimensional approach encompasses the challenges of fulfilling the storage requirements of big data, the use of the cloud as a remote server for Internet of Things and sensor networks, and an investigation of how cloud computing is interlinked with other established computing phenomenon such as edge computing. New chapters illustrate the distinct ideals of the cloud-native computing, proclaimed as the next-generation cloud computing paradigm.
Разместил: Ingvar16 23-07-2023, 06:07 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности