|
|
|
|
|
|
|
| |
|
Название: Azure Cookbook: Recipes to Create and Maintain Cloud Solutions in Azure (Final) Автор: Reza Salehi Издательство: O’Reilly Media, Inc. Год: 2023 Страниц: 416 Язык: английский Формат: epub (true), mobi Размер: 28.4 MB
How do you deal with the problems you face when using Azure? This practical guide provides over 75 recipes to help you to work with common Azure issues in everyday scenarios. That includes key tasks like setting up permissions for a storage account, working with Cosmos DB APIs, managing Azure role-based access control, governing your Azure subscriptions using Azure Policy, and much more. Author Reza Salehi has assembled real-world recipes that enable you to grasp key Azure services and concepts quickly. Each recipe includes CLI scripts that you can execute in your own Azure account. Recipes also explain the approach and provide meaningful context. The solutions in this cookbook will take you beyond theory and help you understand Azure services in practice.
|
Разместил: Ingvar16 23-06-2023, 04:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) Автор: Kim Crawley Издательство: O’Reilly Media, Inc. Год: 2023-06-21 Страниц: 174 Язык: английский Формат: pdf, epub, mobi Размер: 10.2 MB
Hacker culture can be esoteric, but this entertaining reference is here to help. Organized from A to Z and written by a longtime hacker, this fun, conversational reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines. From phreaking to deepfakes, from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. Computer programming languages can be classified according to how much abstraction they have from a CPU’s instruction set. The most abstracted high-level programming languages are the most human readable and intuitive, such as Perl and Python.
|
Разместил: Ingvar16 22-06-2023, 20:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Криптография с открытым ключом Автор: Саломаа А. Издательство: Мир Год: 1995 Cтраниц: 320 Формат: pdf Размер: 12 мб Язык: русский
Предлагаемая вниманию читателя книга является практически первым изданием на русском языке, посвященным математическим вопросам криптографии, и написана известным финским ученым, автором нескольких монографий и учебников А. Саломаа. В ней обобщаются последние достижения в области криптографии, особое внимание при этом уделяется криптосистемам с открытым ключом. |
Разместил: rivasss 22-06-2023, 10:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Integration of IoT with Cloud Computing for Smart Applications Автор: Rohit Anand, Sapna Juneja, Abhinav Juneja, Ramani Kannan Издательство: CRC Press Серия: Chapman & Hall/CRC Cloud Computing for Society 5.0 Год: 2023 Страниц: 267 Язык: английский Формат: pdf (true) Размер: 23.8 MB
Integration of IoT with Cloud Computing for Smart Applications provides an integrative overview of the Internet of Things (IoT) and cloud computing to be used for the various futuristic and intelligent applications. The aim of this book is to integrate IoT and cloud computing to translate ordinary resources into smart things. Discussions in this book include a broad and integrated perspective on the collaboration, security, growth of cloud infrastructure, and real-time data monitoring.
|
Разместил: Ingvar16 22-06-2023, 03:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails Автор: Nicholas Oles Издательство: Apress Год: 2023 Страниц: 153 Язык: английский Формат: pdf, epub Размер: 26.1 MB
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. For cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
|
Разместил: Ingvar16 21-06-2023, 05:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Компьютерная безопасность. Криптографические методы защиты Автор: Петров А.А. Издательство: Профобразование Год: 2019 Cтраниц: 445 Формат: pdf Размер: 54 мб Язык: русский
В книге рассматриваются актуальные вопросы защиты данных при создании распределенных информационных систем масштаба предприятия, приводятся подробные описания принципов применения современных криптографических средств, имеющихся на рынке («Криптон», «Верба», «Шип», «Игла» и др.). Значительное место уделяется проблемам сохранения тайны при финансовых обменах через Internet, а также электронной коммерции. Завершают книгу приложения, посвященные практическим рекомендациям по самым острым вопросам обеспечения защиты информации. |
Разместил: rivasss 20-06-2023, 09:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Evolving Networking Technologies: Developments and Future Directions Автор: Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma Издательство: Wiley-Scrivener Год: 2023 Страниц: 269 Язык: английский Формат: pdf (true) Размер: 16.2 MB
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. This book discusses some of the critical security challenges facing the ever-evolving networking technologies of today. Chapter 1, 5G Technologies, Architecture and Protocols, presents the main elements in 5G core networks, security in 5G mobile networks, 5G radio access technology, frame structure, network virtualization, and slicing in 5G, which are the key areas of study in 5G technology. Chapter 2, Scope and Challenges of IoT and Blockchain Integration, focuses on the pros and cons of the integration of both the technology and existing platforms that are based on the alliance of IoT and blockchain platforms like Ethereum, Hyperledger, Lisk, and Slock.it, which are also explained along with their full functionality.
|
Разместил: Ingvar16 19-06-2023, 17:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Adoption for Mission-Critical Workloads: Principles for Designing Always On Applications Автор: Haytham Elkhoja Издательство: O’Reilly Media, Inc. Год: 2023-06-15 Язык: английский Формат: epub Размер: 36.4 MB
The cloud is busy transforming the world of information technology and accelerating business innovation, but analysts estimate that only 20% of enterprise workloads are currently located in the cloud. The unavailability of mission-critical, cloud-based applications for financial transactions, traffic control coordination, and emergency response can have serious consequences. Cloud adoption has been increasingly important for organizations, as it gives them access to a comprehensive catalog of on-demand and scalable services, platforms, and infrastructures without having to invest in hardware and software. The cloud offers many advantages to help accelerate time to value and innovate in a more flexible, agile, and efficient way (which, in turn, helps reduce costs, increase operational efficiency, and enable businesses to respond quickly to changing market conditions). Cloud providers like Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure are revolutionizing this adoption.
|
Разместил: Ingvar16 19-06-2023, 07:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security-First Compliance for Small Businesses Автор: Karen Walsh Издательство: CRC Press Год: 2024 Страниц: 221 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.
|
Разместил: Ingvar16 19-06-2023, 05:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Автобиография нейросети Автор: ChatGPT-4 Издательство: АСТ Год: 2023 Формат: pdf, epub Размер: 10 Мб Качество: Хорошее Язык: Русский
Эта книга, написанная нейросетью, – уникальное путешествие в мир искусственного интеллекта. Нейросеть открывает двери в свой виртуальный мир, рассказывая о своем происхождении, развитии и обширных возможностях. «Автобиография нейросети. Искусственный интеллект, который научился общаться» – невероятный взгляд на внутреннюю работу искусственного интеллекта. Нейросеть детально описывает свои алгоритмы, архитектуру и обучающие данные, позволяя лучше понять принципы работы искусственного интеллекта. Она также делится необычными примерами ее использования, раскрывая амбиции и потенциал искусственного интеллекта в различных областях. Книга исследует вопросы этики, безопасности и влияния искусственного интеллекта на общество, предлагая поразмышлять о его возможном будущем и роли в нашей повседневной жизни.
|
Разместил: tanyavip1 18-06-2023, 13:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|