" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 272

: Cyber Defence in the Age of AI, Smart Societies and Augmented Humanity
: Jahankhani H., Kendzierskyj S., Chelvachandran N.
: Springer
: 2020
: 445
:
: pdf (true), epub
: 36.3 MB

Concise review of cyber defence, legislative frameworks, C3I and Critical National Infrastructure. This publication highlights the fast-moving technological advancement and infiltration of Artificial Intelligence into society. Concepts of evolution of society through interconnectivity are explored, together with how the fusion of human and technological interaction leading to Augmented Humanity is fast becoming more than just an endemic phase, but a cultural phase shift to digital societies. It aims to balance both the positive progressive outlooks such developments bring with potential issues that may stem from innovation of this kind, such as the invasive procedures of bio hacking or ethical connotations concerning the usage of digital twins. This publication will also give the reader a good level of understanding on fundamental cyber defence principles, interactions with Critical National Infrastructure (CNI) and the Command, Control, Communications and Intelligence (C3I) decision-making framework.
: Ingvar16 , 20:31 | : 0 |
: Hacking: How to Hack: Penetration testing Hacking Book (6 books in 1)
: Alex Wagner
: Amazon.com Services LLC
: 2020
: 760
:
: pdf, epub
: 10.1 MB

Exploitation is the heart of ethical hacking. By exploiting vulnerabilities you can start making assumptions how dangerous it can be. The Metasploit Framework, aka MSF, is an open source tool designed to facilitate penetration testing. The application is written in the Ruby programming language. It uses a modular approach, thus facilitating exploits. This makes it easier to develop and code exploits, and it also allows for complex attacks to be easily implemented.
: Ingvar16 , 04:48 | : 0 |
: Hacking: Networking and Security (2 Books in 1: Hacking with Kali Linux & Networking for Beginners)
: John Medicine
: Amazon.com Services LLC
: 2020
: EPUB, PDF
: 135
: 21,7 Mb
: English

Do you want to learn how to set up a new network for your home or business place and get the best performance of your network? Are you worried about the security structure of your network and want to prevent all forms of attacks on your system? If so then keep reading.

The various forms of internet communication have changed the whole concept of communication across a long distance. Networking has adapted the concepts of wireless functioning which have helped in wiping out various redundancies. The wired form of network is still in use owing to its special features and working capabilities. Networking is a complex concept and if done right it can do wonders. Having a brief overview of the networking concepts is very essential for setting up a new network or for improving the functionality of an existing network.
: vitvikvas 5-04-2020, 17:37 | : 0 |
: Security Analytics for the Internet of Everything
: Mohuiddin Ahmed, Abu S.S.M Barkat Ullah, Al-Sakib Khan Pathan
: CRC Press
: 2020
: PDF
: 274
: 13,2 Mb
: English

Security Analytics for the Internet of Everything compiles the latest trends, technologies, and applications in this emerging field. It includes chapters covering emerging security trends, cyber governance, artificial intelligence in cybersecurity, and cyber challenges. Contributions from leading international experts are included.

The target audience for the book is graduate students, professionals, and researchers working in the fields of cybersecurity, computer networks, communications, and the Internet of Everything (IoE). The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.
: vitvikvas 5-04-2020, 11:04 | : 0 |
: Computer Security & The Internet
: van Oorschot
: Springer
: 2020
: PDF
: 388
: 10 Mb
: English

This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents.
: vitvikvas 4-04-2020, 16:13 | : 0 |
: Cloud Computing for Engineering Applications
: Benito A. Stradi-Granados
: Springer
: 2020
: PDF
: 390
: 36,7 Mb
: English

This book explains the use of cloud computing systems for engineering applications to satisfy the need for enterprise level, state-of-the-art computational capacities at an affordable cost. As huge costs are involved in the maintenance and timely renovation of computational capabilities, particularly for projects that require significant computational capacity, cloud services can achieve considerable savings for users and organizations engaged in engineering research and development. Dr. Stradi-Granados explains how to extract a maximum value from every dollar invested in cloud computer server. The types of facilities located around the world that lease their resources to customers interested in reducing the internal overhead and implementation time. The volume features chapters on model generation, motion studies, and prototyping is ideal for students, researchers, practitioners, and facility`s managers across a range of engineering domains.
: vitvikvas 4-04-2020, 13:15 | : 0 |
: Spectrum Sharing: The Next Frontier in Wireless Networks
: Constantinos B. Papadias, Tharmalingam Ratnarajah
: Wiley
: 2020
: 440
:
: pdf (true)
: 31.2 MB

Combines the latest trends in spectrum sharing, both from a research and a standards/regulation/experimental standpoint. Written by noted professionals from academia, industry, and research labs, this unique book provides a comprehensive treatment of the principles and architectures for spectrum sharing in order to help with the existing and future spectrum crunch issues. It presents readers with the most current standardization trends, including CEPT / CEE, eLSA, CBRS, MulteFire, LTE-Unlicensed (LTE-U), LTE WLAN integration with Internet Protocol security tunnel (LWIP), and LTE/Wi-Fi aggregation (LWA), and offers substantial trials and experimental results, as well as system-level performance evaluation results. The book also includes a chapter focusing on spectrum policy reinforcement and another on the economics of spectrum sharing.
: Ingvar16 4-04-2020, 06:40 | : 0 |
: AWS: A Beginners Guide to the Basics of Amazon Web Service
: Adam Garren
: Amazon.com Services LLC
: 2020
: 235
:
: pdf, rtf, epub
: 10.1 MB

You Are About To Become an Expert at Amazon Web Services and Transform Your Business!! Do you wish to take your business to the cloud and are seriously considering AWS but dont know much about it? Do you want to learn why AWS is the market leader in cloud computing and how you, too can benefit from it? Are you wondering whether AWS is a good fit for your business, irrespective of its size? With Amazon owning close to 50% of all public-cloud infrastructure in the world, any conversation about cloud computing cant be complete without putting Amazons AWS at the center of the conversation.
: Ingvar16 3-04-2020, 18:25 | : 0 |
: CCNA: Advanced Methods and Strategies To Learn Routing And Switching Essentials
: ETHAN THORPE
: Amazon.com Services LLC
: 2020
: PDF, EPUB
: 137
: 11,5 Mb
: English

Without advanced routing and switching mechanisms, the network - as we know it - would not have existed. It is these mechanisms that guarantee that our data reaches the right place. Therefore, understanding and using them in practice is extremely important. This will make your network more reliable and users more satisfied.

As you read this advanced Routing & Switching book, you'll gain invaluable information on routing and switching strategies, the spanning tree protocol, and VLANs. You will also learn about the CCNA IOS. We have highlighted the issues related to the security of these solutions. If your daily tasks are related to computer networks, this book, as a part of the CCNA series, is a must-read!
: vitvikvas 3-04-2020, 15:14 | : 0 |
: The Coronavirus Cybersecurity Survival Guide: Top Tips to Protect You from a Cyber Attack
: Levi West
: Amazon.com Services LLC
: 2020
:
: pdf, azw3, epub
: 10.17 MB

Youve protected your loved ones. Now its time to protect your data. You know the dangers of Coronavirus for you and your family, but do you know the threats the virus places on cybersecurity? Keep reading to find out how to protect cybersecurity now As the global pandemic gains a foothold in places large and small, smart consumers and businesses are feeling the strain and the stress, but as the world reacts to the growing threat, do your part to protect cybersecurity in the age of this global pandemic. You have a lot of valuable information that hackers seek. Protect it, safeguard it, and find ways to bolster your security. In this book, I will give you dozens of ways to protect your Internet network and devices. This book covers topics such as email, passwords, and software security.
: Ingvar16 3-04-2020, 05:27 | : 1 |

.. 1 2 3 4 5 6 7 8 9 10 ... 272




 MirKnig.Su  2019