Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Autonomous Driving Network: Network Architecture in the Era of Autonomy
Автор: Wenshuan Dang, River Huang, Yijun Yu
Издательство: CRC Press
Год: 2024
Страниц: 400
Язык: английский
Формат: pdf (true)
Размер: 25.3 MB

Aiming to outline the vision of realizing automated and intelligent communication networks in the era of intelligence, this book describes the development history, application scenarios, theories, architectures, and key technologies of Huawei's Autonomous Driving Network (ADN) solution. In the book, the authors explain the design of the top-level architecture, hierarchical architecture (ANE, NetGraph, and AI Native NE), and key feature architecture (distributed AI and endogenous security) that underpin Huawei's ADN solution. The book delves into various key technologies, including trustworthy AI, distributed AI, digital twin, network simulation, digitization of knowledge and expertise, human-machine symbiosis, NE endogenous intelligence, and endogenous security. It also provides an overview of the standards and level evaluation methods defined by industry and standards organizations, and uses Huawei's ADN solution as an example to illustrate how to implement AN. Autonomous Networks (AN), a product of the mutual development between network and digital technologies, has become an indispensable capability for future networks. It will help coordinate network devices and management systems, improve network intelligence, enable intelligent services, and promote transformation toward digital, automated, and intelligent infrastructure.
Разместил: Ingvar16 9-12-2023, 19:05 | Комментарии: 0 | Подробнее
Название: CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003), 3rd Edition
Автор: Mya Heath, Bobby E. Rogers, Brent Chapman
Издательство: McGraw Hill
Год: 2024
Страниц: 560
Язык: английский
Формат: epub (true)
Размер: 17.4 MB

Prepare for the CompTIA CySA+ certification exam using this fully updated self-study resource. Take the current version of the challenging CompTIA CySA+ certification exam with confidence using the detailed information contained in this up-to-date integrated study system. Based on proven pedagogy, the book contains detailed explanations, real-world examples, step-by-step exercises, and exam-focused special elements that teach and reinforce practical skills. CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Third Edition (Exam CS0-003) covers 100% of 2023 exam objectives and features re-structured content and new topics. Online content enables you to test yourself with full-length, timed practice exams or create customized quizzes by chapter or exam domain. Designed to help you pass the exam with ease, this comprehensive guide also serves as an essential on-the-job reference. In our discussion of network analysis tools, it’s important to start with BPF (Berkeley Packet Filter). BPF is a critical low-level filtering technology that forms the backbone of various network analysis tools, including Wireshark, TShark, and tcpdump. By delving into BPF first, we can establish a solid understanding of its capabilities and inner workings. This knowledge will serve as a foundation for our subsequent discussions on tcpdump and Wireshark.
Разместил: Ingvar16 9-12-2023, 06:49 | Комментарии: 0 | Подробнее
Название: Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner
Автор: Seth James Nielson
Издательство: Apress
Год: 2023
Страниц: 447
Язык: английский
Формат: pdf (true), epub
Размер: 27.7 MB

The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission. This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. For professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Разместил: Ingvar16 9-12-2023, 06:14 | Комментарии: 0 | Подробнее
Название: Основы современной криптографии и стеганографии
Автор: Рябко Б.Я., Фионов А.Н.
Издательство: Горячая линия-Телеком
Год: 2010
Cтраниц: 220
Формат: pdf
Размер: 11 мб
Язык: русский

В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации. Рассмотрены основные шифры с открытыми ключами, методы цифровой подписи, основные криптографические протоколы, блоковые и потоковые шифры, криптографические хешфункции, а также редко встречающиеся в литературе вопросы о конструкции доказуемо невскрываемых криптосистем и криптографии на эллиптических кривых.
Разместил: rivasss 9-12-2023, 01:55 | Комментарии: 0 | Подробнее
Название: AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach
Автор: Syed Rehan
Издательство: Apress
Год: 2024
Страниц: 355
Язык: английский
Формат: pdf
Размер: 15.2 MB

In an era where the fusion of connectivity and technology is redefining industries, this book is a must-have guide for aspiring technologists and seasoned professionals alike. This meticulously crafted handbook guides you through every aspect of AWS IoT, touching upon vital spheres such as edge computing, machine learning, and industrial IoT, with a distinct spotlight on cybersecurity. Over the course of this book, industry veteran Syed Rehad unveils the secrets to setting up your AWS IoT environment and walks you through advanced concepts such as leveraging MQTT, mastering Digital Twin implementation, and plumbing the depths of edge machine learning. Whether you're experimenting with virtual devices or hands-on with Raspberry Pi setups, this book will steer you towards innovation and a transformative journey where technology meets intelligence and security, all under the expansive umbrella of AWS IoT. For IoT developers and enthusiasts, professionals who want to implement IoT solutions in industrial scenarios, system architects and designers interested in edge machine learning, business intelligence analysts, and cybersecurity professionals.
Разместил: Ingvar16 8-12-2023, 19:39 | Комментарии: 0 | Подробнее
Название: Cloud and Edge Networking
Автор: Kamel Haddadou, Guy Pujolle
Издательство: Wiley-ISTE
Год: 2023
Страниц: 303
Язык: английский
Формат: pdf (true)
Размер: 56.4 MB

A major transformation in the world of networks is underway, as the focus shifts from physical technology to software-based solutions. In this book, the authors present this new generation of networks that are based in the Cloud by detailing the transition from a complex environment to a simple digital infrastructure. This infrastructure brings together connected devices, the antennas that collect radio waves, the optical fibers that carry signals and the data center that handles all of the different processes. From this perspective, the data center becomes the brain, managing network services, controls, automation, intelligence, security and other applications. This architecture is relevant to carrier networks, the Internet of Things, enterprise networks and the global networks of the major Internet companies. Cloud Networking is revolutionizing the field of networks by proposing a complete paradigm shift. The Cloud imposes a completely different vision of the Internet with centralized controls and a virtualization of all the functions necessary to the life of a network, the latter consisting of the replacement of hardware equipment by software equipment which runs in the Cloud. As a result, physical networks are replaced by logical networks that run in data centers that are more or less remote from the network nodes themselves.
Разместил: Ingvar16 7-12-2023, 22:46 | Комментарии: 0 | Подробнее
Название: Enhancing IoT Security: A holistic approach to security for connected platforms
Автор: Vidushi Sharma, Gamini Joshi
Издательство: BPB Publications
Год: 2024
Страниц: 748
Язык: английский
Формат: epub (true)
Размер: 31.8 MB

Everything you need to know to secure your IoT devices. The Internet of Things (IoT) is a rapidly growing network of physical devices that are connected to the internet and can collect and exchange data. It can potentially revolutionize many industries but also raises serious security concerns. This book provides a holistic overview of the security challenges and requirements of IoT. It starts by introducing the fundamentals of IoT security, such as the different types of threats and vulnerabilities. It then discusses the security lifecycle of IoT devices, from design and deployment to operation and maintenance. This book also covers a variety of security technologies and techniques that can be used to protect IoT devices, such as encryption, authentication, and access control. In addition to the technical aspects of IoT security, this book discusses the legal and regulatory landscape that governs IoT devices. Lastly, it focuses on the ethical implications of IoT security, such as the need to protect user privacy. By the end of this book, you will have a thorough understanding of the security challenges and requirements of the IoT. The book is designed for engineering students and researchers who are studying IoT security in graduate and postgraduate courses such as computer science, information technology, electronics and communication, networking applications, and electrical and electronics.
Разместил: Ingvar16 7-12-2023, 05:40 | Комментарии: 0 | Подробнее
Название: CCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online, 2nd Edition
Автор: Arthur J. Deane
Издательство: For Dummies
Год: 2024
Страниц: 403
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Get CCSP certified and elevate your career into the world of cloud security. CCSP For Dummies is a valuable resource for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowledge in all six domains, with real-world examples and scenarios, so you can be sure that you’re heading into test day with the most current understanding of cloud security. You’ll also get tips on setting up a study plan and getting ready for exam day, along with digital flashcards and access to two updated online practice tests. Information security is one of the broadest domains of Information Technology. Add to that the complexities of cloud computing, and it’s easy to see why many people are scared off by the field of cloud security. In CCSP For Dummies, Wiley and I have put together a book that covers all of the topics within the CCSP Common Body of Knowledge (CBK) in a straightforward, easy-to-read manner. And this second edition has been updated to address the latest and greatest topics from the CCSP Exam Outline and beyond. You’ll find this book to be overflowing with useful information, but written with the battle-tested For Dummies approach and styling that helps countless readers learn new topics. In addition, I try to inject many of my own experiences working in cloud security to give you practical views on some otherwise abstract topics.
Разместил: Ingvar16 6-12-2023, 16:38 | Комментарии: 0 | Подробнее
Название: The Complete Cloud Computing Manual - 20th Edition, 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 164
Язык: английский
Формат: pdf
Размер: 69.0 MB

Cloud computing is one of the most important advancements of digital technology in the last decade. With the cloud we're able to help science by crunching huge numbers and volumes of data, from discovering the secrets of the universe to trying to predict the next pandemic, to simply providing a safe and secure repository for our personal files and information. The cloud is all-powerful, but it's also our human to digital link to the next stages in computing technology: Al. With the cloud, we're creating the evolution of machine learning which will help us through the coming years as we rely more and more on technology to help us in our daily lives. In this book you'll discover what the cloud is, how it works, and how it can benefit you can your business. We look at the major players in cloud the storage market, and reveal in-depth analysis of key features. There's guides on how to create your own cloud, how to use Google's Home devices, and tons of information that will get you up to date with the latest in cloud terminology and technology. Read on, and let's see what makes up the cloud and how it does and will continue to affect our everyday lives in this modern digital age.
Разместил: Ingvar16 5-12-2023, 03:52 | Комментарии: 0 | Подробнее
Название: Network basics for hackers: The Comprehensive Guide to Mastering Network Intricacies, Demystifying Cyber Threats, and Forging Ahead in Digital Defense Realms
Автор: Scott McAleese
Издательство: Independently published
Год: 2023
Страниц: 330
Язык: английский
Формат: pdf
Размер: 26.7 MB

Dominate the Digital Maze with Unparalleled Precision and Expertise! Are you an aspiring hacker or cybersecurity enthusiast yearning to dive deep into the world of networking? Or maybe you're a professional on the brink of a career transition, seeking clarity amidst the overwhelming deluge of online resources? In today's world, a foundational grasp of networks isn't just a 'good-to-have'; it's a necessity. But we get it—drowning in an ocean of resources, fearing outdated information, or being anxious about lacking hands-on practice can be paralyzing. A highlight of this guide is an exclusive chapter dedicated to Kali Linux, the penetration tester's holy grail. Explore its rich history, acquaint yourself with its indispensable tools, and master the nuances of its configuration. With Kali Linux under your belt, your prowess as a hacker will know no bounds. Dive deep into Kali Linux, enhancing your toolkit and boosting your confidence. Kali Linux is a hacker's best friend. From its vast suite of tools to its customizable nature, it's a platform built for penetration testing. Learn how to set up Kali, get acquainted with its interface, and master some of its most powerful tools. This chapter ensures you're not just theoretically informed but practically ready. Master hacker networking basics. Dive into data packets, protocols, and router workings to form a solid hacking foundation. Unlock Windows domain attack secrets. Explore Windows vulnerabilities, including pass-the-hash and token impersonation, to exploit corporate OS weak points.
Разместил: Ingvar16 3-12-2023, 22:13 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности