Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Cyber Security: The Complete Guide To Cyber Threats And Protection, 2nd EditionНазвание: Cyber Security: The Complete Guide To Cyber Threats And Protection, 2nd Edition
Автор: David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2022
Страниц: 333
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
Разместил: Ingvar16 26-11-2022, 17:35 | Комментарии: 0 | Подробнее
Principles and Practice of BlockchainsНазвание: Principles and Practice of Blockchains
Автор: Kevin Daimi, Ioanna Dionysiou
Издательство: Springer
Год: 2023
Страниц: 398
Язык: английский
Формат: pdf (true), epub
Размер: 33.8 MB

Blockchain is considered as distributed records or lists assigned to network nodes. They store information in blocks where each block is linked to the previous one. These blocks establish a chain (blockchain). Initially, blockchains were created for cryptocurrency systems to sustain a secure and decentralized collection of transactions. Soon after, many different applications of blockchains emerged. Principles and Practice of Blockchains provides an essential compilation of relevant and cutting-edge academic and industry work on key blockchain topics. Further, it introduces blockchains to the public at large to develop their blockchain knowledge and awareness. The book can be a valuable resource to blockchain experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
Разместил: Ingvar16 26-11-2022, 04:22 | Комментарии: 0 | Подробнее
Introducing Cisco Unified Computing System: Learn Cisco UCS with Cisco UCSPEНазвание: Introducing Cisco Unified Computing System: Learn Cisco UCS with Cisco UCSPE
Автор: Stuart Fordham
Издательство: Apress
Год: 2023
Страниц: 153
Язык: английский
Формат: pdf (true), epub
Размер: 35.7 MB

The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy. So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it.
Разместил: Ingvar16 25-11-2022, 17:55 | Комментарии: 0 | Подробнее
Cyberwarfare: Threats to Critical InfrastructureНазвание: Cyberwarfare: Threats to Critical Infrastructure
Автор: Kristan Stoddart
Издательство: Palgrave Macmillan
Год: 2022
Страниц: 550
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members). This book concentrates not on military networks but on civilian critical infrastructure/critical national infrastructure (CI/CNI) attacks.
Разместил: Ingvar16 22-11-2022, 19:04 | Комментарии: 0 | Подробнее
Advances in Cyber Security and Intelligent AnalyticsНазвание: Advances in Cyber Security and Intelligent Analytics
Автор: Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh
Издательство: CRC Press
Год: 2023
Страниц: 310
Язык: английский
Формат: pdf (true)
Размер: 14.8 MB

We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models-IoT, SDN, and ICN-to support modern systems requirements.
Разместил: Ingvar16 22-11-2022, 18:42 | Комментарии: 0 | Подробнее
Emerging Trends in Cybersecurity ApplicationsНазвание: Emerging Trends in Cybersecurity Applications
Автор: Kevin Daimi, Abeer Alsadoon, Cathryn Peoples
Издательство: Springer
Год: 2023
Страниц: 464
Язык: английский
Формат: pdf (true)
Размер: 20.7 MB

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
Разместил: Ingvar16 22-11-2022, 16:50 | Комментарии: 0 | Подробнее
Internet and Web Application Security, 3rd EditionНазвание: Internet and Web Application Security, 3rd Edition
Автор: Mike Harwood, Ron Price
Издательство: Jones & Bartlett Learning
Год: 2022
Страниц: 450
Язык: английский
Формат: epub
Размер: 19.4 MB

Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.
Разместил: Ingvar16 22-11-2022, 07:59 | Комментарии: 0 | Подробнее
Data Communications and Network TechnologiesНазвание: Data Communications and Network Technologies
Автор: Huawei
Издательство: Springer
Год: 2023
Страниц: 568
Язык: английский
Формат: pdf (true)
Размер: 19.6 MB

This book is written according to the examination outline for Huawei HCIA-Routing Switching V2.5 certification, aiming to help readers master the basics of network communications and use Huawei network devices to set up enterprise LANs and WANs, wired networks, and wireless networks, ensure network security for enterprises, and grasp cutting-edge computer network technologies. The most important thing in learning about computer networks is to master and understand the protocols used for computer communication. For many people learning computer networks, the protocols used for computer communication are concepts they struggle to understand. The protocols used for computer communication in the Internet today are a set of protocols, namely the TCP/IPv4 protocol stack. The TCP/IPv4 protocol stack is a communication protocol that is most complete and most widely used at present. In recent years, with the rise of network automation technology, the abilities to program, of which Python is a major one, become a new skill requirement for network engineers. Automation scripts written in Python can perform repetitive, time-consuming and regular operations excellently.
Разместил: Ingvar16 20-11-2022, 05:26 | Комментарии: 0 | Подробнее
Wireless Communications Systems Architecture: Transceiver Design and DSP Towards 6GНазвание: Wireless Communications Systems Architecture: Transceiver Design and DSP Towards 6G
Автор: Khaled Salah Mohamed
Издательство: Springer
Год: 2022
Страниц: 192
Язык: английский
Формат: pdf (true), epub
Размер: 33.6 MB

This book discusses wireless communication systems from a transceiver and digital signal processing perspective. It is intended to be an advanced and thorough overview for key wireless communication technologies. A wide variety of wireless communication technologies, communication paradigms and architectures are addressed, along with state-of-the-art wireless communication standards. The author takes a practical, systems-level approach, breaking up the technical components of a wireless communication system, such as compression, encryption, channel coding, and modulation. This book combines hardware principles with practical communication system design. It provides a comprehensive perspective on emerging 5G mobile networks, explaining its architecture and key enabling technologies, such as M-MIMO, Beamforming, mmWaves, machine learning, and network slicing. Finally, the author explores the evolution of wireless mobile networks over the next ten years towards 5G and beyond (6G), including use-cases, system requirements, challenges and opportunities.
Разместил: Ingvar16 20-11-2022, 04:53 | Комментарии: 0 | Подробнее
Model-Based Approaches to the Internet of ThingsНазвание: Model-Based Approaches to the Internet of Things
Автор: Pascal Hirmer
Издательство: Springer
Год: 2023
Страниц: 134
Язык: английский
Формат: pdf (true), epub
Размер: 13.6 MB

This book gives an overview of existing models that cover the whole lifecycle of an IoT application, ranging from its design, implementation, deployment, operation, and monitoring to its final termination and retirement. Models provide abstraction and can help IoT application developers into creating more robust, secure, and reliable applications. Furthermore, adaptation of applications can be eased by using these models, leading to an increased dynamic of the developed IoT applications. Today, the Internet of Things (IoT) is spread throughout many different domains and changes the way we develop software. The uprising of the IoT can be explained by the decrease in hardware costs and the increase in computing power while the physical size of devices decreases over time. Furthermore, new communication technologies and protocols, such as 5G or LoRa, ease the development of highly distributed IoT applications.
Разместил: Ingvar16 19-11-2022, 12:52 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности