" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 467

: AWS Cloud Automation: In-depth guide to automation using Terraform infrastructure as code solutions
: Oluyemi James Odeyinka
: BPB Publications
: 2024
: 366
:
: pdf, epub (true)
: 10.2 MB

AWS Cloud Automation allows organizations to effortlessly organize and handle their cloud resources. Terraform, an open-source provisioning tool, transforms the old manual way of doing things by allowing users to define, deploy, and maintain infrastructure as code, ensuring consistency, scalability, and efficiency. This book explains AWS Cloud Automation using Terraform, which is a simple and clear syntax that lets users define the infrastructure needs. Terraform simplifies setting up and managing infrastructure, reducing errors and fostering team collaboration. It enables version control, letting you monitor changes and implement CI/CD pipelines, effortlessly. The book guides you in creating and managing AWS resources through a simple configuration file, allowing you to define virtual machines, networks, databases, and more. Discover how Terraform makes organizing infrastructure code easy, promoting reusability and simple maintenance with consistent patterns across projects and teams. Amazon Web Services DevOps is a set of practices and tools that are used by AWS to automate and orchestrate the process of cloud infrastructure deployment and software development. DevOps stands for Development and Operations, and it is a software deployment and development methodology that combines the best practices of software development with the best practices of IT operations.
: Ingvar16 , 18:03 | : 0 |
: Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware
: Manish Sharma
: BPB Publications
: 2024
: 402
:
: epub (true)
: 26.0 MB

Ethical Hacking and Network Analysis with Wireshark provides you with the tools and expertise to demystify the invisible conversations coursing through your cables. This definitive guide, meticulously allows you to leverage the industry-leading Wireshark to gain an unparalleled perspective on your digital landscape. This book teaches foundational protocols like TCP/IP, SSL/TLS and SNMP, explaining how data silently traverses the digital frontier. With each chapter, Wireshark transforms from a formidable tool into an intuitive extension of your analytical skills. Discover lurking vulnerabilities before they morph into full-blown cyberattacks. Dissect network threats like a forensic scientist and wield Wireshark to trace the digital pulse of your network, identifying and resolving performance bottlenecks with precision. Restructure your network for optimal efficiency, banish sluggish connections and lag to the digital scrapheap.
: Ingvar16 1-03-2024, 18:53 | : 0 |
: Zero Trust Networks: Building Secure Systems in Untrusted Networks, 2nd Edition (Final)
: Razi Rais, Christina Morillo, Evan Gilman
: OReilly Media, Inc.
: 2024
: 332
:
: pdf, epub (true)
: 15.6 MB

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture. Zero trust aims to solve the inherent problems in placing our trust in the network. Instead, it is possible to secure network communication and access so effectively that the physical security of the transport layer can be reasonably disregarded. It goes without saying that this is a lofty goal. The good news is that weve got pretty powerful cryptographic algorithms these days, and given the right automation systems, this vision is actually attainable. For network engineers, security engineers, CTOs, and everyone in between can benefit from zero trust learnings. Even without a specialized skill set, many of the principles included in this book can be clearly understood, helping leaders make decisions that implement a zero trust model, improving their overall security posture incrementally.
: Ingvar16 29-02-2024, 19:57 | : 0 |
: Introduction to Cybersecurity in the Internet of Things
: Keke Gai, Jing Yu, Liehuang Zhu
: CRC Press
: 2024
: 645
:
: pdf (true)
: 16.7 MB

This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. The authors discuss the overall IoT architecture, covering networking, computing, and security threats and risks to hardware such as sensors, actuators, and portable devices, as well as infrastructure layers. They cover a range of technical concepts such as cryptography, distributed storage, and data transmission, and offer practical advice on implementing security solutions such as authentication and access control. By exploring the future of cybersecurity in the IoT industry, with insights into the importance of big data and the threats posed by data mining techniques, this book is an essential resource for anyone interested in, or working in, the rapidly evolving field of IoT security. The main content in this book is formed by four parts. The ?rst part provides learners with basic information about cybersecurity in mobile computing from three perspectives, including basic concepts, fundamental cyber issues in mobile computing, and relevant knowledge about the Internet-of-Things (IoT) and cloud computing.
: Ingvar16 28-02-2024, 06:00 | : 0 |
: Low-Power Wide Area Network for Large Scale Internet of Things: Architectures, Communication Protocols and Recent Trends
: Mariyam Ouaissa, Mariya Ouaissa, Inam Ullah Khan, Zakaria Boulouard
: CRC Press
: Prospects in Networking and Communication
: 2024
: 275
:
: pdf (true)
: 10.1 MB

This book presents a comprehensive exploration of LPWANs, delving into their fundamental concepts, underlying technologies, and the multifaceted challenges they tackle. This book recognizes that LPWANs don't operate in isolation; they are intimately intertwined with Artificial Intelligence and Machine Learning (AI/ML) technologies, which play a pivotal role in optimizing LPWAN performance and capabilities. The book is a collection of original contributions regarding air interface, transmission technologies and novel network architectures, such as network slicing, cloud/fog/edge computing, ad hoc networks and software-defined network. Also, this book provides a guide for researchers of IoT applications to choose suitable LPWAN technologies and describe the design aspects, network architectures, security issues and challenges.
: Ingvar16 25-02-2024, 19:21 | : 0 |
: Home Networking Tricks and Tips - 3rd Edition 2024
: Papercut Limited
: Papercut Limited
: 2024
:
: pdf
: 41.3 MB

"Home Networking Tricks and Tips" - , . ? ? , ? , , , . , , , " " . , , .
: Ingvar16 25-02-2024, 18:27 | : 0 |
: .
: . .
:
: 2022
C: 100
: pdf
: 14
:

, . Comodo Internet Security, Dr. Web CureIt, AVZ .
: rivasss 23-02-2024, 14:18 | : 0 |
:
: ..
:
: 2014
C: 112
: pdf
: 25
:

2 230400.62 . , : , , , , , , - .
: rivasss 22-02-2024, 13:33 | : 0 |
: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies (Final)
: Omar Santos, Samer Salam, Hazim Dahir
: Addison-Wesley Professional/Pearson Education
: 2024
: 221
:
: pdf (true), epub (true)
: 10.6 MB

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance.
: Ingvar16 22-02-2024, 05:33 | : 0 |
: CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701
: Nikolaos Gorgotsias
: ExamsDigest LLC. and LabsDigest LLC
: December 10, 2023
: 1620
:
: pdf
: 12.2 MB

Are you preparing for the CompTIA Security+ SY0-701 exam? Assess your exam readiness with these Practice Tests to maximize your chance of passing your CompTIA Security+ SY0-701 first time. The ebook is fully updated to reflect the latest CompTIA Security+ SY0-701 exam. These 1200+ practice exam questions will prepare you thoroughly for the real exam so that you get to ace your exam with confidence. Presented with and without answers so you can study or simulate an exam. There are 1200+ practice exam questions, covering all domains of the latest CompTIA Security+ SY0-701 exam blueprint. Each question reflects the difficulty of the real CompTIA Security+ SY0-701 exam. With these Practice Tests, you'll know when you are ready to ace your CompTIA Security+ SY0-701 exam! We recommend reviewing these practice questions until youre confident in all areas and ready to achieve a great score! Also, claim your free access to examsdigest.com in order to get all the benefits.
: Ingvar16 21-02-2024, 21:52 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 467

 MirKnig.Su  2021