|
|
|
|
|
|
|
| |
|
Название: Нейросети для новичков Автор: Stepik Издательство: Stepik Год: 2024 Формат: PDF Страниц: много Размер: 22 Mb Язык: Русский
Как решать рабочие задачи быстрее и проще? Программа самообучения от NEКУРСЫ - это знакомство с возможностями генеративного искусственного интеллекта для решения самых разных задач и увеличения дохода. Нейросети - инструмент, который сегодня нужен каждому! Научитесь автоматизировать различные виды задач: маркетинговые, управленческие, продуктовые, дизайнерские и аналитические. Изучите 5 различных программ нейросетей и экономьте до нескольких часов ежедневно!
|
Разместил: Chipa 5-09-2024, 15:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments Автор: Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu Издательство: CRC Press Год: 2025 Страниц: 247 Язык: английский Формат: pdf (true), epub Размер: 17.1 MB
The industrial landscape is changing rapidly, and so is global society. This change is driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. IIoT and AI are transforming the way industrial engineering is done, enabling new levels of automation, productivity, and efficiency. However, as IIoT and AI become more pervasive in the industrial world, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems. Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments provides a comprehensive guide to IIoT security, covering topics such as network architecture, risk management, data security, and compliance. It addresses the unique security challenges that the cloud and edge environments pose, providing practical guidance for securing IIoT networks in these contexts. It includes numerous real-world case studies and examples, providing readers with practical insights into how IIoT security and AI-enabled industrial engineering are being implemented in various industries. Best practices are emphasized for the readers to ensure the reliability, safety, and security of their systems while also learning the latest developments in IIoT security for AI-enabled industrial engineering systems in this rapidly evolving field. By offering step-by-step guidance for the implantation process along with best practices, this book becomes a valuable resource for practitioners and engineers in the areas of industrial engineering, IT, computer engineering, and anyone looking to secure their IIoT network against cyber threats. |
Разместил: Ingvar16 5-09-2024, 02:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice Автор: Jason Edwards Издательство: Wiley Год: 2025 Страниц: 448 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
Learn to enhance your organization’s cybersecurit?y through the NIST Cybersecurit?y Framework in this invaluable and accessible guide. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. The cybersecurity landscape is increasingly complex, characterized by various sophisticated threats that target every aspect of the digital environment. From advanced persistent threats to ransomware, phishing, and zero-day exploits, the variety and sophistication of these cyber threats pose a constant challenge to organizations. This complexity is further amplified by the rapid pace of technological advancements and the expanding digital footprint of businesses, making securing digital assets an ever-evolving battle. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields. |
Разместил: Ingvar16 3-09-2024, 14:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security and Privacy in Web 3.0 Автор: Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu Издательство: Springer Год: 2024 Страниц: 164 Язык: английский Формат: pdf (true), epub Размер: 16.4 MB
Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is designed to address issues encountered in the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. This book explores the challenges and solutions related to ensuring security and privacy in the context of the evolving Web 3.0 architecture. Web 3.0 represents the next generation of the web, characterized by decentralized networks, blockchain technology, and enhanced user control over data. As Web 3.0 evolves, the focus on addressing security and privacy concerns becomes increasingly crucial. This book provides a comprehensive understanding of the security and privacy issues specific to Web 3.0 and offers practical defense frameworks and methods to mitigate these challenges. This book is dedicated to the specific aspects of security and privacy in Web 3.0, from introducing the architecture and addressing the inherent issues to presenting innovative methods for privacy-preserving computing, user behavior identification, and abnormal transaction detection. It is of particular interest to researchers in the field of Web 3.0, blockchain, and network security, as it summarizes the security and privacy concerns in Web 3.0 and brings a number of innovative technologies and practical solutions to protect sensitive data and maintain user privacy in Web 3.0 environments, equipping researchers with the knowledge necessary to design secure and privacy-aware applications and systems in Web 3.0. |
Разместил: Ingvar16 2-09-2024, 11:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT Автор: Venugopal K R, Roopa M S, Santosh Pattar Издательство: CRC Press Год: 2025 Страниц: 330 Язык: английский Формат: pdf (true) Размер: 18.2 MB
A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems. It discusses the benefits of integrating social networking concepts into the Internet of Things to find the preferable, reliable, scalable, and near-optimal detection of things or services. It explores the concepts of the Social Internet of Things in different domains of IoT, such as the Internet of Vehicles and the Industrial Internet of Things. This book works to recognize and respond to user queries and improve service provisioning, find the optimal solution for the link selection in the SIoT structure, develop large-scale platforms, and provide a smart mechanism for trust evaluation. |
Разместил: Ingvar16 30-08-2024, 22:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Анализ сетей (графов) в среде R. Руководство пользователя (+file) Автор: Люк Д.А. Издательство: ДМК Пресс Год: 2017 Страниц: 250 ISBN: 978-5-97060-428-1 Формат: PDF Размер: 10.6 Мб Язык: русский
До недавнего времени для проведения анализа сетей требовалось специализированное программное обеспечение. Однако недавно инструменты для этого появились в среде статистического программирования R. Помимо того, что методы анализа сетей стали доступны более широкому кругу специалистов по статистике, пакет R предоставил исследователям обширные возможности по управлению данными, графической визуализации и статистическому моделированию. |
Разместил: rivasss 30-08-2024, 08:33 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Основы современной криптографии и стеганографии (2013) Автор: Рябко Б.Я., Фионов А.Н. Издательство: Издательство "Горячая линия-Телеком" Год: 2013 - 2-е издание Cтраниц: 232 Формат: pdf Размер: 12 мб Язык: русский
В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации. Рассмотрены основные шифры с открытыми ключами, методы цифровой подписи, основные криптографические протоколы, блоковые и потоковые шифры, криптографические хеш-функции, а также редко встречающиеся в литературе вопросы о конструкции доказуемо невскрываемых криптосистем криптографии на эллиптических кривых. Рассмотрены вопросы, связанные с использованием случайных и псевдослучайных чисел в системах защиты информации. |
Разместил: rivasss 30-08-2024, 07:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity Tabletop Exercises: From Planning to Execution Автор: Robert Lelewski, John Hollenberger Издательство: No Starch Press Год: 2025 Страниц: 200 Язык: английский Формат: pdf, epub Размер: 10.1 MB
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks. With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture. This book has several audiences in mind. The first is information security professionals and those in related roles who are tasked with creating and facilitating a tabletop exercise for their employer. These individuals might need help executing their organization’s first tabletop exercise, or they might want to improve their performance in an ongoing series of exercises. |
Разместил: Ingvar16 30-08-2024, 05:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Become GCP Cloud Digital Leader Certified in 7 Days: Getting to Know Google Cloud Автор: Abhinav Krishna Kaiser Издательство: Apress Год: 2024 Страниц: 361 Язык: английский Формат: pdf Размер: 14.7 MB
Unlock opportunities in the IT industry through the entry level Google Cloud Platform (GCP) and embark on a journey of Cloud Digital Leader certification. In this book, aspiring IT professionals, IT leaders, and enthusiasts will find a comprehensive resource that simplifies the basic technological elements of GCP and the spread of its products and services that are needed to thrive in the digital age. You’ll begin by reviewing the details of GCP’s role in digital transformation and how cloud technology is revolutionizing businesses around the globe. Next, the book covers the use of data in GCP and AI and machine learning implementations in GCP. Further, it discusses use cases involving data lakes and data warehouses. Following this, you’ll examine cloud infrastructure, including technologies around virtual machines, containerization, and serverless computing. The last section focuses on security, managing operations, and monitoring using GCP. You will also gain insight into Google’s framework for service reliability engineering (SRE). Become GCP Cloud Digital Leader Certified in 7 Days allows you to dive into the world of Google Cloud Platform with confidence, armed with the knowledge to navigate the dynamic landscape of IT and emerge as a digital leader. For those who are in leadership at IT organizations. The book is also for all IT professionals and students preparing for the Google Cloud Platform: Cloud Digital Leader certification. |
Разместил: Ingvar16 28-08-2024, 06:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Redefining Security With Cyber AI Автор: Marwan Omar, Hewa Majeed Zangana Издательство: IGI Global Год: 2024 Страниц: 287 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
In the rapidly evolving digital landscape, the importance of cybersecurity has never been more critical. With the increasing sophistication of cyber threats, traditional security measures often fall short in providing adequate protection. Cyber Artificial Intelligence (AI) offers advanced capabilities to detect, prevent, and respond to attacks in real time. As cyber threats continue to grow in complexity and frequency, the integration of AI into cybersecurity frameworks is not just advantageous but essential for maintaining robust and resilient defenses. Redefining Security With Cyber AI delves into the profound transformation of security paradigms brought about by the advent of AI. This book explores the intricate dance between the ever-expanding frontiers of digital technology and the AI-driven mechanisms that aim to safeguard them. Covering topics such as artificial neural networks, intrusion detection, and large language models, this book is an excellent resource for cybersecurity professionals, AI and Machine Learning researchers, IT executives and managers, policy makers and regulators, postgraduate students and educators, academicians, and more. |
Разместил: Ingvar16 27-08-2024, 12:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|