|
|
|
|
|
|
|
| |
|
Название: Нейронные сети. Эволюция Автор(ы): Каниа Кан Издательство: ЛитРес: Самиздат Год: 2018 Страниц: 400 Формат: pdf, epub Размер: 17 Мб Язык: русский
Эта книга предназначена для всех, кто хочет разобраться в том, как устроены нейронные сети. Для тех читателей, кто хочет сам научиться программировать нейронные сети, без использования специализированных библиотек машинного обучения. Книга предоставляет возможность с нуля разобраться в сути работы искусственных нейронов и нейронных сетей, математических идей, лежащих в их основе, где от вас не требуется никаких специальных знаний, не выходящих за пределы школьного курса в области математики.
|
Разместил: MIHAIL62 16-06-2020, 02:17 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity: A Self-Teaching Introduction Автор: C.P. Gupta, K.K. Goyal Издательство: Mercury Learning and Information Год: 2020 Формат: PDF Страниц: 220 Размер: 10 Mb Язык: English
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, cloud security, and more. |
Разместил: vitvikvas 15-06-2020, 12:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Penetration Testing: A Hands-On Introduction to Hacking Автор: Georgia Weidman Издательство: No Starch Press Год: 2014 Формат: EPUB / True PDF Размер: 15 Мб / 12 Мб Язык: английский / English
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. |
Разместил: black 15-06-2020, 07:55 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: AWS Certified Developer Associate Practice Tests [2020]: 390 AWS Practice Exam Questions with Answers & detailed Explanations Автор: Neal Davis Издательство: Digital Cloud Training Год: 2020 Формат: epub/pdf(conv.) Размер: 10.1 Mb Язык: English
Preparing for the AWS Certified Developer Associate exam? Assess your exam readiness with these AWS Practice Tests to maximize your chance of passing your AWS certification exam first time. Fully updated to reflect the latest DVA-C01 exam, these Practice Tests will prepare you thoroughly for the real exam so that you get to ace your exam with confidence. Presented with and without answers so you can study or simulate an exam. |
Разместил: bomboane 14-06-2020, 09:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Modeling and Design of Secure Internet of Things Автор: Charles A. Kamhoua (Editor), Laurent L. Njilla (Editor), Alexander Kott (Editor), Sachin Shetty (Editor) Издательство: Wiley-IEEE Press Год: 2020 Формат: True PDF Страниц: 677 Размер: 16.3 Mb Язык: English
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. |
Разместил: bomboane 14-06-2020, 08:05 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations, Second Edition Автор: Morey J. Haber Издательство: Apress Год: 2020 Формат: true pdf/epub Страниц: 403 Размер: 14.2 Mb Язык: English
See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. |
Разместил: bomboane 13-06-2020, 16:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Enterprise Networking, Security, and Automation Companion Guide (CCNAv7) Автор: Cisco Networking Academy Издательство: Cisco Press Год: 2020 Формат: epub Страниц: 750 Размер: 55.9 Mb Язык: English
Enterprise Networking, Security, and Automation (CCNA v7) Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the Enterprise Networking, Security, and Automation course and organize your time. |
Разместил: bomboane 13-06-2020, 07:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: hacking with kali linux for beginners: A Beginner’s Guide to Learning All the Basic of Kali Linux and Cybersecurity and Getting Started with Networking, Scripting, and Security in Kali Автор: Ayoub Braiki Издательство: Amazon Год: 2020 Формат: epub/pdf(conv.) Размер: 10.8 Mb Язык: English
What You Will Learn • Master regular Linux orders and systems administration procedures • Build your own Kali web server and figure out how to be mysterious • Carry out infiltration testing utilizing Python... |
Разместил: bomboane 12-06-2020, 09:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain-Based Smart Grids Автор: Miadreza Shafie-khah (Editor) Издательство: Academic Press Год: 2020 Формат: True PDF Страниц: 221 Размер: 11.6 Mb Язык: English
Blockchain-Based Smart Grids presents emerging applications of blockchain in electrical system and looks to future developments in the use of blockchain technology in the energy market. Rapid growth of renewable energy resources in power systems and significant developments in the telecommunication systems has resulted in new market designs being employed to cover unpredictable and distributed generation of electricity. This book considers the marriage of blockchain and grid modernization, and discusses the transaction shifts in smart grids, from centralized to peer-to-peer structures. In addition, it addresses the effective application of these structures to speed up processes, resulting in more flexible electricity systems. |
Разместил: bomboane 11-06-2020, 23:33 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Основы информационной безопасности Автор: Белов Е.Б., Лось В.П. и др. Издательство: М.: Горячая линия – Телеком Год: 2006 Cтраниц: 544 Формат: pdf Размер: 19 мб Язык: русский
Изложены вопросы теории и практики обеспечения информационной безопасности личности, общества и государства. Большое внимание уделено проблеме безопасности автоматизированных систем, включая вопросы определения модели нарушителя и требований к защите информации. Анализируются современные способы и средства защиты информации и архитектура систем защиты информации. |
Разместил: rivasss 11-06-2020, 09:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|