|
|
|
|
|
|
|
| |
|
Название: Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to Z Автор: Shubham Yadav Издательство: Amazon.com Services LLC Год: 2020 Страниц: 109 Язык: английский Формат: pdf. azw3 Размер: 19.3 MB
If you want to learn about what is Ethical Hacking? And, How Hackers hack into the system. Then you have come to the right place. Ethical hacking is a profession that has gained popularity in the last few years. Network Security and Cyber Security have become important aspects of every business. Hackers have always hacked the network or server of an organization to obtain personal information that can derail the company. It is for this reason that organizations have begun to hire the professionals to help them maintain this security. These professionals are ethical hackers. An ethical hacker will run numerous tests and hacks that another cracker may use to obtain sensitive information about the system. |
Разместил: Ingvar16 23-05-2020, 19:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Design of Rijndael: The Advanced Encryption Standard (AES) (Information Security and Cryptography) Second edition Автор: Joan Daemen, Vincent Rijmen Издательство: Springer Год: 2020 Формат: true pdf/rtf/fb2 Страниц: 286 Размер: 10 Mb Язык: English
An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. |
Разместил: bomboane 23-05-2020, 18:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Handbook of Research on Machine and Deep Learning Applications for Cyber Security Автор: Padmavathi Ganapathi, D. Shanmugapriya Издательство: IGI Global Год: 2020 Страниц: 507 Язык: английский Формат: pdf (true) Размер: 15.1 MB
As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. |
Разместил: Ingvar16 23-05-2020, 17:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security and Privacy Issues in Sensor Networks and IoT Автор: Priyanka Ahlawat (Author, Editor), Mayank Dave (Editor) Издательство: IGI Global Год: 2020 Формат: true pdf/fb2 Страниц: 351 Размер: 17.9 Mb Язык: English
As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges. |
Разместил: bomboane 23-05-2020, 17:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Networking Games: Network Forming Games and Games on Networks Автор: Vladimir Mazalov, Julia V. Chirkova Издательство: Academic Press Год: 2019 Формат: PDF Страниц: 312 Размер: 10 Mb Язык: English
Networking Games: Network Forming Games and Games on Networks applies game theory methods to network analyses. Its concentration on rigorous mathematical techniques distinguishes it from other books on game theory. Developed by a mathematician and game theorist with extensive contributions to applied mathematics, game and probability theory, and written for graduate students and professionals, the book's illuminations on network games can be applied to problems in economics (in industrial organization, regulation and competition policy, for instance) and operations research. |
Разместил: vitvikvas 23-05-2020, 02:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security and Privacy in Communication Networks: 12th International Conference, SecureComm 2016 Автор: Robert Deng, Jian Weng Издательство: Springer Год: 2017 Формат: PDF Размер: 32 Мб Язык: английский / English
This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session. |
Разместил: black 22-05-2020, 18:02 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Wireless and Guided Wave Electromagnetics: Fundamentals and Applications Автор: Le Nguyen Binh Издательство: CRC Press Год: 2017 Формат: PDF Размер: 36 Мб Язык: английский / English
Wireless communications allow high-speed mobile access to a global Internet based on ultra-wideband backbone intercontinental and terrestrial networks. Both of these environments support the carrying of information via electromagnetic waves that are wireless (in free air) or guided through optical fibers. Wireless and Guided Wave Electromagnetics: Fundamentals and Applications explores the fundamental aspects of electromagnetic waves in wireless media and wired guided media. This is an essential subject for engineers and physicists working with communication technologies, mobile networks, and optical communications. |
Разместил: black 22-05-2020, 17:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Smart Things & Femtocells: From Hype to Reality Автор: Fadi Al-Turjman Издательство: CRC Press Год: 2018 Формат: PDF Размер: 13 Мб Язык: английский / English
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications. |
Разместил: black 22-05-2020, 15:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Industrial IoT Application Architectures and Use Cases Автор: A. Suresh, Malarvizhi Nandagopal Издательство: Auerbach Publications / CRC Press Год: 2020 Страниц: 204 Язык: английский Формат: True PDF Размер: 13.1 MB
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries. |
Разместил: Ingvar16 22-05-2020, 14:30 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cross-Site Scripting Attacks: Classification, Attack and Countermeasures (Security, Privacy and Trust in Mobile Communications) Автор: B. B. Gupta, Pooja Chaudhary Издательство: CRC Press Год: 2020 Формат: true pdf/epub Страниц: 170 Размер: 11.5 Mb Язык: English
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. |
Разместил: bomboane 22-05-2020, 09:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|