|
|
|
|
|
|
|
| |
|
Название: Home Networking For Beginners - 6th Edition 2024 Автор: Papercut Limited Издательство: Papercut Limited Год: 2024 Страниц: 103 Язык: английский Формат: pdf Размер: 44.2 MB
Руководство "Home Networking For Beginners - 6th Edition 2024" - это первый и единственный выбор для начинающих, чтобы узнать все, что им нужно знать о создании домашнего сетевого центра и безопасном использовании Интернета. Написанное простым английским языком, это руководство содержит множество полезных советов и пошаговых иллюстрированных инструкций. Это совершенно новое руководство пользователя расскажет вам все, что нужно знать о домашних сетях, интеллектуальных устройствах, VPN, сетевой безопасности и др. С этим неофициальным руководством у вас не останется вопросов без ответов, поскольку вы будете учиться, изучать и совершенствовать свои навыки работы с сетью. |
Разместил: Ingvar16 29-04-2024, 06:28 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Архитектура защищенных сетей. Perimeter Layer Автор: Евгений Ольков Издательство: NetSkills Год: 2023 Формат: pdf, djvu Размер: 10 Мб Качество: Хорошее Язык: Русский
О чем эта книга: Ключевые классы средств защиты для безопасности периметра сети. Принципы работы этих средств защиты. Причины необходимости этих решений и от чего они должны защищать. Особенности реализации этих решений, как архитектурные, так и концептуальные. Частые заблуждения по поводу этих средств защиты. Ключевые игроки рынка, как зарубежного, так и отечественного. Типовой функционал, который требуется от этих решений. Типовой дизайн корпоративной сети с применением этих средств защиты. Место расположения, модульность дизайна и т.д. Ключевые проблемы этих решений и на что стоит обращать внимание при выборе. Бесплатные альтернативы коммерческих решений (если они есть).
|
Разместил: tanyavip1 28-04-2024, 21:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: AWS Certified SysOps Administrator Study Guide: Associate SOA-C02 Exam (Sybex Study Guide), 3rd Edition Автор: Jorge T. Negron, Christoffer Jones, George Sawyer Издательство: Sybex Год: 2024 Страниц: 544 Язык: английский Формат: epub (true) Размер: 22.3 MB
Prepare for success on the AWS SysOps exam, your next job interview, and in the field with this handy and practical guide. The newly updated Third Edition of AWS Certified SysOps Administrator Study Guide: Associate (SOA-C02) Exam prepares you for the Amazon Web Services SysOps Administrator certification and a career in the deployment, management, and operation of an AWS environment. Whether you're preparing for your first attempt at the challenging SOA-C02 Exam, or you want to upgrade your AWS SysOps skills, this practical Study Guide delivers the hands-on skills and best practices instruction you need to succeed on the test and in the field. The first part of the book starts with the foundational topics that you need to know and understand before you dig into the rest of the book content. These topics include account creation, using the management console, using the command-line interface (CLI), and the Personal Health dashboard. This is basically a review of concepts that should be familiar to you already. The second chapter covers identity and access management, Access Analyzer, AWS Organizations, AWS Directory Service, AWS Control Tower, and AWS License Management. This chapter concentrates on account creation and the different modalities to implement authentication and authorization for users and administrators. |
Разместил: Ingvar16 26-04-2024, 20:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Защита сетей. Подход на основе анализа данных Автор: Коллинз М. Издательство: ДМК Пресс Год: 2020 Cтраниц: 308 Формат: pdf (ocr) Размер: 12 мб Язык: русский
Традиционных способов обнаружения вторжений и анализа системных журналов уже недостаточно для защиты сложных современных сетей. В данной книге специалист по проблемам безопасности Майкл Коллинз предлагает различные методы и инструменты для сбора и анализа данных о трафике. Вы поймете, как используется ваша сеть и что необходимо для обеспечения ее безопасности. Рассматриваются процессы сбора и организации данных, инструменты для их анализа, а также различные аналитические сценарии и методики. Описывается активный контроль и управление трафиком, обнаружение внутренней угрозы, интеллектуальный анализ данных, регрессия и машинном обучении и другие темы. |
Разместил: rivasss 23-04-2024, 00:19 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Wireless Communication in Cyber Security Автор: S. Sountharrajan, R. Maheswar, Geetanjali Rathee Издательство: Wiley-Scrivener Год: 2023 Страниц: 284 Язык: английский Формат: pdf (true) Размер: 15.7 MB
Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies. This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial Intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. |
Разместил: Ingvar16 20-04-2024, 05:21 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computational Intelligence and Blockchain in Biomedical and Health Informatics Автор: Pankaj Bhambri, Sita Rani, Muhammad Fahim Издательство: CRC Press Год: 2024 Страниц: 361 Язык: английский Формат: pdf (true) Размер: 30.6 MB
Advancements in computational intelligence, which encompasses Artificial Intelligence, Machine Learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data. These techniques offer novel approaches to understanding complex biological systems, improving disease diagnosis, optimizing treatment plans, and enhancing patient outcomes. Computational Intelligence and Blockchain in Biomedical and Health Informatics introduces the role of computational intelligence and blockchain in the biomedical and health informatics fields and provides a framework and summary of the various methods. The book emphasizes the role of advanced computational techniques and offers demonstrative examples throughout. Techniques to analyze the impacts on the biomedical and health Informatics domains are discussed along with major challenges in deployment. Rounding out the book are highlights of the transformative potential of computational intelligence and blockchain in addressing critical issues in healthcare from disease diagnosis and personalized medicine to health data management and interoperability along with two case studies. This book is highly beneficial to educators, researchers, and anyone involved with health data. Machine Learning, on the other hand, takes advantage of methods that allow computers to discover patterns and make predictions without being explicitly programmed to do so. Models are trained using labelled data in supervised learning, while unlabelled data is used in unsupervised learning. Decision trees, support vector machines, and neural networks are all examples of common Machine Learning methods. |
Разместил: Ingvar16 20-04-2024, 03:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ransomware and Data Extortion: The Shifting Threat Landscape Автор: Ryan Golden, Anthony M. Freed Издательство: O’Reilly Media, Inc. Год: 2024-04-19 Язык: английский Формат: pdf, epub Размер: 10.1 MB
Ransomware poses an existential threat to organizations of all sizes in any vertical. These attacks are extremely lucrative, with ransom demands and recovery costs bleeding victim organizations out of millions of dollars. This book provides an overview of the ransomware economy, including the threat that this complex attack ecosystem poses to organizations, and reveals how you can best prepare to be resilient in the face of this threat and remain operational. Ransomware is a major threat to businesses and organizations of all kinds. Ransomware and data extortion attacks are not only disruptive to business operations but also costly to resolve. They spur regulatory actions and civil litigation, including class action lawsuits against victim organizations, and more recently have even resulted in criminal charges being lodged against company officers. A dedicated anti-ransomware solution utilizes Artificial Intelligence (AI) and Machine Learning (ML) with behavioral analytics to identify and stop polymorphic and repacked variants of ransomware that EPP, EDR, and XDR continue to miss. This is because AI/ML endpoint protection models were trained on characteristics that all malware share, including a subset of ransomware. |
Разместил: Ingvar16 19-04-2024, 21:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: 5G NR Modelling in MATLAB: Network Architecture, Protocols, and Physical Layer Автор: Tulsi Pawan Fowdur, Madhavsingh Indoonundon, Dragorad A. Milovanovic Издательство: CRC Press Год: 2025 Страниц: 450 Язык: английский Формат: pdf (true) Размер: 48.8 MB
5G is the fifth generation of cellular technology. It is designed to increase speed, reduce latency, and improve the flexibility of wireless services. 5G New Radio (NR) is the enabler of three key service classes: Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine-Type Communications (mMTC). The 5G network is expected to deliver a wide range of services that includes eMBB, mMTC, and URLLC. To realize such a diverse set of requirements, the 5G network has evolved as a multilayer network that uses various technological advances to offer an extensive range of wireless services. Several technologies, such as software-defined networking, network function virtualization, edge computing, cloud computing, and small cells, are being integrated into the 5G networks to fulfill the need for diverse requirements. This book provides a detailed description of the fundamental aspects of 5G. It gives an in-depth coverage of the network architecture of 5G by considering both the network reference point architecture and the service-based architecture. The MathWorks introduced MATLAB’s 5G Toolbox which provides standard-compliant functions and examples for the simulation of the 5G environment. In this book, functions from the toolbox were used to build the 5G NR end-to-end physical layer model for Packet Data Shared Channel (PDSCH) processing and to calculate the PDSCH throughput, Bit Error Rate (BER), and Block Error Rate (BLER). Moreover, MATLAB models of each block have been used to simulate a complete 5G downlink system. |
Разместил: Ingvar16 19-04-2024, 04:54 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology Автор: Mohammad S. Obaidat, Padmalaya Nayak, Niranjan K. Ray Издательство: CRC Press Год: 2024 Страниц: 418 Язык: английский Формат: pdf (true) Размер: 14.1 MB
The book is designed as a reference text and explores the concepts and techniques of IoT, Artificial Intelligence (AI), and blockchain. It also discusses the possibility of applying blockchain for providing security in various domains. The specific highlight of this book is focused on the application of integrated technologies in enhancing data models, better insights and discovery, intelligent predictions, smarter finance, smart retail, global verification, transparent governance, and innovative audit systems. Chapter 1 is an introductory chapter that discusses the challenges involved in IoT 2.0, the integration of IoT and big data, and the role of blockchain in IoT networks to ensure security. In Chapter 2, the authors have provided a detailed review of blockchain technology and its impact on the IoT network. However, several challenges are discussed in this chapter that need to be addressed and overcome before exploiting the full potential of the blockchain in IoT applications. Chapter 3 presents an overview of cloud architecture, services, and applications of cloud technology. A real-time cloud-based weather forecasting system is presented. The book is aimed primarily at advanced undergraduates and graduates studying Computer science, computer engineering, electrical engineering, information systems, computational sciences, Artificial Intelligence, and information technology. Researchers and professionals will also find this book very useful. |
Разместил: Ingvar16 19-04-2024, 04:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Tor: From the Dark Web to the Future of Privacy Автор: Ben Collier Издательство: The MIT Press Год: 2024 Страниц: 243 Язык: английский Формат: pdf (true), epub (true) Размер: 10.1 MB
A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internet's core. Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy, Ben Collier has written, in essence, a biography of Tor—a cultural and technological history of power, privacy, politics, and empire in the deepest reaches of the internet. Tor—still known to most as the Dark Web or Dark Net—is not an easy subject to research. It exists on a bizarre terrain, simultaneously in the living rooms of lovely nerds, in the nightmares of police officers, in the small spaces of everyday digital life, and in the corridors of global power. It is a thin and brittle network stretched across the globe like a glass spiderweb and at the same time a profound challenge to the most powerful spy agencies in the world. Most users access Tor in the form of a rather innocuous web browser—much like Chrome, Safari, or Firefox—that rapidly clicks and whirrs through a pleasing set of additional messages before it starts up, giving it a slightly hacker-film feel. Once this is finished and the connection to the Tor network is confirmed, the user can simply browse the internet as normal. |
Разместил: Ingvar16 17-04-2024, 19:45 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|