Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Информационная безопасность и защита информации
Автор: Прохорова О.В.
Издательство: СГАСУ
Год: 2014
Cтраниц: 112
Формат: pdf
Размер: 25 мб
Язык: русский

Учебник по курсу «Информационная безопасность и защита информации» для студентов 2 курса специальности 230400.62 «Информационные системы и технологии». В учебнике рассматриваются основы информационной безопасности и защиты информации, а именно: разграничение доступа к ресурсам, вопросы идентификации и аутентификации субъектов, методы и средства криптографической защиты, вопросы контроля целостности информации, способы хранения и распределения ключевой информации, организация защиты информации от разрушающих программных воздействий, электронно-цифровая подпись и многое другое.
Разместил: rivasss 22-02-2024, 13:33 | Комментарии: 0 | Подробнее
Название: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies (Final)
Автор: Omar Santos, Samer Salam, Hazim Dahir
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2024
Страниц: 221
Язык: английский
Формат: pdf (true), epub (true)
Размер: 10.6 MB

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You'll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance.
Разместил: Ingvar16 22-02-2024, 05:33 | Комментарии: 0 | Подробнее
Название: CompTIA Security+ SY0-701 Practice Tests & PBQs: Exam SY0-701
Автор: Nikolaos Gorgotsias
Издательство: ExamsDigest LLC. and LabsDigest LLC
Год: December 10, 2023
Страниц: 1620
Язык: английский
Формат: pdf
Размер: 12.2 MB

Are you preparing for the CompTIA Security+ SY0-701 exam? Assess your exam readiness with these Practice Tests to maximize your chance of passing your CompTIA Security+ SY0-701 first time. The ebook is fully updated to reflect the latest CompTIA Security+ SY0-701 exam. These 1200+ practice exam questions will prepare you thoroughly for the real exam so that you get to ace your exam with confidence. Presented with and without answers so you can study or simulate an exam. There are 1200+ practice exam questions, covering all domains of the latest CompTIA Security+ SY0-701 exam blueprint. Each question reflects the difficulty of the real CompTIA Security+ SY0-701 exam. With these Practice Tests, you'll know when you are ready to ace your CompTIA Security+ SY0-701 exam! We recommend reviewing these practice questions until you’re confident in all areas and ready to achieve a great score! Also, claim your free access to examsdigest.com in order to get all the benefits.
Разместил: Ingvar16 21-02-2024, 21:52 | Комментарии: 0 | Подробнее
Название: Federated Learning for Future Intelligent Wireless Networks
Автор: Yao Sun, Chaoqun You, Gang Feng
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 306
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Explore the concepts, algorithms, and applications underlying Federated Learning. In Federated Learning for Future Intelligent Wireless Networks, a team of distinguished researchers deliver a robust and insightful collection of resources covering the foundational concepts and algorithms powering Federated Learning, as well as explanations of how they can be used in wireless communication systems. The editors have included works that examine how communication resource provision affects Federated Learning performance, accuracy, convergence, scalability, and security and privacy. Federated Learning (FL) has been widely acknowledged as one of the most essential enablers to bring network edge intelligence into reality, as it can enable collaborative training of ML models while enhancing individual user privacy and data security. Empowered by the growing computing capabilities of UEs, FL trains ML models locally on each device where the raw data never leaves the device. Specifically, FL uses an iterative approach that requires a number of global iterations to achieve a global model accuracy. In each global iteration, UEs take a number of local iterations up to a local model accuracy. This book would explore recent advances in the theory and practice of FL, especially when it is applied to wireless communication systems.
Разместил: Ingvar16 21-02-2024, 05:34 | Комментарии: 0 | Подробнее
Название: Communication Efficient Federated Learning for Wireless Networks
Автор: Mingzhe Chen, Shuguang Cui
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 189
Язык: английский
Формат: pdf (true), epub
Размер: 24.2 MB

This book provides a comprehensive study of Federated Learning (FL) over wireless networks. It consists of three main parts: (a) Fundamentals and preliminaries of FL, (b) analysis and optimization of FL over wireless networks, and © applications of wireless FL for Internet-of-Things systems. In particular, in the first part, the authors provide a detailed overview on widely-studied FL framework. In the second part of this book, the authors comprehensively discuss three key wireless techniques including wireless resource management, quantization, and over-the-air computation to support the deployment of FL over realistic wireless networks. It also presents several solutions based on optimization theory, graph theory and machine learning to optimize the performance of FL over wireless networks. In the third part of this book, the authors introduce the use of wireless FL algorithms for autonomous vehicle control and mobile edge computing optimization. Machine Learning and data-driven approaches have recently received considerable attention as key enablers for next-generation intelligent networks. Currently, most existing learning solutions for wireless networks rely on centralizing the training and inference processes by uploading data generated at edge devices to data centers.
Разместил: Ingvar16 21-02-2024, 04:43 | Комментарии: 0 | Подробнее
Название: Learning Techniques for the Internet of Things
Автор: Praveen Kumar Donta, Abhishek Hazra, Lauri Loven
Издательство: Springer
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf (true), epub
Размер: 31.7 MB

Learning for the Internet of Things is a combination of advanced learning techniques for the Internet of Things (IoT) encompassing a range of cutting-edge approaches, including Deep Learning with CNNs, RNNs, and transformers, Federated Learning, edge AI for local data processing, reinforcement learning for autonomous decision-making, and their applications in real time. The book is structured into thirteen chapters; each comes with its own dedicated contributions and future research directions. Chapter 1 introduces IoT and the use of Edge computing, particularly cloud computing, and mobile edge computing. This chapter also mentions the use of edge computing in various real-time applications such as healthcare, manufacturing, agriculture, and transportation. Chapter 2 motivates mathematical modeling for Federated Learning systems with respect to IoT and its applications. Further Chapter 3 extends the discussion of Federated Learning for IoT, which has emerged as a privacy-preserving distributed Machine Learning approach.
Разместил: Ingvar16 20-02-2024, 19:59 | Комментарии: 0 | Подробнее
Название: Защита информации в компьютерных системах и сетях
Автор: В. Ф. Шаньгин
Издательство: ДМК Пресс
Год: 2012
Cтраниц: 590
Формат: pdf/djvu
Размер: 47 мб
Язык: русский

Книга посвящена методам и средствам многоуровневой защиты информации в компьютерных системах и сетях. Формулируются основные понятия защиты информации, анализируются угрозы информационной безопасности в компьютерных информационных системах. Обсуждаются базовые понятия и принципы политики информационной безопасности. Анализируются международные и отечественные стандарты информационной безопасности. Описываются криптографические методы и алгоритмы защиты информации. Обсуждаются методы и средства идентификации, аутентификации и управления доступом в корпоративных информационных системах. Обосновывается комплексный многоуровневый подход к обеспечению информационной безопасности корпоративных систем.
Разместил: rivasss 19-02-2024, 19:31 | Комментарии: 0 | Подробнее
Название: The Zero Trust Framework and Privileged Access Management (PAM)
Автор: Ravindra Das
Издательство: CRC Press
Год: 2024
Страниц: 126
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.
Разместил: Ingvar16 18-02-2024, 05:52 | Комментарии: 0 | Подробнее
Название: Информационная безопасность и защита информации
Автор: В. Ф. Шаньгин
Издательство: ДМК Пресс
Год: 2014
Cтраниц: 700, цвет.ил.
Формат: pdf
Размер: 21 мб
Язык: русский

Книга посвящена методам комплексного обеспечения информационной безопасности, технологиям и средствам многоуровневой защиты информации в компьютерных системах и сетях. Анализируются угрозы информационной безопасности в информационных системах и сетях. Обсуждаются принципы политики информационной безопасности. Рассмотрены стандарты информационной безопасности. Анализируются особенности и инфраструктура «облачных» вычислений. Подробно рассмотрены криптографические методы и алгоритмы защиты информации. Обсуждаются методы и средства идентификации, аутентификации и управления доступом в информационных системах. Описываются методы и средства формирования виртуальных защищенных каналов и использования межсетевых экранов. Рассматриваются технологии предотвращения вторжений и технологии защиты от вредоносных программ и спама. Описываются методы управления средствами обеспечения информационной безопасности.
Разместил: rivasss 17-02-2024, 15:10 | Комментарии: 0 | Подробнее
Название: Artificial Intelligence for Cyber Defense and Smart Policing
Автор: S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
Издательство: CRC Press
Год: 2024
Страниц: 187
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing Artificial Intelligence for cyber defense and smart policing. Organizations share information about cyber attacks as a crucial component of cyber threat intelligence, in order to enhance their understanding of potential threats and proactively safeguard their systems and networks. Cyber-attacks and defenses both rely heavily on Machine Learning, but neither of them achieve their goals when they rely on it completely. A malware sniffer can detect malware in encrypted traffic based on an analysis of encrypted traffic elements in network telemetry. The algorithms of Machine Learning uncover threats hidden in encryption, instead of decrypting them.
Разместил: Ingvar16 16-02-2024, 20:29 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности