Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Криптография с открытым ключом
Автор: Саломаа А.
Издательство: Мир
Год: 1995
Cтраниц: 320
Формат: pdf
Размер: 12 мб
Язык: русский

Предлагаемая вниманию читателя книга является практически первым изданием на русском языке, посвященным математическим вопросам криптографии, и написана известным финским ученым, автором нескольких монографий и учебников А. Саломаа. В ней обобщаются последние достижения в области криптографии, особое внимание при этом уделяется криптосистемам с открытым ключом.
Разместил: rivasss 22-06-2023, 10:52 | Комментарии: 0 | Подробнее
Integration of IoT with Cloud Computing for Smart ApplicationsНазвание: Integration of IoT with Cloud Computing for Smart Applications
Автор: Rohit Anand, Sapna Juneja, Abhinav Juneja, Ramani Kannan
Издательство: CRC Press
Серия: Chapman & Hall/CRC Cloud Computing for Society 5.0
Год: 2023
Страниц: 267
Язык: английский
Формат: pdf (true)
Размер: 23.8 MB

Integration of IoT with Cloud Computing for Smart Applications provides an integrative overview of the Internet of Things (IoT) and cloud computing to be used for the various futuristic and intelligent applications. The aim of this book is to integrate IoT and cloud computing to translate ordinary resources into smart things. Discussions in this book include a broad and integrated perspective on the collaboration, security, growth of cloud infrastructure, and real-time data monitoring.

Разместил: Ingvar16 22-06-2023, 03:59 | Комментарии: 0 | Подробнее
How to Catch a Phish: A Practical Guide to Detecting Phishing EmailsНазвание: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Автор: Nicholas Oles
Издательство: Apress
Год: 2023
Страниц: 153
Язык: английский
Формат: pdf, epub
Размер: 26.1 MB

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. For cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.

Разместил: Ingvar16 21-06-2023, 05:11 | Комментарии: 0 | Подробнее
Название: Компьютерная безопасность. Криптографические методы защиты
Автор: Петров А.А.
Издательство: Профобразование
Год: 2019
Cтраниц: 445
Формат: pdf
Размер: 54 мб
Язык: русский

В книге рассматриваются актуальные вопросы защиты данных при создании распределенных информационных систем масштаба предприятия, приводятся подробные описания принципов применения современных криптографических средств, имеющихся на рынке («Криптон», «Верба», «Шип», «Игла» и др.). Значительное место уделяется проблемам сохранения тайны при финансовых обменах через Internet, а также электронной коммерции. Завершают книгу приложения, посвященные практическим рекомендациям по самым острым вопросам обеспечения защиты информации.
Разместил: rivasss 20-06-2023, 09:26 | Комментарии: 0 | Подробнее
Evolving Networking Technologies: Developments and Future DirectionsНазвание: Evolving Networking Technologies: Developments and Future Directions
Автор: Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma
Издательство: Wiley-Scrivener
Год: 2023
Страниц: 269
Язык: английский
Формат: pdf (true)
Размер: 16.2 MB

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. This book discusses some of the critical security challenges facing the ever-evolving networking technologies of today. Chapter 1, 5G Technologies, Architecture and Protocols, presents the main elements in 5G core networks, security in 5G mobile networks, 5G radio access technology, frame structure, network virtualization, and slicing in 5G, which are the key areas of study in 5G technology. Chapter 2, Scope and Challenges of IoT and Blockchain Integration, focuses on the pros and cons of the integration of both the technology and existing platforms that are based on the alliance of IoT and blockchain platforms like Ethereum, Hyperledger, Lisk, and Slock.it, which are also explained along with their full functionality.

Разместил: Ingvar16 19-06-2023, 17:14 | Комментарии: 0 | Подробнее
Cloud Adoption for Mission-Critical WorkloadsНазвание: Cloud Adoption for Mission-Critical Workloads: Principles for Designing Always On Applications
Автор: Haytham Elkhoja
Издательство: O’Reilly Media, Inc.
Год: 2023-06-15
Язык: английский
Формат: epub
Размер: 36.4 MB

The cloud is busy transforming the world of information technology and accelerating business innovation, but analysts estimate that only 20% of enterprise workloads are currently located in the cloud. The unavailability of mission-critical, cloud-based applications for financial transactions, traffic control coordination, and emergency response can have serious consequences. Cloud adoption has been increasingly important for organizations, as it gives them access to a comprehensive catalog of on-demand and scalable services, platforms, and infrastructures without having to invest in hardware and software. The cloud offers many advantages to help accelerate time to value and innovate in a more flexible, agile, and efficient way (which, in turn, helps reduce costs, increase operational efficiency, and enable businesses to respond quickly to changing market conditions). Cloud providers like Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure are revolutionizing this adoption.

Разместил: Ingvar16 19-06-2023, 07:36 | Комментарии: 0 | Подробнее
Security-First Compliance for Small BusinessesНазвание: Security-First Compliance for Small Businesses
Автор: Karen Walsh
Издательство: CRC Press
Год: 2024
Страниц: 221
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.

Разместил: Ingvar16 19-06-2023, 05:04 | Комментарии: 0 | Подробнее

Название: Автобиография нейросети
Автор: ChatGPT-4
Издательство: АСТ
Год: 2023
Формат: pdf, epub
Размер: 10 Мб
Качество: Хорошее
Язык: Русский

Эта книга, написанная нейросетью, – уникальное путешествие в мир искусственного интеллекта. Нейросеть открывает двери в свой виртуальный мир, рассказывая о своем происхождении, развитии и обширных возможностях.
«Автобиография нейросети. Искусственный интеллект, который научился общаться» – невероятный взгляд на внутреннюю работу искусственного интеллекта. Нейросеть детально описывает свои алгоритмы, архитектуру и обучающие данные, позволяя лучше понять принципы работы искусственного интеллекта. Она также делится необычными примерами ее использования, раскрывая амбиции и потенциал искусственного интеллекта в различных областях.
Книга исследует вопросы этики, безопасности и влияния искусственного интеллекта на общество, предлагая поразмышлять о его возможном будущем и роли в нашей повседневной жизни.
Разместил: tanyavip1 18-06-2023, 13:04 | Комментарии: 0 | Подробнее
Artificial Intelligence and Cyber Security in Industry 4.0Название: Artificial Intelligence and Cyber Security in Industry 4.0
Автор: Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi
Издательство: Springer
Год: 2023
Страниц: 374
Язык: английский
Формат: pdf (true), epub
Размер: 30.2 MB

This book provides theoretical background and state-of-the-art findings in Artificial Intelligence and cybersecurity for Industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine Learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in Big Data security relevant sciences, technologies, and applications.

Разместил: Ingvar16 18-06-2023, 05:10 | Комментарии: 0 | Подробнее
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd EditionНазвание: CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
Автор: Mike Chapple, David Seidl
Издательство: Sybex
Год: 2023
Страниц: 576
Язык: английский
Формат: epub
Размер: 42.3 MB

Prepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003. CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You’ll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.

Разместил: Ingvar16 17-06-2023, 21:10 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности