Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Cybersecurity for Decision MakersНазвание: Cybersecurity for Decision Makers
Автор: Narasimha Rao Vajjhala, Kenneth David Strang
Издательство: CRC Press
Год: 2023
Страниц: 424
Язык: английский
Формат: pdf (true)
Размер: 10.3 MB

This book is aimed at managerial decision makers, practitioners in any field, and the academic community. The chapter authors have integrated theory with evidence-based practice to go beyond merely explaining cybersecurity topics. To accomplish this, the editors drew upon the combined cognitive intelligence of 46 scholars from 11 countries to present the state of the art in cybersecurity. Managers and leaders at all levels in organizations around the globe will find the explanations and suggestions useful for understanding cybersecurity risks as well as formulating strategies to mitigate future problems. Employees will find the examples and caveats both interesting as well as practical for everyday activities at the workplace and in their personal lives. Cybersecurity practitioners in Computer Science, programming, or espionage will find the literature and statistics fascinating and more than likely a confirmation of their own findings and assumptions. Government policymakers will find the book valuable to inform their new agenda of protecting citizens and infrastructure in any country around the world. Academic scholars, professors, instructors, and students will find the theories, models, frameworks, and discussions relevant and supportive to teaching as well as research.

Разместил: Ingvar16 26-05-2023, 00:47 | Комментарии: 0 | Подробнее
Paradigms of Smart and Intelligent Communication, 5G and BeyondНазвание: Paradigms of Smart and Intelligent Communication, 5G and Beyond
Автор: Amrita Rai, Dinesh Kumar Singh, Amit Sehgal
Издательство: Springer
Год: 2023
Страниц: 297
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book focuses on both theory and applications of Artificial Intelligence and Machine Learning in the broad areas of communication and networking. This book focuses on the ongoing research work and future scope for various open research issues related to sustainable design, development, and analysis of smart communication, 5G and beyond, with the integration of Artificial intelligence and IoT. It addresses fundamental technology components for 5G and beyond, which include modern advancements in communication and networking in a real-world application. The book presents the convergence of Artificial Intelligence, Machine Learning, and IoT with 5G and beyond wireless networks to give some ice-breaking solutions in radio resource allocation, network management, and cybersecurity. This book will be a valuable resource for academicians, researchers, and professionals working in artificial intelligence/machine learning and its applications in communication and 5G.

Разместил: Ingvar16 25-05-2023, 21:48 | Комментарии: 0 | Подробнее
AWS Certified Solutions Architect - Associate (SAA-C03) Cert Guide, 2nd EditionНазвание: AWS Certified Solutions Architect - Associate (SAA-C03) Cert Guide, 2nd Edition
Автор: Mark Wilkins
Издательство: Pearson Education
Год: 2023
Страниц: 1052
Язык: английский
Формат: epub (true)
Размер: 37.99 MB

Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. AWS Certified Solutions Architect - Associate (SAA-C03) Cert Guide presents you with an organized test preparation routine using proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Разместил: Ingvar16 25-05-2023, 13:38 | Комментарии: 0 | Подробнее
Название: Машинное обучение и безопасность
Автор: Чио К. , Фримэн Д.
Издательство: ДМК Пресс
Год: 2020
Cтраниц: 388
Формат: pdf (ocr)
Размер: 53 мб
Язык: русский

Эта книга - руководство для всех, кто намерен освоить использование технологии машинного обучения для обеспечения безопасности компьютерных систем, от выявления различных аномалий до защиты конечных пользователей. Представлены примеры возможного практического применения технологии машинного обучения для решения таких задач, как обнаружение вторжения, классификация вредоносных программ и анализ сетевой среды. В дополнение к изучению основных алгоритмов и методик машинного обучения особое внимание уделено трудным задачам по созданию работоспособных, надежных масштабируемых систем извлечения и анализа данных в сфере обеспечения безопасности. Издание будет полезно всем специалистам по компьютерной безопасности для усовершенствования контролируемых систем.
Разместил: rivasss 25-05-2023, 11:36 | Комментарии: 0 | Подробнее
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd editionНазвание: The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition
Автор: Izzat Alsmadi
Издательство: Springer
Год: 2023
Страниц: 407
Язык: английский
Формат: pdf (true)
Размер: 21.8 MB

This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency-Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework. This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment. Software applications and information systems continuously go through cycles of new fixes, updates, enhancements, etc. Every software change may introduce possible vulnerabilities. We assume that such vulnerabilities that exist in acquired software are accidentally or carelessly inserted at any time during the software life cycle.

Разместил: Ingvar16 24-05-2023, 21:12 | Комментарии: 0 | Подробнее
Introduction to Internet of Things (IoT)Название: Introduction to Internet of Things (IoT)
Автор: Ahmed Banafa
Издательство: River Publishers
Год: 2023
Язык: английский
Формат: pdf (true)
Размер: 12.6 MB

This book introduces the Internet of Things (IoT), which is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. By 2025, experts forecast that up to 75 billion devices will be connected to the Internet with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled. This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our lives, businesses and everything in between. This book “Introduction to the Internet of Things (IoT)” explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog/Edge Computing, and AI.

Разместил: Ingvar16 22-05-2023, 20:18 | Комментарии: 0 | Подробнее
Future Connected Technologies: Growing Convergence and Security ImplicationsНазвание: Future Connected Technologies: Growing Convergence and Security Implications
Автор: Maanak Gupta, Ravi Tomar, Anuj Kumar Yadav, Hanumat Sastry G.
Издательство: CRC Press
Год: 2023
Страниц: 249
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing. The book covers not only the cloud, but also other pertinent topics such as Machine Learning, Deep Learning, IoT and Fog/Edge Computing. The last section of the book mainly focuses on the security aspects of connected technologies. The highpoints of the book is that it reviews the relation and combination of the mentioned topics, which together creates a better understanding about almost every aspect of Cloud Computing & related technologies.

Разместил: Ingvar16 19-05-2023, 20:49 | Комментарии: 0 | Подробнее
Introduction to Blockchain TechnologyНазвание: Introduction to Blockchain Technology
Автор: Ahmed Banafa
Издательство: River Publishers
Год: 2023
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology. They will also be introduced to the basic components of Blockchain (transaction, block, block header, and the chain), its operations (hashing, verification, validation, and consensus model), underlying algorithms, and essentials of trust (hard fork and soft fork). Private and public Blockchain networks similar to Bitcoin and Ethereum will be introduced, as will concepts of Smart Contracts, Proof of Work and Proof of Stack.

Разместил: Ingvar16 19-05-2023, 05:41 | Комментарии: 0 | Подробнее
Cybersecurity Teaching in Higher EducationНазвание: Cybersecurity Teaching in Higher Education
Автор: Leslie F. Sikos, Paul Haskell-Dowland
Издательство: Springer
Год: 2023
Страниц: 144
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.2 MB

This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago.

Разместил: Ingvar16 18-05-2023, 16:13 | Комментарии: 0 | Подробнее
Technological Prospects and Social Applications of Society 5.0Название: Technological Prospects and Social Applications of Society 5.0
Автор: Lavanya Sharma, P.K. Garg
Издательство: CRC Press
Год: 2024
Страниц: 279
Язык: английский
Формат: pdf (true)
Размер: 20.2 MB

This book provides readers to the vision of Society 5.0, which was originally proposed in the fifth Basic Science and Technology Plan by Japan’s government for a technology-based, human-centered society, emerging from the fourth industrial revolution (Industry 4.0). The implementation of Artificial Intelligence (AI) and other modern techniques in a smart society requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. According to Keidanren, Society 5.0 is a future society where the Internet of Things (IoT), Artificial Intelligence (AI), robots, sensors, and other innovative technologies will play a lead role not only to optimize the needs of individuals but also the society as a whole. The AI-related technologies may be useful for supporting human interaction with other agents. Optimal results are obtained by various approaches and algorithms, including AI, which exceed far beyond the capabilities of humans, and these results are fed back to the physical space. This process brings new values to business and society in ways not previously possible. The implementation of AI in a smart society, in which the analysis of human habits is mandatory, requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. This book is aimed at graduate and post graduate students, researchers, academicians working in the field of Computer Science, Artificial Intelligence, and Machine Learning.

Разместил: Ingvar16 18-05-2023, 01:18 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности