|
|
|
|
|
|
|
| |
|
Название: Security and Risk Analysis for Intelligent Edge Computing Автор: Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin Издательство: Springer Серия: Advances in Information Security Год: 2023 Страниц: 244 Язык: английский Формат: pdf (true), epub Размер: 25.1 MB
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease. Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing.
|
Разместил: Ingvar16 25-06-2023, 17:43 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Risk Identification by Penetration Testing: A Comprehensive Guide to the PTES Framework Автор: Brandon S. Keath Издательство: Leanpub Год: 2023-05-04 Страниц: 121 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Dive into the world of penetration testing with this comprehensive guide by cybersecurity expert, Brandon S. Keath. Explore each stage of the Penetration Testing Execution Standard, learn essential tools and techniques, and gain insights from real-world examples. Master the art of ethical hacking and become a skilled penetration tester. In this section, we will explore post-exploitation with Metasploit, focusing on the main features of Meterpreter and the use of shells outside of Metasploit. Post-exploitation refers to the actions taken after gaining unauthorized access to a system. The goal is to maintain control, gather valuable information, and, in some cases, pivot to other systems within the network. Meterpreter is a powerful post-exploitation tool included in Metasploit. It provides advanced features and functionalities that facilitate information gathering, privilege escalation, maintaining access, and more. Meterpreter runs in memory, making it difficult to detect by antivirus software.
|
Разместил: Ingvar16 24-06-2023, 20:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cooperative and Distributed Intelligent Computation in Fog Computing: Concepts, Architectures, and Frameworks Автор: Hoa Tran-Dang, Dong-Seong Kim Издательство: Springer Год: 2023 Страниц: 211 Язык: английский Формат: pdf (true), epub Размер: 21.1 MB
This informative text/reference presents a detailed review of the state of the art in fog computing paradigm. In particular, the book examines a broad range of important cooperative and distributed computation algorithms, along with their design objectives and technical challenges. The coverage includes the conceptual fundamental of fog computing, its practical applications, cooperative and distributed computation algorithms using optimization, swarm intelligence, matching theory, and reinforcement learning methods. Discussions are also provided on remaining challenges and open research issues for designing and developing the efficient distributed computation solutions in the next-generation of fog-enabled IoT systems. The Internet of Things (IoT) paradigm has been expanded rapidly as a key pillar to realize the smart concept in various domains such as smart cities, smart grids, and smart factories since it enables the interconnection and interoperability of IoT-enabled physical and virtual entities to create smart services and informed decision-making for monitoring, control, and management purposes.
|
Разместил: Ingvar16 24-06-2023, 17:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Active Defender: Immersion in the Offensive Security Mindset Автор: Catherine J. Ullman Издательство: Wiley Год: 2023 Страниц: 272 Язык: английский Формат: epub (true) Размер: 10.2 MB
Immerse yourself in the offensive security mindset to better defend against attacks. In The Active Defender: Immersion in the Offensive Security Mindset, Senior Information Security Forensic Analyst Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you'll learn to understand and embrace the knowledge you can gain from the offensive security community. You'll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. Protecting computers, networks, software programs, and data from attack, damage, or unauthorized access is a difficult job, as evidenced by the fact that successful attacks continue to be on the rise. This book introduces the idea of the Active Defender as an alternative approach to the way cybersecurity defense has typically been practiced. The traditional approach is usually passive or reactive, waiting to respond to alerts or other indications of attack. The Active Defender, by comparison, is someone who seeks to understand a hacker mindset and embraces the knowledge gained from the offensive security community in order to be more effective.
|
Разместил: Ingvar16 23-06-2023, 21:02 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Automating and Orchestrating Networks with NetDevOps (Final) Автор: Ivo Pinto, Faisal Chaudhry Издательство: Cisco Press Год: 2024 Страниц: 320 Язык: английский Формат: epub (true) Размер: 22.1 MB
This is your comprehensive, holistic, end-to-end practitioner's guide to all things NetDevOps: all you need to use NetDevOps techniques to enhance network agility, productivity, and value. Enterprise networking pioneers Ivo Pinto and Faisal Chaudhry introduce NetDevOps' origins, components, advantages, shortcomings, use cases, and adoption challenges. Next, they drill down into NetDevOps CI/CD pipelines and testing, Jenkins automation, EVE-NG clientless multivendor network emulation, and more from a vendor-neutral perspective. Automating and Orchestrating Networks with NetDevOps is for every network or cloud operator, administrator, engineer, architect, and developer who implements, manages, or maintains network infrastructure. You'll find everything from detailed syntax and reusable code examples to deployment best practices, culminating in a full walkthrough of building your own NetDevOps architecture. Throughout, review questions help you reinforce and verify your understanding. Whatever your background or environment, this guide will help you embark confidently on your own NetDevOps journey. |
Разместил: Ingvar16 23-06-2023, 18:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Automation and Computation Автор: Satvik Vats, Vikrant Sharma, Karan Singh, Amit Gupta Издательство: CRC Press Год: 2023 Страниц: 509 Язык: английский Формат: pdf (true) Размер: 19.3 MB
The Wireless sensor networks (WSNs) are made up of spatially dispersed autonomous sensors that monitor environmental or physical elements like temperature, sound, and pressure. These sensors’ data is collectively transmitted to a destination via network infrastructure. Because sensor nodes are energy-constrained devices, energy-efficient routing techniques have become more important. Regardless of how far wireless sensor networks (WSN) have progressed, efficient energy utilization is still required to extend the lifetime of the network. The network lifetime depreciates in real-time applications due to sensor node battery limits. Different routing techniques exist, and we have examined and interpreted the results of two hierarchical algorithms, Low Energy Adaptive Clustering Hierarchy (LEACH) and Power Efficient Gathering in Sensor Information Systems (PEGASIS). The comparison is based on the amount of energy used each transmission and the WSN’s overall lifetime, with simulations performed in MATLAB.
|
Разместил: Ingvar16 23-06-2023, 06:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Azure Cookbook: Recipes to Create and Maintain Cloud Solutions in Azure (Final) Автор: Reza Salehi Издательство: O’Reilly Media, Inc. Год: 2023 Страниц: 416 Язык: английский Формат: epub (true), mobi Размер: 28.4 MB
How do you deal with the problems you face when using Azure? This practical guide provides over 75 recipes to help you to work with common Azure issues in everyday scenarios. That includes key tasks like setting up permissions for a storage account, working with Cosmos DB APIs, managing Azure role-based access control, governing your Azure subscriptions using Azure Policy, and much more. Author Reza Salehi has assembled real-world recipes that enable you to grasp key Azure services and concepts quickly. Each recipe includes CLI scripts that you can execute in your own Azure account. Recipes also explain the approach and provide meaningful context. The solutions in this cookbook will take you beyond theory and help you understand Azure services in practice.
|
Разместил: Ingvar16 23-06-2023, 04:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release) Автор: Kim Crawley Издательство: O’Reilly Media, Inc. Год: 2023-06-21 Страниц: 174 Язык: английский Формат: pdf, epub, mobi Размер: 10.2 MB
Hacker culture can be esoteric, but this entertaining reference is here to help. Organized from A to Z and written by a longtime hacker, this fun, conversational reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines. From phreaking to deepfakes, from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. Computer programming languages can be classified according to how much abstraction they have from a CPU’s instruction set. The most abstracted high-level programming languages are the most human readable and intuitive, such as Perl and Python.
|
Разместил: Ingvar16 22-06-2023, 20:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Криптография с открытым ключом Автор: Саломаа А. Издательство: Мир Год: 1995 Cтраниц: 320 Формат: pdf Размер: 12 мб Язык: русский
Предлагаемая вниманию читателя книга является практически первым изданием на русском языке, посвященным математическим вопросам криптографии, и написана известным финским ученым, автором нескольких монографий и учебников А. Саломаа. В ней обобщаются последние достижения в области криптографии, особое внимание при этом уделяется криптосистемам с открытым ключом. |
Разместил: rivasss 22-06-2023, 10:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Integration of IoT with Cloud Computing for Smart Applications Автор: Rohit Anand, Sapna Juneja, Abhinav Juneja, Ramani Kannan Издательство: CRC Press Серия: Chapman & Hall/CRC Cloud Computing for Society 5.0 Год: 2023 Страниц: 267 Язык: английский Формат: pdf (true) Размер: 23.8 MB
Integration of IoT with Cloud Computing for Smart Applications provides an integrative overview of the Internet of Things (IoT) and cloud computing to be used for the various futuristic and intelligent applications. The aim of this book is to integrate IoT and cloud computing to translate ordinary resources into smart things. Discussions in this book include a broad and integrated perspective on the collaboration, security, growth of cloud infrastructure, and real-time data monitoring.
|
Разместил: Ingvar16 22-06-2023, 03:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|