|
|
|
|
|
|
|
| |
|
Название: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails Автор: Nicholas Oles Издательство: Apress Год: 2023 Страниц: 153 Язык: английский Формат: pdf, epub Размер: 26.1 MB
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. For cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.
|
Разместил: Ingvar16 21-06-2023, 05:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Компьютерная безопасность. Криптографические методы защиты Автор: Петров А.А. Издательство: Профобразование Год: 2019 Cтраниц: 445 Формат: pdf Размер: 54 мб Язык: русский
В книге рассматриваются актуальные вопросы защиты данных при создании распределенных информационных систем масштаба предприятия, приводятся подробные описания принципов применения современных криптографических средств, имеющихся на рынке («Криптон», «Верба», «Шип», «Игла» и др.). Значительное место уделяется проблемам сохранения тайны при финансовых обменах через Internet, а также электронной коммерции. Завершают книгу приложения, посвященные практическим рекомендациям по самым острым вопросам обеспечения защиты информации. |
Разместил: rivasss 20-06-2023, 09:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Evolving Networking Technologies: Developments and Future Directions Автор: Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma Издательство: Wiley-Scrivener Год: 2023 Страниц: 269 Язык: английский Формат: pdf (true) Размер: 16.2 MB
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. This book discusses some of the critical security challenges facing the ever-evolving networking technologies of today. Chapter 1, 5G Technologies, Architecture and Protocols, presents the main elements in 5G core networks, security in 5G mobile networks, 5G radio access technology, frame structure, network virtualization, and slicing in 5G, which are the key areas of study in 5G technology. Chapter 2, Scope and Challenges of IoT and Blockchain Integration, focuses on the pros and cons of the integration of both the technology and existing platforms that are based on the alliance of IoT and blockchain platforms like Ethereum, Hyperledger, Lisk, and Slock.it, which are also explained along with their full functionality.
|
Разместил: Ingvar16 19-06-2023, 17:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Adoption for Mission-Critical Workloads: Principles for Designing Always On Applications Автор: Haytham Elkhoja Издательство: O’Reilly Media, Inc. Год: 2023-06-15 Язык: английский Формат: epub Размер: 36.4 MB
The cloud is busy transforming the world of information technology and accelerating business innovation, but analysts estimate that only 20% of enterprise workloads are currently located in the cloud. The unavailability of mission-critical, cloud-based applications for financial transactions, traffic control coordination, and emergency response can have serious consequences. Cloud adoption has been increasingly important for organizations, as it gives them access to a comprehensive catalog of on-demand and scalable services, platforms, and infrastructures without having to invest in hardware and software. The cloud offers many advantages to help accelerate time to value and innovate in a more flexible, agile, and efficient way (which, in turn, helps reduce costs, increase operational efficiency, and enable businesses to respond quickly to changing market conditions). Cloud providers like Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure are revolutionizing this adoption.
|
Разместил: Ingvar16 19-06-2023, 07:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security-First Compliance for Small Businesses Автор: Karen Walsh Издательство: CRC Press Год: 2024 Страниц: 221 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.
|
Разместил: Ingvar16 19-06-2023, 05:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Автобиография нейросети Автор: ChatGPT-4 Издательство: АСТ Год: 2023 Формат: pdf, epub Размер: 10 Мб Качество: Хорошее Язык: Русский
Эта книга, написанная нейросетью, – уникальное путешествие в мир искусственного интеллекта. Нейросеть открывает двери в свой виртуальный мир, рассказывая о своем происхождении, развитии и обширных возможностях. «Автобиография нейросети. Искусственный интеллект, который научился общаться» – невероятный взгляд на внутреннюю работу искусственного интеллекта. Нейросеть детально описывает свои алгоритмы, архитектуру и обучающие данные, позволяя лучше понять принципы работы искусственного интеллекта. Она также делится необычными примерами ее использования, раскрывая амбиции и потенциал искусственного интеллекта в различных областях. Книга исследует вопросы этики, безопасности и влияния искусственного интеллекта на общество, предлагая поразмышлять о его возможном будущем и роли в нашей повседневной жизни.
|
Разместил: tanyavip1 18-06-2023, 13:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Artificial Intelligence and Cyber Security in Industry 4.0 Автор: Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi Издательство: Springer Год: 2023 Страниц: 374 Язык: английский Формат: pdf (true), epub Размер: 30.2 MB
This book provides theoretical background and state-of-the-art findings in Artificial Intelligence and cybersecurity for Industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine Learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in Big Data security relevant sciences, technologies, and applications.
|
Разместил: Ingvar16 18-06-2023, 05:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition Автор: Mike Chapple, David Seidl Издательство: Sybex Год: 2023 Страниц: 576 Язык: английский Формат: epub Размер: 42.3 MB
Prepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003. CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You’ll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.
|
Разместил: Ingvar16 17-06-2023, 21:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Complete Internet Security Manual - 18th Edition 2023 Автор: Papercut Limited Издательство: Papercut Limited Год: 2023 Страниц: 196 Язык: английский Формат: pdf Размер: 121.8 MB
Viruses, malware, ransomware, phishing, smishing, vishing, social engineering... the list of digital threats with peculiar names expands daily and hardly a moment goes by without some form of attack appearing in the news. We live in interesting times, where data is worth more than oil or gold and your personal information is greatly sought after by cybercriminals, scammers and hackers. How prepared are you for this new age of digital vandalism and theft? Is your Windows computer secure against the continual onslaught of the modern online world? We'll help you secure your computer, network and devices against such threats and with easy to follow tutorials, help arm you against potential threats and attacks. For parents and guardians, we also cover looking out for your children when online, together with guides on how best to protect them and advice from industry experts. You'll soon be security savvy and prepared for whatever digital threat looms on the horizon.
|
Разместил: Ingvar16 17-06-2023, 05:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: IoT and Analytics in Renewable Energy Systems (Volume 1): Sustainable Smart Grids & Renewable Energy Systems Автор: O.V. Gnana Swathika, K. Karthikeyan Издательство: CRC Press Год: 2024 Страниц: 335 Язык: английский Формат: pdf (true) Размер: 21.4 MB
Smart grid technologies include sensing and measurement technologies, advanced components aided with communications and control methods along with improved interfaces and decision support systems. Smart grid techniques support the extensive inclusion of clean renewable generation in power systems. Smart grid use also promotes energy saving in power systems. Cyber security objectives for the smart grid are availability, integrity and confidentiality. Nowadays we get to see the rapid expansion of technologies with the influence of Internet of Things (IoT) and Smart Grid (SG). So, whatever IoT devices we are using with some sort of protocols and parameters, we should be able to manage and know the measures and estimation of power consumption, interoperability, price forecasting, etc.
|
Разместил: Ingvar16 17-06-2023, 03:21 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|