|
|
|
|
|
|
|
| |
|
Название: IoT and Analytics in Renewable Energy Systems (Volume 1): Sustainable Smart Grids & Renewable Energy Systems Автор: O.V. Gnana Swathika, K. Karthikeyan Издательство: CRC Press Год: 2024 Страниц: 335 Язык: английский Формат: pdf (true) Размер: 21.4 MB
Smart grid technologies include sensing and measurement technologies, advanced components aided with communications and control methods along with improved interfaces and decision support systems. Smart grid techniques support the extensive inclusion of clean renewable generation in power systems. Smart grid use also promotes energy saving in power systems. Cyber security objectives for the smart grid are availability, integrity and confidentiality. Nowadays we get to see the rapid expansion of technologies with the influence of Internet of Things (IoT) and Smart Grid (SG). So, whatever IoT devices we are using with some sort of protocols and parameters, we should be able to manage and know the measures and estimation of power consumption, interoperability, price forecasting, etc.
|
Разместил: Ingvar16 17-06-2023, 03:21 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: IoT and Analytics in Renewable Energy Systems (Volume 2): AI, ML and IoT Deployment in Sustainable Smart Cities Автор: O.V. Gnana Swathika, K. Karthikeyan Издательство: CRC Press Год: 2024 Страниц: 345 Язык: английский Формат: pdf (true) Размер: 29.6 MB
Smart cities emanate from a smart renewable-energy-aided power grid. The smart grid technologies offer an array of benefits like reliability, availability, and resiliency. Smart grids phenomenally contribute to facilitating cities reaching those sustainability goals over time. Digital technologies, such as the Internet of Things (IoT), automation, Artificial Intelligence (AI) and Machine Learning (ML) significantly contribute to the two-way communication between utilities and customers in smart cities.
|
Разместил: Ingvar16 16-06-2023, 21:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Автор: И. И. Блох Название: Основные понятия теории информации Издательство: Ленинград Год: 1959 Страниц: 29 Формат: DJVU, PDF Размер: 11 МБ
Введение. Что такое информация. Общая схема передачи сообщении. Как измерить информацию. Информация сложных событий. Каналы связи и их пропускная способность. Кодирование. Переработка, передача и использование информации. Теория информации в биологии. Применение теории информации к языкознанию. Заключение |
Разместил: polyanskiy 16-06-2023, 20:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Azure Security (MEAP v10) Автор: Bojan Magusic Издательство: Manning Publications Год: 2023 Страниц: 458 Язык: английский Формат: pdf, epub Размер: 22.4 MB
Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud.
|
Разместил: Ingvar16 16-06-2023, 20:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide Автор: Alexander Kott Издательство: Springer Серия: Advances in Information Security Год: 2023 Страниц: 468 Язык: английский Формат: pdf (true), epub Размер: 37.1 MB
This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. This book is based on the premise that the future of cyber-defense and cyber resilience will depend largely on autonomous, Artificially Intelligent (AI) agents. Such an agent will reside on a system that includes one or more computing devices and be responsible for defending the system from cyber compromises. If a compromise occurs, the agent will then be responsible for response and recovery of the system, usually autonomously. To refer to such a class of agents, we use the term Autonomous Intelligent Cyber-defense Agent (AICA). In this book, we explore how AICA will be designed and how it will operate.
|
Разместил: Ingvar16 14-06-2023, 04:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd Edition Автор: Ryan Leirvik Издательство: Apress Год: 2023 Страниц: 222 Язык: английский Формат: pdf, epub Размер: 12.8 MB
When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available?many with sound advice, management approaches, and technical solutions?but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization. This second edition provides tools and methods in a straight-forward, practical manner to guide the management of a cybersecurity program.
|
Разместил: Ingvar16 13-06-2023, 21:58 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Advanced Wireless Communication and Sensor Networks: Applications and Simulations Автор: Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victoria Barbosa Издательство: CRC Press Год: 2023 Страниц: 355 Язык: английский Формат: pdf (true) Размер: 35.7 MB
This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Wireless communication is one of the dominant communication systems in the current era. It has permeated into every sphere of our modern day-to-day activities and the industrial sector. There are certain benefits of using wireless communications. The notable merits include cost, mobility, ease of installation, reliability, and disaster recovery. Meanwhile, new paradigm shifts have also revolutionized wireless communication. Some adaptations such as Bluetooth, Wi-Fi 802.11, WiMax 802.16 need mention here. Brimming with a multitude of merits, these standards have improved wireless communications systems to a great extent.
|
Разместил: Ingvar16 13-06-2023, 17:53 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processes for an ethical hacker Автор: Sharon Ferrone Издательство: BPB Publications Год: 2022 Страниц: 571 Язык: английский Формат: pdf, epub Размер: 33.97 MB
In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company's people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you'll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting. This book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them. It also includes obtaining open-source intelligence to develop a dangerous environment for your potential customer. You'll learn how to install and employ offensive tactics used by skilled hackers as you go. Before eventually launching assaults against systems in an industrial network, you'll learn about industrial equipment, port, and service discovery, pivoting, and much more.
|
Разместил: Ingvar16 13-06-2023, 07:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Social Engineering Attack: Rethinking Responsibilities and Solutions Автор: Gunikhan Sonowal Издательство: Nova Science Publishers Год: 2023 Страниц: 284 Язык: английский Формат: pdf (true) Размер: 28.2 MB
The social engineering attack is presented in the first chapter of the book. It covers the definition, background, motives, and outcome of the social engineering attack. The life cycle of a social engineering attack is covered in the second chapter of the book. Attack formulation, information collecting, preparation, cultivating relationships, exploitation, and debriefing are the six phrases used by social engineering attackers throughout the life cycle. The basic concepts of social engineering attacks are covered in the third chapter of the book. The six principles of social engineering include scarcity, commitment, authority, social proof, reciprocity, social proof, and social proof. Various forms of social engineering attacks are discussed in the fourth chapter of the book. The physical method, social approach, reverse social engineering approach, technical approach, and socio-technical approach are the five main forms of social engineering attacks. Identity theft is discussed in five of the book's chapters. The purpose of the information that attackers stole from users is explained in this chapter. Social engineering tools are covered in the book's six chapters.
|
Разместил: Ingvar16 13-06-2023, 05:23 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography Автор: Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam Издательство: CRC Press Год: 2024 Страниц: 289 Язык: английский Формат: pdf (true) Размер: 13.4 MB
The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence (AI) for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using Machine Learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. |
Разместил: Ingvar16 12-06-2023, 21:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|