Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Машинное обучение и безопасность
Автор: Чио К. , Фримэн Д.
Издательство: ДМК Пресс
Год: 2020
Cтраниц: 388
Формат: pdf (ocr)
Размер: 53 мб
Язык: русский

Эта книга - руководство для всех, кто намерен освоить использование технологии машинного обучения для обеспечения безопасности компьютерных систем, от выявления различных аномалий до защиты конечных пользователей. Представлены примеры возможного практического применения технологии машинного обучения для решения таких задач, как обнаружение вторжения, классификация вредоносных программ и анализ сетевой среды. В дополнение к изучению основных алгоритмов и методик машинного обучения особое внимание уделено трудным задачам по созданию работоспособных, надежных масштабируемых систем извлечения и анализа данных в сфере обеспечения безопасности. Издание будет полезно всем специалистам по компьютерной безопасности для усовершенствования контролируемых систем.
Разместил: rivasss 25-05-2023, 11:36 | Комментарии: 0 | Подробнее
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd editionНазвание: The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition
Автор: Izzat Alsmadi
Издательство: Springer
Год: 2023
Страниц: 407
Язык: английский
Формат: pdf (true)
Размер: 21.8 MB

This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency-Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework. This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment. Software applications and information systems continuously go through cycles of new fixes, updates, enhancements, etc. Every software change may introduce possible vulnerabilities. We assume that such vulnerabilities that exist in acquired software are accidentally or carelessly inserted at any time during the software life cycle.

Разместил: Ingvar16 24-05-2023, 21:12 | Комментарии: 0 | Подробнее
Introduction to Internet of Things (IoT)Название: Introduction to Internet of Things (IoT)
Автор: Ahmed Banafa
Издательство: River Publishers
Год: 2023
Язык: английский
Формат: pdf (true)
Размер: 12.6 MB

This book introduces the Internet of Things (IoT), which is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. By 2025, experts forecast that up to 75 billion devices will be connected to the Internet with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled. This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our lives, businesses and everything in between. This book “Introduction to the Internet of Things (IoT)” explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog/Edge Computing, and AI.

Разместил: Ingvar16 22-05-2023, 20:18 | Комментарии: 0 | Подробнее
Future Connected Technologies: Growing Convergence and Security ImplicationsНазвание: Future Connected Technologies: Growing Convergence and Security Implications
Автор: Maanak Gupta, Ravi Tomar, Anuj Kumar Yadav, Hanumat Sastry G.
Издательство: CRC Press
Год: 2023
Страниц: 249
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing. The book covers not only the cloud, but also other pertinent topics such as Machine Learning, Deep Learning, IoT and Fog/Edge Computing. The last section of the book mainly focuses on the security aspects of connected technologies. The highpoints of the book is that it reviews the relation and combination of the mentioned topics, which together creates a better understanding about almost every aspect of Cloud Computing & related technologies.

Разместил: Ingvar16 19-05-2023, 20:49 | Комментарии: 0 | Подробнее
Introduction to Blockchain TechnologyНазвание: Introduction to Blockchain Technology
Автор: Ahmed Banafa
Издательство: River Publishers
Год: 2023
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology. They will also be introduced to the basic components of Blockchain (transaction, block, block header, and the chain), its operations (hashing, verification, validation, and consensus model), underlying algorithms, and essentials of trust (hard fork and soft fork). Private and public Blockchain networks similar to Bitcoin and Ethereum will be introduced, as will concepts of Smart Contracts, Proof of Work and Proof of Stack.

Разместил: Ingvar16 19-05-2023, 05:41 | Комментарии: 0 | Подробнее
Cybersecurity Teaching in Higher EducationНазвание: Cybersecurity Teaching in Higher Education
Автор: Leslie F. Sikos, Paul Haskell-Dowland
Издательство: Springer
Год: 2023
Страниц: 144
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.2 MB

This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago.

Разместил: Ingvar16 18-05-2023, 16:13 | Комментарии: 0 | Подробнее
Technological Prospects and Social Applications of Society 5.0Название: Technological Prospects and Social Applications of Society 5.0
Автор: Lavanya Sharma, P.K. Garg
Издательство: CRC Press
Год: 2024
Страниц: 279
Язык: английский
Формат: pdf (true)
Размер: 20.2 MB

This book provides readers to the vision of Society 5.0, which was originally proposed in the fifth Basic Science and Technology Plan by Japan’s government for a technology-based, human-centered society, emerging from the fourth industrial revolution (Industry 4.0). The implementation of Artificial Intelligence (AI) and other modern techniques in a smart society requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. According to Keidanren, Society 5.0 is a future society where the Internet of Things (IoT), Artificial Intelligence (AI), robots, sensors, and other innovative technologies will play a lead role not only to optimize the needs of individuals but also the society as a whole. The AI-related technologies may be useful for supporting human interaction with other agents. Optimal results are obtained by various approaches and algorithms, including AI, which exceed far beyond the capabilities of humans, and these results are fed back to the physical space. This process brings new values to business and society in ways not previously possible. The implementation of AI in a smart society, in which the analysis of human habits is mandatory, requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. This book is aimed at graduate and post graduate students, researchers, academicians working in the field of Computer Science, Artificial Intelligence, and Machine Learning.

Разместил: Ingvar16 18-05-2023, 01:18 | Комментарии: 0 | Подробнее
Cloud Computing with AWS: Everything You Need to Know to be an AWS Cloud PractitionerНазвание: Cloud Computing with AWS: Everything You Need to Know to be an AWS Cloud Practitioner
Автор: Pravin Mishra
Издательство: Apress
Год: 2023
Страниц: 340
Язык: английский
Формат: pdf (true), epub
Размер: 15.6 MB

Embark on a ground-up journey to cloud computing and the Amazon Web Services (AWS) eco-system, including all the other systems, services, and the security associated with it. This book provides you with the practical know-how to become an AWS Cloud practitioner. Your exploration will take you from key fundamentals of identity and access, storage, networking, architectures, databases, security and compute services all the way through to more advanced topics. The book is organized into easy-to-follow and engaging chapters with simple examples to make complex concepts very easy to understand followed by simple step-by-step demonstrations and case studies to make you proficient in every area of AWS. You'll manage databases in your on-prem data centers and set up, operate, and scale relational database in the cloud. All the services and resources taught in this book come from the AWS Free Tier, so you will not have to pay anything to use and learn from this book.

Разместил: Ingvar16 17-05-2023, 17:08 | Комментарии: 0 | Подробнее
Название: Технологические сети и системы связи
Автор: Смычёк М. А.
Издательство: Инфра-Инженерия
Год: 2019 - 2-е изд.
Cтраниц: 401 с. : ил., табл., схем.
Формат: pdf (ocr)
Размер: 14 мб
Язык: русский

Рассмотрены особенности построения и функционирования технологической сети связи, расположенной на значительной протяженной территории, на примере крупной компании по добыче и транспорту природного газа и жидких углеводородов. Исследованы её основные задачи в процессе обмена информационными потоками и управления компанией в целом, а также её дочерними обществами и филиалами. Показаны основные требования, предъявляемые к технологической сети связи, обслуживающей ответственные технологические процессы.
Для специалистов в области связи, занятых в проектировании и обслуживании технологических сетей и систем связи.
Разместил: rivasss 17-05-2023, 10:01 | Комментарии: 0 | Подробнее
Zero Trust Architecture (Early Release)Название: Zero Trust Architecture (Early Release)
Автор: Cindy Green-Ortiz, Brandon Fowler, Jason Frazier
Издательство: Cisco Press
Год: 2023
Страниц: 402
Язык: английский
Формат: epub
Размер: 10.1 MB

Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. Zero Trust Architecture is for network cybersecurity engineers and architects. The primary audience is for network cybersecurity engineers and architects who are responsible for creating a framework based on a set of principles assuring monitored and managed least-privilege access security controls to remediate and mitigate advanced cybersecurity threats.

Разместил: Ingvar16 16-05-2023, 06:07 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности