|
|
|
|
|
|
|
| |
|
Название: Машинное обучение и безопасность Автор: Чио К. , Фримэн Д. Издательство: ДМК Пресс Год: 2020 Cтраниц: 388 Формат: pdf (ocr) Размер: 53 мб Язык: русский
Эта книга - руководство для всех, кто намерен освоить использование технологии машинного обучения для обеспечения безопасности компьютерных систем, от выявления различных аномалий до защиты конечных пользователей. Представлены примеры возможного практического применения технологии машинного обучения для решения таких задач, как обнаружение вторжения, классификация вредоносных программ и анализ сетевой среды. В дополнение к изучению основных алгоритмов и методик машинного обучения особое внимание уделено трудным задачам по созданию работоспособных, надежных масштабируемых систем извлечения и анализа данных в сфере обеспечения безопасности. Издание будет полезно всем специалистам по компьютерной безопасности для усовершенствования контролируемых систем. |
Разместил: rivasss 25-05-2023, 11:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics, 2nd edition Автор: Izzat Alsmadi Издательство: Springer Год: 2023 Страниц: 407 Язык: английский Формат: pdf (true) Размер: 21.8 MB
This updated textbook is for courses in cyber security education that follow the National Initiative for Cybersecurity Education (NICE) framework which adopts the Competency-Based Education (CBE) method. The book creates content based on the Knowledge, Skills and Abilities (a.k.a. KSAs) described in the NICE framework. This book focuses on cyber analytics and intelligence areas. The book has 18 chapters: Introduction, Acquisition Management, Continuity Planning and Disaster Recovery, Cyber Defense Analysis and Support, Cyber Intelligence, Cyber Intelligence Analysis, Cyber Operational Planning, Cyber Policy and Strategy Management, Cyber Threat Analysis, Cybersecurity Management, Forensics Analysis, Identity Management, Incident Response, Collection Operations, Computer Network Defense, Data Analysis, Threat Analysis and last chapter, Vulnerability Assessment. Software applications and information systems continuously go through cycles of new fixes, updates, enhancements, etc. Every software change may introduce possible vulnerabilities. We assume that such vulnerabilities that exist in acquired software are accidentally or carelessly inserted at any time during the software life cycle.
|
Разместил: Ingvar16 24-05-2023, 21:12 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Introduction to Internet of Things (IoT) Автор: Ahmed Banafa Издательство: River Publishers Год: 2023 Язык: английский Формат: pdf (true) Размер: 12.6 MB
This book introduces the Internet of Things (IoT), which is the convergence of connecting people, things, data and processes; it is transforming our life, business and everything in between. By 2025, experts forecast that up to 75 billion devices will be connected to the Internet with only one third of them being computers, smartphones, smartwatches, and tablets. The remaining two thirds will be other “devices” – sensors, terminals, household appliances, thermostats, televisions, automobiles, production machinery, urban infrastructure and many other “things”, which traditionally have not been Internet enabled. This “Internet of Things” (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution mobile devices connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined. In a nutshell the Internet of Things (IoT) is the convergence of connecting people, things, data and processes; it is transforming our lives, businesses and everything in between. This book “Introduction to the Internet of Things (IoT)” explores many aspects of the Internet of Things and explains many of the complicated principles of IoT and the new advancements in IoT including using Fog/Edge Computing, and AI.
|
Разместил: Ingvar16 22-05-2023, 20:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Future Connected Technologies: Growing Convergence and Security Implications Автор: Maanak Gupta, Ravi Tomar, Anuj Kumar Yadav, Hanumat Sastry G. Издательство: CRC Press Год: 2023 Страниц: 249 Язык: английский Формат: pdf (true) Размер: 10.2 MB
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing. The book covers not only the cloud, but also other pertinent topics such as Machine Learning, Deep Learning, IoT and Fog/Edge Computing. The last section of the book mainly focuses on the security aspects of connected technologies. The highpoints of the book is that it reviews the relation and combination of the mentioned topics, which together creates a better understanding about almost every aspect of Cloud Computing & related technologies.
|
Разместил: Ingvar16 19-05-2023, 20:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Introduction to Blockchain Technology Автор: Ahmed Banafa Издательство: River Publishers Год: 2023 Язык: английский Формат: pdf (true) Размер: 10.2 MB
This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology. They will also be introduced to the basic components of Blockchain (transaction, block, block header, and the chain), its operations (hashing, verification, validation, and consensus model), underlying algorithms, and essentials of trust (hard fork and soft fork). Private and public Blockchain networks similar to Bitcoin and Ethereum will be introduced, as will concepts of Smart Contracts, Proof of Work and Proof of Stack.
|
Разместил: Ingvar16 19-05-2023, 05:41 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity Teaching in Higher Education Автор: Leslie F. Sikos, Paul Haskell-Dowland Издательство: Springer Год: 2023 Страниц: 144 Язык: английский Формат: pdf (true), epub, mobi Размер: 10.2 MB
This book collects state-of-the-art curriculum development considerations, training methods, techniques, and best practices, as well as cybersecurity lab requirements and aspects to take into account when setting up new labs, all based on hands-on experience in teaching cybersecurity in higher education.In parallel with the increasing number and impact of cyberattacks, there is a growing demand for cybersecurity courses in higher education. More and more educational institutions offer cybersecurity courses, which come with unique and constantly evolving challenges not known in other disciplines. For example, step-by-step guides may not work for some of the students if the configuration of a computing environment is not identical or similar enough to the one the workshop material is based on, which can be a huge problem for blended and online delivery modes. Using nested virtualization in a cloud infrastructure might not be authentic for all kinds of exercises, because some of its characteristics can be vastly different from an enterprise network environment that would be the most important to demonstrate to students. The availability of cybersecurity datasets for training and educational purposes can be limited, and the publicly available datasets might not suit a large share of training materials, because they are often excessively documented. The constant changes of Kali Linux make it necessary to regularly update training materials, because commands might not run the same way they did a couple of months ago.
|
Разместил: Ingvar16 18-05-2023, 16:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Technological Prospects and Social Applications of Society 5.0 Автор: Lavanya Sharma, P.K. Garg Издательство: CRC Press Год: 2024 Страниц: 279 Язык: английский Формат: pdf (true) Размер: 20.2 MB
This book provides readers to the vision of Society 5.0, which was originally proposed in the fifth Basic Science and Technology Plan by Japan’s government for a technology-based, human-centered society, emerging from the fourth industrial revolution (Industry 4.0). The implementation of Artificial Intelligence (AI) and other modern techniques in a smart society requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. According to Keidanren, Society 5.0 is a future society where the Internet of Things (IoT), Artificial Intelligence (AI), robots, sensors, and other innovative technologies will play a lead role not only to optimize the needs of individuals but also the society as a whole. The AI-related technologies may be useful for supporting human interaction with other agents. Optimal results are obtained by various approaches and algorithms, including AI, which exceed far beyond the capabilities of humans, and these results are fed back to the physical space. This process brings new values to business and society in ways not previously possible. The implementation of AI in a smart society, in which the analysis of human habits is mandatory, requires automated data scheduling and analysis using smart applications, a smart infrastructure, smart systems, and a smart network. This book is aimed at graduate and post graduate students, researchers, academicians working in the field of Computer Science, Artificial Intelligence, and Machine Learning.
|
Разместил: Ingvar16 18-05-2023, 01:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Computing with AWS: Everything You Need to Know to be an AWS Cloud Practitioner Автор: Pravin Mishra Издательство: Apress Год: 2023 Страниц: 340 Язык: английский Формат: pdf (true), epub Размер: 15.6 MB
Embark on a ground-up journey to cloud computing and the Amazon Web Services (AWS) eco-system, including all the other systems, services, and the security associated with it. This book provides you with the practical know-how to become an AWS Cloud practitioner. Your exploration will take you from key fundamentals of identity and access, storage, networking, architectures, databases, security and compute services all the way through to more advanced topics. The book is organized into easy-to-follow and engaging chapters with simple examples to make complex concepts very easy to understand followed by simple step-by-step demonstrations and case studies to make you proficient in every area of AWS. You'll manage databases in your on-prem data centers and set up, operate, and scale relational database in the cloud. All the services and resources taught in this book come from the AWS Free Tier, so you will not have to pay anything to use and learn from this book.
|
Разместил: Ingvar16 17-05-2023, 17:08 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Технологические сети и системы связи Автор: Смычёк М. А. Издательство: Инфра-Инженерия Год: 2019 - 2-е изд. Cтраниц: 401 с. : ил., табл., схем. Формат: pdf (ocr) Размер: 14 мб Язык: русский
Рассмотрены особенности построения и функционирования технологической сети связи, расположенной на значительной протяженной территории, на примере крупной компании по добыче и транспорту природного газа и жидких углеводородов. Исследованы её основные задачи в процессе обмена информационными потоками и управления компанией в целом, а также её дочерними обществами и филиалами. Показаны основные требования, предъявляемые к технологической сети связи, обслуживающей ответственные технологические процессы. Для специалистов в области связи, занятых в проектировании и обслуживании технологических сетей и систем связи. |
Разместил: rivasss 17-05-2023, 10:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Zero Trust Architecture (Early Release) Автор: Cindy Green-Ortiz, Brandon Fowler, Jason Frazier Издательство: Cisco Press Год: 2023 Страниц: 402 Язык: английский Формат: epub Размер: 10.1 MB
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. Zero Trust Architecture is for network cybersecurity engineers and architects. The primary audience is for network cybersecurity engineers and architects who are responsible for creating a framework based on a set of principles assuring monitored and managed least-privilege access security controls to remediate and mitigate advanced cybersecurity threats.
|
Разместил: Ingvar16 16-05-2023, 06:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|