|
|
|
|
|
|
|
| |
|
Название: Artificial Intelligence and Communication Techniques in Industry 5.0 Автор: Payal Bansal, Rajeev Kumar, Ashwani Kumar, Daniel D. Dasig, Jr. Издательство: CRC Press Год: 2025 Страниц: 421 Язык: английский Формат: pdf (true) Размер: 51.4 MB
The book highlights the role of Artificial Intelligence (AI) in driving innovation, productivity, and efficiency. It further covers applications of Artificial Intelligence for digital marketing in Industry 5.0 and discusses data security and privacy issues in Artificial Intelligence, risk assessments, and identification strategies. We explore the diverse range of AI algorithms that are pushing the boundaries of innovation and discovery, from traditional algorithms like decision trees and support vector machines to state-of-the-art Deep Learning architectures and Reinforcement Learning strategies. Additionally, we highlight new directions and paradigms that are changing the field of AI research and development, such as neuromorphic computing, quantum computing-based algorithms, explainable AI, and Federated Learning. The book presents 24 chapters dealing with the applications areas of Artificial Intelligence (AI) and communication techniques in Industry 5.0. Chapter 1 explores the applications of AI in various aspects of manu facturing, including intelligent automation, predictive maintenance, and quality control. By leveraging AI’s capabilities for data analysis, Machine Learning, and decision-making, manufacturers can achieve significant gains in efficiency, productivity, and product quality. Chapter 2 explores this transformation, detailing the key features of Industry 5.0, human–machine collaboration, sustainability, and advancements like AI. Chapter 3 describes the various emerging applications of AI in the era of Industry 5.0 revolution. |
Разместил: Ingvar16 18-09-2024, 16:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices Автор: Mariya Ouaissa, Mariyam Ouaissa Издательство: CRC Press Серия: Cyber Shorts Series Год: 2025 Страниц: 116 Язык: английский Формат: pdf (true), epub, mobi Размер: 10.1 MB
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks. In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches are vital, they offer different perspectives on protecting, detecting, and responding to threats. The key is employing the right strategy at the right time in order to protect against attackers, maintain business continuity in the face of cyberattacks, optimize resources, and adhere to regulatory compliance. Offensive cybersecurity, commonly called “OffSec,” focuses on actively seeking out systems’ vulnerabilities, flaws, and weaknesses before attackers can exploit them. The premise behind OffSec is simple: to best defend oneself, one must think and act like an attacker. This proactive approach includes strategies like penetration testing (or pentesting), red teaming, phishing simulations, and vulnerability assessments. While offensive cybersecurity aims to identify vulnerabilities by actively simulating cyberattacks, defensive cybersecurity, or “DefSec,” focuses on building and maintaining resilient systems that can prevent, detect, and respond to threats as they arise. This approach emphasizes layers of protection, including firewalls, antivirus software, intrusion detection systems (IDS), intrusion prevention systems (IPS), and incident response teams. |
Разместил: Ingvar16 17-09-2024, 17:24 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Computer Networking Автор: Zeeshan Qaiser Издательство: Toronto Academic Press Год: 2024 Страниц: 258 Язык: английский Формат: pdf (true) Размер: 40.6 MB
This text explores the fundamentals of networking technology and its applications in modern computing. The book covers topics such as network architectures, protocols, security, and wireless networking. It is designed to provide readers with a comprehensive understanding of how computer networks function and how they can be configured and managed effectively. Computer networking refers to the practice of connecting multiple devices, such as computers, servers, and mobile devices, to communicate and share resources. It enables the sharing of information, data, and resources between devices, regardless of their physical location. Chapter 1 provides an introduction to computer networking, explaining the fundamental concepts and terminology used in the field. The chapter also covers the history of computer networking, including its evolution over time. Chapter 2 focuses on network protocols and standards, providing an in-depth understanding of the various communication protocols used in computer networking. The chapter discusses the OSI model, TCP/IP protocol suite, and other commonly used network protocols. Chapter 3 delves into network devices and hardware, providing an overview of the various components that make up a computer network. The chapter covers switches, routers, firewalls, and other network devices, as well as their features and functions.Finally, Chapter 8 explores the future of computer networking, discussing emerging technologies, such as the internet of things (IoT) and software-defined networking (SDN), that are likely to shape the future of the field. |
Разместил: Ingvar16 17-09-2024, 03:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Quality Assessment and Security in Industrial Internet of Things Автор: Sudan Jha, Sarbagya Ratna Shakya, Sultan Ahmad, Zhaoxian Zhou Издательство: CRC Press Год: 2025 Страниц: 222 Язык: английский Формат: pdf (true), epub Размер: 10.1 MB
This book highlights authentication and trust evaluation models in the Industrial Internet of Things. It further discusses data breaches and security issues in various Artificial Intelligence-enabled systems and uses Blockchain to resolve the challenges faced by the Industrial Internet of Things. The text showcases performance quality assessment for the Industrial Internet of Things’ applications. Our book starts with a fundamental understanding of IoT systems and their significance in revolutionizing industries such as manufacturing, healthcare, energy, transportation, and beyond. We unravel the complexities surrounding the quality assessment of smart devices, emphasizing the crucial role of parameters like Quality of Service (QoS) in ensuring optimal performance and reliability. Readers will gain valuable insights into assessing, evaluating, and enhancing the quality of smart devices, thereby contributing to the advancement of IIoT ecosystems. One of the central themes of our book is the critical importance of cybersecurity in IIoT environments. The Industrial Internet of Things (IIoT) has brought about a new era of industrialization that has made manufacturing more efficient, productive, and cost-effective. However, with the growing popularity of IIoT, security concerns have also grown, making the need for secure IIoT systems more critical than ever before. Cyber-attacks, data breaches, device vulnerabilities, and insider threats are just a few security challenges that IIoT systems face. This highlights the urgent need to develop effective security mechanisms to protect IIoT systems against various threats. |
Разместил: Ingvar16 16-09-2024, 19:14 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Нейросети на Python. Основы ИИ и машинного обучения Автор: Куликова И.В. Издательство: Наука и техника Год: 2024 Формат: PDF Страниц: 306 Размер: 27 Mb Язык: Русский
Эта книга является практическим комплексным гидом по изучению ИИ и применению нейросетей. В ней вы найдете информацию о различных типах нейросетей, их архитектуре, принципах работы и различных возможностях использования. Примеры использования библиотек NumPy, PyTorch, Matplotlib, SciPy, NetworkX, TensorFlow, OpenCV, Pandas, scikit-learn, nltk помогут вам лучше понять действия нейросети в реальных условиях. Математические основы машинного обучения, с многочисленными примерами уравнений и формул на языке программирования Python, помогут понять истоки появления нейросетей с научной точки зрения.
|
Разместил: Chipa 16-09-2024, 16:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ultimate ITIL® 4 Foundation Certification Guide: Master the Best Practices for IT Service Management (ITSM) and get Certified in the ITIL® 4 Foundation Framework Автор: Sankarsan Biswas Издательство: Orange Education Pvt Ltd, AVA Год выхода: 2024 Страниц: 558 Формат: EPUB Размер: 63,4 MB Язык: английский
Turbo Charge Your IT career with ITSM Knowledge
The book offers a detailed exploration of the ITIL framework, covering all its aspects, from the basic principles to advanced concepts. This thorough coverage is essential for a deep understanding of ITIL and its application in IT service management. The book is designed to be user-friendly, with clear language, helpful diagrams, and a layout that facilitates easy understanding and retention of information. |
Разместил: Dovegone 15-09-2024, 23:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Сети глазами хакера Автор: Базаров Магама Издательство: bhv Год: 2024 Формат: PDF Страниц: 226 Размер: 74 Mb Язык: Русский
В книге рассматриваются вопросы безопасности компьютерных сетей. Даны практические рекомендации по проведению пентеста сетей Cisco, приведены полезные сведения о протоколе DTP от компании Cisco Systems, представлено подробное руководство по пентесту канального уровня сети, тестированию безопасностии и защите устройств MikroTik. Рассказывается о методах проведения пентестов с минимальным ущербом для сетевой инфраструктуры. Даны советы по эффективному использованию в процессе тестирования на проникновение инструментария Kali Linux, , рассказано об использовании виртуальных машин для постэксплуатации систем. Описаны рекомендации по защите сетевой инфраструктуры от хакерских атак. Практические примеры демонстрируют техники пентеста как для атакующей, так и для защищающейся стороны. Электронный архив на сайте издательства содержит цветные иллюстрации к книге .
|
Разместил: Chipa 15-09-2024, 20:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition Автор: Mark Ciampa Издательство: Cengage Learning Год: 2025 Страниц: 610 Язык: английский Формат: pdf (true) Размер: 12.3 MB
Reflecting the latest developments and emerging trends from the field, Ciampa's CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, Artificial Intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice. The CompTIA Security+ certification is a vendor-neutral credential that requires passing the current certification exam SY0-701. A successful candidate has the knowledge and skills required to identify attacks, threats, and vulnerabilities; design a strong security architecture; implement security controls; be knowledgeable of security operations and incident response; and be well versed in governance, risk, and compliance requirements. This book is designed to meet the needs of students and professionals who want to master basic information security. A fundamental knowledge of computers and networks is all that is required to use this book. |
Разместил: Ingvar16 8-09-2024, 13:10 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Беспроводные локальные компьютерные сети Автор: Чернега В., Платтнер Б. Издательство: Киев: Изд-во Кондор Год: 2013 Формат: pdf Страниц: 232 Размер: 11 mb Язык: русский
Учебное пособие предназначено для студентов технических университетов, обучающихся по направлению "Компьютерные науки". В нем изложены основные теоретические положения архитектуры и технологии современных беспроводных локальных компьютерных сетей 802.11, а также способы их защиты от несанкционированного доступа. Учебное пособие также может быть использовано студентами, которые обучаются по направлениям "Компьютерная инженерия" и "Системная инженерия". |
Разместил: na5ballov 6-09-2024, 08:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Language of Cyber Attacks: A Rhetoric of Deception Автор: Aaron Mauro Издательство: Bloomsbury Academic Год: 2024 Страниц: 241 Язык: английский Формат: pdf (true), azw3, epub, mobi Размер: 10.1 MB
Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication. |
Разместил: Ingvar16 5-09-2024, 22:38 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|