Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Cisco Cloud Infrastructure: Application, Security, and Data Center Architecture
Автор: Patel J., Shukla A., Sardana H., Panzade R.
Издательство:Cisco Systems
Год: 2023
Формат: PDF
Страниц:691
Размер: 66,9 МБ
Язык: English

Hybrid cloud adoption is accelerating, as companies discover that hybrid cloud architectures can reduce hosting costs, improve agility, promote scalability, accelerate deployment, and enhance security. Cisco Cloud Infrastructure is the definitive reference for every professional who needs to understand, implement, or manage Cisco hybrid cloud solutions for networking, compute, storage, applications, and/or security.
Разместил: vikCAT 22-01-2023, 18:33 | Комментарии: 0 | Подробнее
Название: Управление и настройка Wi-Fi в своем доме
Автор: Кашкаров А.П.
Издательство: ДMK
Год: 2016
Страниц: 88
ISBN: 978-5-97060-351-2
Формат: PDF
Размер: 11 Мб
Язык: русский

В предлагаемой книге описываются устройства, предназначенные для управления электрическими приборами посредством домашней или корпоративной Wi-Fi-сети и которые могут использоваться при создании проектов с общим названием «Интернет вещей» и «Умный дом». Примеры настройки электронных модулей приведены как для Windows, так и для приложений под Аndroid.
Разместил: rivasss 22-01-2023, 07:04 | Комментарии: 0 | Подробнее
Resistance to the Current: The Dialectics of HackingНазвание: Resistance to the Current: The Dialectics of Hacking
Автор: Johan Soderberg and Maxigas
Издательство: MIT Press
Серия: Information Policy
Год: 2022
Страниц: 265
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

How hacking cultures drive contemporary capitalism and the future of innovation. In Resistance to the Current, Johan Soderberg and Maxigas examine four historical case studies of hacker movements and their roles in shaping the twenty-first-century’s network society. Based on decades of field work and analysis, this intervention into current debates situates an exploding variety of hacking practices within the contradictions of capitalism. Depoliticized accounts of computing cultures and collaborative production miss their core driver, write Soderberg and Maxigas: the articulation of critique and its recuperation into innovations. Drawing on accounts of building, developing, and running community wireless networks, 3D printers, hackerspaces, and chat protocols, the authors develop a theoretical framework of critique and recuperation to examine how hackers—who have long held a reputation for being underground rebels—transform their outputs from communal, underground experiments to commercial products that benefit the state and capital.
Разместил: Ingvar16 22-01-2023, 05:58 | Комментарии: 0 | Подробнее
Security in Smart Home NetworksНазвание: Security in Smart Home Networks
Автор: Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
Издательство: Springer
Год: 2023
Страниц: 177
Язык: английский
Формат: pdf (true), epub
Размер: 29.9 MB

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
Разместил: Ingvar16 20-01-2023, 19:11 | Комментарии: 0 | Подробнее
CISM Certified Information Security Manager Practice Exams, Second EditionНазвание: CISM Certified Information Security Manager Practice Exams, Second Edition
Автор: Peter H. Gregory
Издательство: McGraw-Hill
Год: 2023
Страниц: 340
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam. Take the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices.
Разместил: Ingvar16 20-01-2023, 07:49 | Комментарии: 0 | Подробнее
Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)Название: Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)
Автор: J.R. Storment, Mike Fuller
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 483
Язык: английский
Формат: epub
Размер: 10.2 MB

FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the process of building a culture of cloud FinOps by drawing on real-world successes and failures of large-scale cloud spenders. At the time of writing, we assume readers will have a base level of knowledge of at least one of the three main public cloud providers (Amazon Web Services [AWS], Azure, and Google Cloud Platform [GCP]). Readers should understand how the cloud works and charges for resources. They should also be familiar with the major resource types like compute and storage, and higher-level service offerings like managed databases, queues, and object storage. A good starting place for the level of AWS knowledge needed is the AWS Business Professional training, or better, the AWS Cloud Practitioner certification.
Разместил: Ingvar16 20-01-2023, 07:27 | Комментарии: 0 | Подробнее
Computer Security Fundamentals, Fifth Edition (Final)Название: Computer Security Fundamentals, Fifth Edition
Автор: Dr. Chuck Easttom
Издательство: Pearson Education
Год: 2023
Страниц: 576
Язык: английский
Формат: epub
Размер: 29.3 MB

One-volume introduction to computer security. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned. This book is a guide for any computer-savvy person. This means system administrators who are not security experts and anyone who has a working knowledge of computers and wishes to know more about cybercrime and cyber terrorism could find this book useful. However, the core audience will be students who wish to take a first course in security but may not have a thorough background in computer networks. The book is in textbook format, making it ideal for introductory computer security courses that have no specific prerequisites. That lack of prerequisites means that people outside the normal computer science and computer information systems departments could also avail themselves of a course based on this book. This might be of particular interest to law enforcement officers, criminal justice majors, and even business majors with an interest in computer security.
Разместил: Ingvar16 20-01-2023, 07:10 | Комментарии: 0 | Подробнее
Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCPНазвание: Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCP
Автор: Praveen Kukreti
Издательство: BPB Publications
Год: 2023
Страниц: 297
Язык: английский
Формат: pdf, epub (true)
Размер: 10.2 MB

Explore the Essential Concepts, Tools, and Services in GCP. Google Cloud platform has a suite of cloud computing services for developing and maintaining software. It includes products like Google Compute Engine, Google App Engine, Google Cloud Storage, and Google Container Engine. With so much to offer, we will learn how to manage services running on Google Cloud. This book primarily focuses on creating a solid foundation for anyone who wants to learn Cloud computing in general and Google Cloud Platform in particular. We have arranged the overall content of this book in 13 chapters. In each chapter, we have tried to explain about the specific subject in a simple language, post which we have gone a little deeper into each and every topic that is part of the subject. As a result readers develop a fair understanding of Google Cloud services and their functionality. Readers will also find various use cases, case studies and lab activities that will help in enhancing their understanding in a more practical way. By the end of the book, you will be able to design, develop, and deploy apps in GCP.
Разместил: Ingvar16 19-01-2023, 14:59 | Комментарии: 0 | Подробнее
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Final)Название: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Final)
Автор: Eugene H. Spafford, Leigh Metcalf, Josih Dykstra
Издательство: Addison-Wesley/Pearson
Год: 2023
Страниц: 550
Язык: английский
Формат: epub (true), mobi
Размер: 28.6 MB

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them. Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isnt the user the weakest link? Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. Fall down the rabbit hole of analogies with whimsical illustrations of difficult concepts, coupled with extensive citations and humor-tinged prose that explain them.
Разместил: Ingvar16 19-01-2023, 03:34 | Комментарии: 0 | Подробнее
Zero Trust Networks: Building Secure Systems in Untrusted Network, 2nd Edition (Third Early Release)Название: Zero Trust Networks: Building Secure Systems in Untrusted Network, 2nd Edition (Third Early Release)
Автор: Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
Издательство: O’Reilly Media, Inc.
Год: 2023-01-18
Страниц: 129
Язык: английский
Формат: epub (true), mobi
Размер: 10.2 MB

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Zero trust aims to solve the inherent problems in placing our trust in the network. Instead, it is possible to secure network communication and access so effectively that physical security of the transport layer can be reasonably disregarded. It goes without saying that this is a lofty goal. The good news is that we’ve got pretty powerful cryptographic algorithms these days, and given the right automation systems, this vision is actually attainable.
Разместил: Ingvar16 19-01-2023, 03:07 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности