|
|
|
|
|
|
|
| |
|
Название: CEH Certified Ethical Hacker Bundle, Fifth Edition Автор: Matt Walker, Издательство: McGraw Hill Год: 2022 Страниц: 964 Язык: английский Формат: epub Размер: 14.1 MB
Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they’ve learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams. |
Разместил: Ingvar16 10-10-2022, 20:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Theory and Practice of Wireless Sensor Networks: Cover, Sense, and Inform Автор: Habib M. Ammari Издательство: Springer Год: 2023 Страниц: 780 Язык: английский Формат: pdf (true) Размер: 27.3 MB
Wireless sensor networks have received significant attention because of their important role and many conveniences in our lives. Indeed, the recent and fast advances in inexpensive sensor technology and wireless communications have made the design and development of large-scale wireless sensor networks cost effective and appealing to a wide range of mission-critical situations, including civilian, natural, industrial, and military applications, such as health and environmental monitoring, seism monitoring, industrial process automation, and battlefields surveillance, respectively. A wireless sensor network consists of a large number of tiny, low-powered devices, called sensors, which are randomly or deterministically deployed in a field of interest while collaborating and coordinating for the successful accomplishment of their mission. These sensors suffer from very scarce resources and capabilities, such as bandwidth, storage, CPU, battery power (or energy), sensing, and communication, to name a few, with energy being the most critical one. The major challenge in the design process of this type of network is mainly due to the limited capabilities of the sensors, and particularly, their energy, which makes them unreliable. |
Разместил: Ingvar16 9-10-2022, 19:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: IoT and Big Data Analytics for Smart Cities: A Global Perspective Автор: Sathiyaraj Rajendran, Munish Sabharwal, Gheorghita Ghinea Издательство: CRC Press Год: 2023 Страниц: 225 Язык: английский Формат: pdf (true) Размер: 17.9 MB
The book IoT and Big Data Analytics (IoT-BDA) for Smart Cities – A Global Perspective, emphasizes the challenges, architectural models, and intelligent frameworks with smart decisionmaking systems using Big Data and IoT with case studies. The book illustrates the benefits of Big Data and IoT methods in framing smart systems for smart applications. The text is a coordinated amalgamation of research contributions and industrial applications in the field of smart cities. With advanced technologies, traditional human life has been migrated to a digital world. It has been observed that many of the advanced applications have been developed with the integration of advanced smart technologies like Artificial Intelligence (AI), cognitive computing, Machine Learning (ML), Big Data analytics, business intelligence, and Internet of Things (IoT). Among these technologies, Big Data Analytics with the integration IoT, offers extensive variety of applications and plays a vital role in assisting and managing smart city applications. |
Разместил: Ingvar16 9-10-2022, 01:23 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Emerging Real-World Applications of Internet of Things Автор: Anshul Verma, Pradeepika Verma, Yousef Farhaoui Издательство: CRC Press Год: 2023 Страниц: 273 Язык: английский Формат: pdf (true) Размер: 11.2 MB
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provides smart devices for home automation as well as business solutions for delivering insights into everything from real-time monitoring of working systems to supply chain and logistics operations. The IoT has become one of the most prominent technological inventions of the 21st century. Due to the versatility of IoT devices, there are numerous real-world applications of the IoT in various domains such as smart home, smart city, health care, agriculture, industry, and transportation. |
Разместил: Ingvar16 8-10-2022, 14:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century Автор: Shimon Brathwaite Издательство: CRC Press Год: 2023 Страниц: 189 Язык: английский Формат: pdf (true) Размер: 10.2 MB
What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply. |
Разместил: Ingvar16 8-10-2022, 13:43 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release) Автор: Mickael Maison, Kate Stanley Издательство: O’Reilly Media, Inc. Год: 2022-10-06 Страниц: 260 Язык: английский Формат: epub (true), mobi Размер: 10.08 MB
Used by more than 80% of Fortune 100 companies, Apache Kafka has become the de facto event streaming platform. Kafka Connect is a key component of Kafka that lets you flow data between your existing systems and Kafka to process data in real time. With this practical guide, authors Mickael Maison and Kate Stanley show data engineers, site reliability engineers, and application developers how to build data pipelines between Kafka clusters and a variety of data sources and sinks. Connect allows you to quickly adopt Kafka by tapping into existing data and enabling many advanced use cases. No matter where you are in your event streaming journey, Kafka Connect is the ideal tool for building a modern data pipeline. |
Разместил: Ingvar16 7-10-2022, 14:26 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition Автор: Joanna F. DeFranco and Bob Maley Издательство: CRC Press Год: 2023 Формат: True PDF Страниц: 199 Размер: 13,5 Mb Язык: English
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security. The Second Edition updates content to address the most recent cyber security concerns and introduces new topics such as business changes and outsourcing. It includes new cyber security risks such as Internet of Things and Distributed Networks (i.e., blockchain) and adds new sections on strategy based on the OODA (observe-orient-decide-act) loop in the cycle. |
Разместил: vitvikvas 5-10-2022, 15:48 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cloud Computing Technology Автор: Huawei Technologies Co., Ltd. Издательство: Springer Год: 2023 Страниц: 389 Язык: английский Формат: pdf (true) Размер: 10.2 MB
This book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, Big Data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and Artificial Intelligence (AI). |
Разместил: Ingvar16 5-10-2022, 14:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid Автор: Seth Enoka Издательство: No Starch Press Год: 2022 Страниц: 226 Язык: английский Формат: pdf (true), epub (true), mobi Размер: 21.9 MB
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion. For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost. |
Разместил: Ingvar16 5-10-2022, 12:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: How to Hack Like a Legend: Breaking Windows Автор: Sparc Flow Издательство: No Starch Press Год: 2022 Страниц: 218 Язык: английский Формат: pdf (true) Размер: 10.2 MB
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems. |
Разместил: Ingvar16 5-10-2022, 12:23 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|