Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


CEH Certified Ethical Hacker Bundle, Fifth EditionНазвание: CEH Certified Ethical Hacker Bundle, Fifth Edition
Автор: Matt Walker,
Издательство: McGraw Hill
Год: 2022
Страниц: 964
Язык: английский
Формат: epub
Размер: 14.1 MB

Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions. This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they’ve learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams.
Разместил: Ingvar16 10-10-2022, 20:52 | Комментарии: 0 | Подробнее
Theory and Practice of Wireless Sensor Networks: Cover, Sense, and InformНазвание: Theory and Practice of Wireless Sensor Networks: Cover, Sense, and Inform
Автор: Habib M. Ammari
Издательство: Springer
Год: 2023
Страниц: 780
Язык: английский
Формат: pdf (true)
Размер: 27.3 MB

Wireless sensor networks have received significant attention because of their important role and many conveniences in our lives. Indeed, the recent and fast advances in inexpensive sensor technology and wireless communications have made the design and development of large-scale wireless sensor networks cost effective and appealing to a wide range of mission-critical situations, including civilian, natural, industrial, and military applications, such as health and environmental monitoring, seism monitoring, industrial process automation, and battlefields surveillance, respectively. A wireless sensor network consists of a large number of tiny, low-powered devices, called sensors, which are randomly or deterministically deployed in a field of interest while collaborating and coordinating for the successful accomplishment of their mission. These sensors suffer from very scarce resources and capabilities, such as bandwidth, storage, CPU, battery power (or energy), sensing, and communication, to name a few, with energy being the most critical one. The major challenge in the design process of this type of network is mainly due to the limited capabilities of the sensors, and particularly, their energy, which makes them unreliable.
Разместил: Ingvar16 9-10-2022, 19:56 | Комментарии: 0 | Подробнее
IoT and Big Data Analytics for Smart Cities: A Global PerspectiveНазвание: IoT and Big Data Analytics for Smart Cities: A Global Perspective
Автор: Sathiyaraj Rajendran, Munish Sabharwal, Gheorghita Ghinea
Издательство: CRC Press
Год: 2023
Страниц: 225
Язык: английский
Формат: pdf (true)
Размер: 17.9 MB

The book IoT and Big Data Analytics (IoT-BDA) for Smart Cities – A Global Perspective, emphasizes the challenges, architectural models, and intelligent frameworks with smart decisionmaking systems using Big Data and IoT with case studies. The book illustrates the benefits of Big Data and IoT methods in framing smart systems for smart applications. The text is a coordinated amalgamation of research contributions and industrial applications in the field of smart cities. With advanced technologies, traditional human life has been migrated to a digital world. It has been observed that many of the advanced applications have been developed with the integration of advanced smart technologies like Artificial Intelligence (AI), cognitive computing, Machine Learning (ML), Big Data analytics, business intelligence, and Internet of Things (IoT). Among these technologies, Big Data Analytics with the integration IoT, offers extensive variety of applications and plays a vital role in assisting and managing smart city applications.
Разместил: Ingvar16 9-10-2022, 01:23 | Комментарии: 0 | Подробнее
Emerging Real-World Applications of Internet of ThingsНазвание: Emerging Real-World Applications of Internet of Things
Автор: Anshul Verma, Pradeepika Verma, Yousef Farhaoui
Издательство: CRC Press
Год: 2023
Страниц: 273
Язык: английский
Формат: pdf (true)
Размер: 11.2 MB

The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provides smart devices for home automation as well as business solutions for delivering insights into everything from real-time monitoring of working systems to supply chain and logistics operations. The IoT has become one of the most prominent technological inventions of the 21st century. Due to the versatility of IoT devices, there are numerous real-world applications of the IoT in various domains such as smart home, smart city, health care, agriculture, industry, and transportation.
Разместил: Ingvar16 8-10-2022, 14:34 | Комментарии: 0 | Подробнее
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st CenturyНазвание: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
Автор: Shimon Brathwaite
Издательство: CRC Press
Год: 2023
Страниц: 189
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.
Разместил: Ingvar16 8-10-2022, 13:43 | Комментарии: 0 | Подробнее
Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release)Название: Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release)
Автор: Mickael Maison, Kate Stanley
Издательство: O’Reilly Media, Inc.
Год: 2022-10-06
Страниц: 260
Язык: английский
Формат: epub (true), mobi
Размер: 10.08 MB

Used by more than 80% of Fortune 100 companies, Apache Kafka has become the de facto event streaming platform. Kafka Connect is a key component of Kafka that lets you flow data between your existing systems and Kafka to process data in real time. With this practical guide, authors Mickael Maison and Kate Stanley show data engineers, site reliability engineers, and application developers how to build data pipelines between Kafka clusters and a variety of data sources and sinks. Connect allows you to quickly adopt Kafka by tapping into existing data and enabling many advanced use cases. No matter where you are in your event streaming journey, Kafka Connect is the ideal tool for building a modern data pipeline.
Разместил: Ingvar16 7-10-2022, 14:26 | Комментарии: 0 | Подробнее
Название: What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
Автор: Joanna F. DeFranco and Bob Maley
Издательство: CRC Press
Год: 2023
Формат: True PDF
Страниц: 199
Размер: 13,5 Mb
Язык: English

Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security.
The Second Edition updates content to address the most recent cyber security concerns and introduces new topics such as business changes and outsourcing. It includes new cyber security risks such as Internet of Things and Distributed Networks (i.e., blockchain) and adds new sections on strategy based on the OODA (observe-orient-decide-act) loop in the cycle.
Разместил: vitvikvas 5-10-2022, 15:48 | Комментарии: 0 | Подробнее
Cloud Computing TechnologyНазвание: Cloud Computing Technology
Автор: Huawei Technologies Co., Ltd.
Издательство: Springer
Год: 2023
Страниц: 389
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, Big Data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and Artificial Intelligence (AI).
Разместил: Ingvar16 5-10-2022, 14:06 | Комментарии: 0 | Подробнее
Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably ParanoidНазвание: Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid
Автор: Seth Enoka
Издательство: No Starch Press
Год: 2022
Страниц: 226
Язык: английский
Формат: pdf (true), epub (true), mobi
Размер: 21.9 MB

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion. For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost.
Разместил: Ingvar16 5-10-2022, 12:44 | Комментарии: 0 | Подробнее
How to Hack Like a Legend: Breaking WindowsНазвание: How to Hack Like a Legend: Breaking Windows
Автор: Sparc Flow
Издательство: No Starch Press
Год: 2022
Страниц: 218
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems.
Разместил: Ingvar16 5-10-2022, 12:23 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности