Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: Сегодня, 05:32
  • Комментариев: 0
Название: Cybersecurity Threats and Attacks in the Gaming Industry: Secure Game Players' and Developers' Data and Systems
Автор: Massimo Nardone
Издательство: Apress
Год: 2025
Страниц: 118
Язык: английский
Формат: pdf (true), epub (true), rtf, mobi
Размер: 10.1 MB

Learn about the most common and known threats and attacks in the gaming industry. Cybersecurity is a critical concern in the gaming industry due to the significant financial investments, personal data, and intellectual property at stake. Game developers, publishers, and players all have a vested interest in maintaining a secure gaming environment. This pocketbook is about why cybersecurity in the gaming industry is essential to protect player data, maintain a secure gaming environment, and safeguard intellectual property. Both players and game developers need to remain vigilant, educate themselves about potential threats, and employ best practices to ensure a safe and enjoyable gaming experience. We will describe the most common type of targeted games facing cybersecurity attacks as well as some of the most common types of cyber threats faced by the gaming industry such as malware, distributed denial of service (DDoS) attacks, data breaches, etc.
  • Добавил: literator
  • Дата: Вчера, 18:08
  • Комментариев: 0
Название: Kali Linux for Beginners: A step-by-step Guide to Ethical Hacking: Mastering Cybersecurity with Hands-On Exercises
Автор: ETS Publishing
Издательство: ETS Publishing
Год: October 26, 2024
Страниц: 510
Язык: английский
Формат: epub
Размер: 10.1 MB

Are you fascinated by the world of cybersecurity? Do you want to learn the same tools used by hackers and penetration testers—but without feeling overwhelmed by technical jargon? Kali Linux for Beginners offers an accessible way to step into the realm of ethical hacking, even if you have zero prior experience. This comprehensive guide takes you from a beginner to a capable ethical hacker with hands-on, step-by-step instructions. Designed with clarity and practicality in mind, this book introduces readers to the powerful Kali Linux operating system—a specialized platform packed with hundreds of cybersecurity tools. Whether you're pursuing a career in information security or just curious about how ethical hackers think, this guide will equip you with the knowledge and skills to confidently test and secure systems. In today’s digital age, cyber threats are becoming more sophisticated, and ethical hackers play a crucial role in identifying and fixing vulnerabilities before malicious attackers exploit them. Kali Linux is the go-to platform for penetration testers worldwide due to its flexibility, power, and pre-installed tools.
  • Добавил: literator
  • Дата: Вчера, 02:37
  • Комментариев: 0
Название: Blockchain Technology: Cross-Chain Regulation and Privacy
Автор: Peng Jiang, Liehuang Zhu
Издательство: Springer
Год: 2025
Страниц: 192
Язык: английский
Формат: pdf (true), epub
Размер: 28.3 MB

The rapid development and widespread application of blockchain technology have led to a diverse and heterogeneous blockchain ecosystem. Independent operations, resembling isolated data islands, increase the difficulty of data exchange among blockchains. Cross-chain technology has emerged to connect independent blockchains, facilitating asset transfer and information interaction. As a promising new technology, cross-chain solutions with strong interoperability have garnered attention from both academia and industry. However, cross-chain financial incidents have exposed significant information leakage and property loss, highlighting the need for regulation and privacy in cross-chain environments. The lack of uniformity in cross-chain architecture and the use of common plain-format transactions increase the difficulty of both regulation and privacy preservation. This book, for the first time, explores the challenges and solutions related to cross-chain regulation and privacy. We provide a comprehensive understanding of how to design full life-cycle regulation mechanisms, from multi-dimensional detection to efficient provenance tracking, and lightweight privacy-preserving mechanisms. Additionally, we discuss how to balance regulation and privacy in cross-chain environments.
  • Добавил: literator
  • Дата: 27-05-2025, 20:56
  • Комментариев: 0
Название: Azure Networking: Understand key concepts and design secure Cloud networking architectures
Автор: Jose Moreno, Adam Stuart
Издательство: BPB Publications
Год: 2025
Страниц: 408
Язык: английский
Формат: epub (true)
Размер: 28.0 MB

In the ever-evolving landscape of Cloud technology, every project demands a robust, high-performance, scalable and secure foundation. Whether you're deploying traditional Virtual Machines or pioneering modern Artificial Intelligence solutions, a well designed Azure Networking infrastructure is critical for success. This book simplifies complex concepts, empowering you to architect reliable and efficient network solutions within the Azure cloud. It takes you from the fundamentals of Azure networking, including VNets, NSGs, and hub-and-spoke models, to advanced topics like Virtual WAN, ExpressRoute, and SD-WAN integration using Route Server. It meticulously covers essential design considerations, security best practices with Azure Firewall, service tags, AVNM security rules and ZTNA, and explores multi-cloud strategies. You will learn how to implement effective DNS with Private Resolver and PaaS networking using Private Link, and master application delivery with load balancing and Front Door. This book is for network architects and engineers familiar with on-premises networking products and protocols. It also benefits cloud architects who understand Azure constructs and want to specialize in its networking capabilities.
  • Добавил: magnum
  • Дата: 26-05-2025, 20:06
  • Комментариев: 0
Advances in Geoinformation SciencesНазвание: Advances in Geoinformation Sciences
Автор: Alias Abdul-Rahman, Ivin A. Musliman, Imzan Hassan, Ainn Zamzuri (Editors)
Издательство: Springer
Год выхода: 2025
Страниц: 378
Формат: True PDF; True ePUB
Размер: 192 MB
Язык: английский

Proceedings of ESRI Users Conference series (by ESRI California); - This book provides discussions on the usage of the specific software like ArcGIS Pro, thus, unlike the intended book which is more advanced solutions and methods. Proceedings of 31st ACM International Conference (by ACM); - This book offers specific solutions to the computing and spatial science community but more for system developers etc, whereas this intended book has broader knowledge spectrum. Proceedings of 18th 3D Geoinfo International Conference (Springer). - This book specifically discusses on 3D GIS research, whereas the intended book gives more breadth thus offers extra insights to the knowledge.
  • Добавил: literator
  • Дата: 26-05-2025, 18:26
  • Комментариев: 0
Название: Hands-on Penetration Testing for Web Applications: Web security testing on modern applications - 2nd Edition
Автор: Richa Gupta
Издательство: BPB Publications
Год: 2025
Страниц: 334
Язык: английский
Формат: epub (true)
Размер: 17.7 MB

Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehensive overview of web application security testing methodologies. Each chapter offers key insights and practical applications that align with the objectives of the course. Students will explore critical areas such as vulnerability identification, penetration testing techniques, using open-source pen test management and reporting tools, testing applications hosted on cloud, and automated security testing tools. Throughout the book, readers will encounter essential concepts and tools such as OWASP Top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), authentication and authorization testing, and secure configuration practices. The target audience for this book includes students, security enthusiasts, penetration testers, and web application developers. Individuals who are new to security testing will be able to build an understanding about testing concepts and find this book useful. People will be able to gain expert knowledge on pentesting tools and concepts.
  • Добавил: literator
  • Дата: 25-05-2025, 20:42
  • Комментариев: 0
Название: The OSINT Bible: The Complete Guide to Mastering Open-Source Intelligence | Discover Critical Information, Protect Sensitive Data, and Gain a Competitive Edge
Автор: Trevor Shelwick
Издательство: Independently published
Год: 2025
Страниц: 357
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

Are you ready to gather critical information that others often overlook? Do you want to use OSINT techniques to uncover the truth and expose hidden threats? In today’s data-driven world, finding the right information can be overwhelming. For professionals in cybersecurity, corporate investigations, or intelligence, missing a critical piece of data could lead to disastrous outcomes. Traditional methods aren’t enough as digital threats evolve, and without the right tools, you risk overlooking vital insights, slowing down your investigations, and falling behind in an ever-changing landscape. Inside this book, you will discover: - 7 Exclusive OSINT Tools: Gain access to unique and powerful tools that will elevate your investigative capabilities; - Master Social Media Investigations: Uncover hidden information from platforms like Facebook, Instagram, and Twitter with advanced techniques; - Image and Video Analysis: Learn how to perform reverse image searches and video forensics to gather critical data; - Anonymity and Security: Protect your identity and secure your OSINT operations with advanced privacy techniques.
  • Добавил: literator
  • Дата: 25-05-2025, 07:43
  • Комментариев: 0
Название: AIoT: Artificial Intelligence of Things
Автор: Arun Sekar Rajasekaran, Fadi Al-Turjman, Suganyadevi S.
Издательство: CRC Press
Серия: Innovations in Intelligent Internet of Everything (IoE)
Год: 2025
Страниц: 421
Язык: английский
Формат: pdf (true), epub
Размер: 48.4 MB

AIoT: Artificial Intelligence of Things explores the integration of Artificial Intelligence (AI) into everyday objects and devices to allow them to analyze data, make decisions, and communicate with each other, which leads to improved efficiency, convenience, and new possibilities in various aspects of daily life. With a wide-ranging scope, the book covers various aspects of Artificial Intelligence of Things (AIoT) from fundamental concepts to advanced applications. It begins with an introduction to AI, Internet of Things (IoT), and their synergistic relationship and explains how AI technologies enhance the capabilities of IoT devices. The book then explores the key components of AIoT, including sensors, connectivity, data processing, and Machine Learning algorithms. The book presents AIoT architectures, such as cloud-based, edge-based, and hybrid systems, and discusses their advantages and challenges. Exploring the role of Big Data analytics in AIoT, it highlights how large-scale data collection and analysis can drive intelligent decision-making and predictive insights. It delves into such AI techniques employed in AIoT systems as natural language processing (NLP), computer vision, Deep Learning, and Reinforcement Learning.
  • Добавил: umkaS
  • Дата: 23-05-2025, 18:13
  • Комментариев: 0
Название: Просто криптография
Автор: Виктор де Касто
Издательство: Страта
Год: 2014
Cтраниц: 205, ил.
Формат: pdf
Размер: 61 мб
Язык: русский

Наверно, ничто не вызывает у людей большего любопытства, чем чужие тайны. Чем больше одни стремятся что-то скрыть, тем больше другие хотят это «что-то» узнать. В те давние времена, когда люди только научились писать, их тайны материализовались, представ в образе символов, иероглифов, букв, цифр. Но в таком виде они стали доступны другим.
  • Добавил: literator
  • Дата: 23-05-2025, 04:50
  • Комментариев: 0
Название: Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape
Автор: Harpreet Singh, Himanshu Sharma
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 41.1 MB

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies. Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise. Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.