Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: Сегодня, 05:28
  • Комментариев: 0
Название: Ultimate Guide to CGRC Certification: Prepare for CGRC with domain insights and test strategies
Автор: Arun Kumar Chaudhary
Издательство: BPB Publications
Год: 2025
Страниц: 528
Язык: английский
Формат: pdf, epub (true)
Размер: 12.6 MB

In today's interconnected world, organizations face increasing challenges in managing the complex landscape of information security, risk, and compliance. This book provides a practical framework for navigating these challenges, enabling professionals to establish and maintain robust systems that protect sensitive data, adhere to regulatory requirements, and mitigate potential threats. This book covers the core domains of CGRC, beginning with foundational security principles, governance structures, and risk assessment, including standards like NIST RMF and SP 800-53. This book offers a comprehensive analysis of GRC fundamentals such as risk management, internal controls, compliance, corporate governance, control selection, implementation, and enhancement, and addressing frameworks like CIS Benchmarks and privacy regulations, including GDPR and PDPA. The book also contains sample questions, case studies, and real-world examples to show the application of GRC concepts in different organizational settings. Security professionals can make various pathways with regulatory requirements, compliance standards, sectors of industry, and managed environments. This guide is designed for both beginners and experienced risk professionals, including GRC managers, security analysts, cybersecurity auditors, and compliance officers.
  • Добавил: literator
  • Дата: Сегодня, 04:17
  • Комментариев: 0
Название: Cyber Risk Management in Practice: A Guide to Real-World Solutions
Автор: Carlos Morales
Издательство: CRC Press
Год: 2026
Страниц: 361
Язык: английский
Формат: pdf (true), epub (true)
Размер: 34.1 MB

Cyber Risk Management in Practice: A Guide to Real-World Solutions is your companion in the ever-changing landscape of cybersecurity. Whether you're expanding your knowledge or looking to sharpen your existing skills, this book demystifies the complexities of cyber risk management, offering clear, actionable strategies to enhance your organization's security posture. With a focus on real-world solutions, this guide balances practical application with foundational knowledge. A ‘risk’ in the cyber world refers to the potential for experiencing harm or loss because of a threat exploiting a vulnerability in our systems or processes. It’s vital that everyone understands a risk is not just any problem; it’s a specific issue that arises from the intersection of a threat with a vulnerability. To have a risk, we must find the three key components of risk: Threat, Vulnerability, and Impact.
  • Добавил: literator
  • Дата: Вчера, 22:12
  • Комментариев: 0
Название: Managing the Cyber Risk: A CISO's practical guide to threat and vulnerability management
Автор: Saurabh Mudgal
Издательство: BPB Publications
Год: 2025
Страниц: 502
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a journey through the evolving threat landscape, dissecting attacker motivations and methods, and recognizing modern dangers like AI-driven attacks and cloud vulnerabilities. You will learn to quantify the real-world cost of cybercrime, providing a clear justification for robust security measures. The book guides you through building a powerful vulnerability management program, covering asset discovery, scanning techniques (including penetration testing and threat intelligence integration), in-depth risk analysis using CVSS, and effective prioritization and remediation strategies. Finally, it teaches advanced techniques like continuous threat detection and response, deception technologies for proactive threat hunting, integrating security into development pipelines with DevSecOps, and understanding future trends shaping cybersecurity. This book is for cybersecurity professionals, including managers and architects, IT managers, system administrators, security analysts, and CISOs seeking a comprehensive understanding of threat and vulnerability management.
  • Добавил: literator
  • Дата: 3-07-2025, 03:44
  • Комментариев: 0
Название: Fostering Machine Learning and IoT for Blockchain Technology: Smart Cities Applications, Volume 2
Автор: Khaleel Ahmad, Uma N. Dulhare, Mohammad Sufian Badar, Jameel Ahamed, M.A. Rizvi
Издательство: Springer
Серия: Transactions on Computer Systems and Networks
Год: 2025
Страниц: 311
Язык: английский
Формат: pdf (true), epub
Размер: 52.1 MB

The book covers Blockchain Technology and its emerging field by developing socio-economic systems viz. efficiently establishing transparency, trust, increasing utilization of various resources, and reducing costs. This book is organized into 2 volumes that provide an overview of Blockchain technology foundations of Blockchain, Machine Learning and Distributed Systems, Cryptography, Consensus algorithm, Bitcoin concepts, and its properties, Smart Contracts, developing knowledge of tools like Hyperledger, Multichain, Ethereum, etc. Machine Learning algorithms, applications of a smart city using Machine Learning and blockchain technology. While this book dwells on the foundations of Blockchain Technology as a part of transparency, scalability, integrity, security, and how the Machine Learning algorithms integrate with blockchain technology-based smart city applications, it will also focus on contemporary topics for Research and Development in various sectors. With an in-depth knowledge of the technology underlying various platforms such as Bitcoin, Ethereum, and Hyperledger.
  • Добавил: literator
  • Дата: 2-07-2025, 20:51
  • Комментариев: 0
Название: CompTIA Network+ Certification Guide (Exam N10-009): Unleash your full potential as a network administrator - 2nd Edition
Автор: Eithne Hogan
Издательство: BPB Publications
Год: 2025
Страниц: 740
Язык: английский
Формат: epub (true)
Размер: 29.1 MB

Network administrators are crucial in safeguarding data through cybersecurity, optimizing cloud resources, and ensuring secure remote connections, vital for maintaining seamless IT infrastructures. CompTIA Network+ Certification has become the industry standard for validating essential networking skills, making it crucial for IT professionals seeking to establish or advance their careers in network administration. Beginning with networking fundamentals including OSI models, TCP/IP protocols, and Wireshark analysis, it progresses through network topologies, cable installation, IP addressing, and subnetting practices. The second edition includes new content reflecting changes in the exam, such as evolving use cases for modern networks, important factors of physical installations, and additional details on implementing IPv4 and IPv6 network services. The content incorporates an acute awareness of security in network operations. Upon completing this guide, you will possess comprehensive Network+ knowledge and practical skills necessary to confidently pass the N10-009 exam and immediately contribute as a competent network administrator in any enterprise environment. This book is designed for individuals who aspire to pursue a rewarding career in network administration.
  • Добавил: literator
  • Дата: 2-07-2025, 19:38
  • Комментариев: 0
Название: Mastering Mobile Network and Related Security: Protecting telecom networks in a connected world
Автор: Tiju Johnson
Издательство: BPB Publications
Год: 2025
Страниц: 732
Язык: английский
Формат: epub (true)
Размер: 18.2 MB

In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, this book delivers a thorough examination of vulnerabilities, attack vectors, and defense strategies that every telecom professional must understand. This book systematically covers the entire mobile security spectrum. Whether you are a security specialist seeking telecom-specific expertise, an engineer responsible for secure network design, an executive making strategic security investments or a student preparing for a career in telecommunications, this book provides the knowledge you need to protect critical telecom infrastructure. This book is intended for security professionals, telecom engineers, executives, and students looking to understand the security landscape of modern telecommunications networks.
  • Добавил: literator
  • Дата: 2-07-2025, 08:02
  • Комментариев: 0
Название: Google Cloud Associate Cloud Engineer Certification Guide: A comprehensive guide to implementing, managing, and monitoring Google Cloud solutions
Автор: Arijit Sarkar
Издательство: BPB Publications
Год: 2025
Страниц: 378
Язык: английский
Формат: epub (true)
Размер: 26.6 MB

With the emergence of cloud computing, organizations are moving their workloads to the public cloud to reduce the capital expenditure towards on-premises IT infrastructure. Google Cloud Platform is one of the major public cloud platforms. Hence, learning about it in depth is crucial for anyone aiming to excel in the cloud computing landscape. This book systematically explores GCP, starting with cloud fundamentals and an overview of GCP services, followed by the ACE exam scope. You will gain practical skills in the console, Cloud Shell, billing, APIs, and IAM, and explore storage (GCS) and databases (Cloud SQL, Spanner). You will master compute through VMs, Cloud Run, GKE, App Engine, Cloud Functions, learn networking with VPC, firewall rules, load balancing, DNS, CDN, and NAT, and discover Big Data, AI/ML, deployment, and monitoring. You will understand the application lifecycle and ACE exam specifics with practice simulations. This book is for IT professionals familiar with on-premises infrastructure or those new to public cloud, including system administrators, developers, and cloud enthusiasts.
  • Добавил: literator
  • Дата: 30-06-2025, 20:25
  • Комментариев: 0
Название: Applying Blockchain Technology: Concepts and Trends
Автор: Javaid Iqbal, Alwi Bamhdi, Bilal Ahmad Pandow, Faheem Syeed Masoodi
Издательство: CRC Press
Год: 2025
Страниц: 288
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

Blockchain technology has the potential to revolutionize the way to conduct transactions and share information. It is having a significant impact on a wide range of industries. Applying Blockchain Technology: Concepts and Trends is an in-depth guide exploring the world of blockchain technology. Beginning with an introduction to concepts related to blockchain and its application, the book delves into the benefits and challenges of using blockchain in various industries, including healthcare, finance, real estate, voting, and supply chain management. It discusses potential ethical considerations associated with blockchain technology and how to design and implement blockchain solutions ethically. The book covers practical applications of blockchain in different industries, as well as its potential for use with IoT, smart grids, and cloud computing. Moreover, the book provides an in-depth discussion on the implications of blockchain on the financial system, as well as the potential of blockchain to disrupt the traditional ways of conducting business. The practical examples and case studies in the book are suitable for students, professionals, and researchers interested in learning about the latest trends in blockchain technology.
  • Добавил: tatanavip
  • Дата: 30-06-2025, 16:32
  • Комментариев: 0

Название: Преступная сеть. Как хакинг вышел на мировой уровень: от вирусов до вмешательства в выборы
Автор: Джефф Уайт
Издательство: АСТ
Год: 2025
Формат: pdf, epub
Размер: 10 Мб
Качество: Хорошее
Язык: Русский

В этой книге журналист-расследователь Джефф Уайт рассказывает об удивительном развитии хакерства: от его зарождения в сообществе американских хиппи-технологов и «детства» среди руин Восточного блока до становления грозной и по-настоящему опасной индустрии. Уайт знакомит нас с реальными киберпреступлениями, с людьми, которые стоят за самыми громкими делами, и показывает, как тактика, используемая «высокотехнологичными» мошенниками, чтобы заработать миллионы, перенимается государствами, чтобы влиять на избирателей, выводить из строя электросети и даже готовиться к кибервойне.
  • Добавил: literator
  • Дата: 25-06-2025, 20:11
  • Комментариев: 0
Название: Mastering Network Flow Traffic Analysis: Implementing and analyzing flow data across network topologies for threat detection
Автор: Gilberto Persico
Издательство: BPB Publications
Год: 2025
Страниц: 330
Язык: английский
Формат: pdf, epub (true)
Размер: 13.1 MB

The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security. Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. This book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.