Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 10-12-2021, 16:22
  • Комментариев: 0
Security Operations in PracticeНазвание: Security Operations in Practice
Автор: Mike Sheward
Издательство: BCS, The Chartered Institute for IT
Год: 2020
Страниц: 254
Язык: английский
Формат: pdf (true), epub
Размер: 11.3 MB

With this book, my aim has been to explore the most effective ways to perform the various functions of the security operations team, and provide real-world examples that should supplement the theory. Nothing is worse than a textbook that teaches the theoretical best way to achieve something, when there is absolutely no practical way for that to work in reality. Covers building and growing an effective security operations team- both the blue side (defensive) and the red side (simulating attack). Includes the human element of security operations - building trust etc. Contains real-life examples and industry case studies.
  • Добавил: literator
  • Дата: 9-12-2021, 16:48
  • Комментариев: 0
Digitalization of Higher Education using Cloud Computing: Implications, Risk, and ChallengesНазвание: Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges
Автор: S. L. Gupta, Nawal Kishor, Niraj Mishra
Издательство: CRC Press
Серия: Chapman & Hall/ CRC Cloud Computing for Society 5.0
Год: 2022
Страниц: 243
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age.
  • Добавил: literator
  • Дата: 9-12-2021, 15:39
  • Комментариев: 0
Vehicular Communications for Smart Cars: Protocols, Applications and Security ConcernsНазвание: Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
Автор: Niaz Chowdhury, Lewis Mackenzie
Издательство: CRC Press
Год: 2022
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust, and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. A Vehicle to Vehicle (V2V) communication system can offer a wide range of powerful applications to improve the driving experience. The Internet of Things (IoT) is an outstanding evolution that enables communication between numerous devices through sensors, actuators, embedded systems, and various other technologies via the Internet.
  • Добавил: buratino
  • Дата: 9-12-2021, 03:00
  • Комментариев: 0
Название: Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Автор: Gunikhan Sonowal
Издательство: Apress
Год: 2022
Формат: true pdf/epub
Страниц: 230
Размер: 16.8 Mb
Язык: English

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.
  • Добавил: literator
  • Дата: 8-12-2021, 17:05
  • Комментариев: 0
Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2Название: Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2
Автор: Daniel Ventre
Издательство: Wiley, ISTE
Год: 2020
Страниц: 272
Язык: английский
Формат: epub
Размер: 10.2 MB

The aim of the book is to analyse and understand the impacts of Artificial Intelligence (AI) in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of Artificial Intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of Artificial Intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.
  • Добавил: literator
  • Дата: 7-12-2021, 17:40
  • Комментариев: 0
Security and Privacy in the Internet of Things: Architectures, Techniques, and ApplicationsНазвание: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
Автор: Ali Ismail Awad, Jemal Abawajy
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 339
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Provides the authoritative and up-to-date information required for securing IoT architecture and applications. The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
  • Добавил: TRex
  • Дата: 7-12-2021, 06:50
  • Комментариев: 0
Название: Kafka Up and Running for Network DevOps: Set Your Network Data in Motion
Автор: Eric Chou
Издательство: Leanpub
Год: 2021
Формат: ePUB, PDF
Страниц: 153
Размер: 10 Mb
Язык: English

Today's network is about agility, automation, and continuous improvement. In Kafka Up and Running for Network DevOps, we will be on a journey to learn and set up the hugely popular Apache Kafka data messaging system. Kafka is unique in its principle to treat network data as a continuous flow of information that can adapt to the ever-changing business requirements. Whether you need a system to aggregate log messages, collect metrics, or something else, Kafka can be the reliable, highly redundant system you want.
  • Добавил: literator
  • Дата: 6-12-2021, 20:20
  • Комментариев: 0
Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd EditionНазвание: Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition
Автор: Douglas H. Morais
Издательство: Springer
Год: 2022
Страниц: 337
Язык: английский
Формат: pdf (true), epub
Размер: 27.1 MB

This second edition is an update of the first publication. Material in the first edition addressed mainly the key physical layer technologies associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. It also expands upon some of the original material. Finally, to make the book more pedagogically applicable, problems have been added at the end of those chapters where the material lends itself to associated meaningful computational and/or descriptive problems.
  • Добавил: TRex
  • Дата: 6-12-2021, 15:31
  • Комментариев: 0
Название: Stability Analysis of Neural Networks
Автор: Grienggrai Rajchakit, Praveen Agarwal, Sriraman Ramalingam
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 415
Размер: 10 Mb
Язык: English

This book discusses recent research on the stability of various neural networks with constrained signals. It investigates stability problems for delayed dynamical systems where the main purpose of the research is to reduce the conservativeness of the stability criteria. The book mainly focuses on the qualitative stability analysis of continuous-time as well as discrete-time neural networks with delays by presenting the theoretical development and real-life applications in these research areas. The discussed stability concept is in the sense of Lyapunov, and, naturally, the proof method is based on the Lyapunov stability theory. The present book will serve as a guide to enable the reader in pursuing the study of further topics in greater depth and is a valuable reference for young researcher and scientists.
  • Добавил: literator
  • Дата: 6-12-2021, 12:23
  • Комментариев: 0
Cyber Forensics : Examining Emerging and Hybrid TechnologiesНазвание: Cyber Forensics : Examining Emerging and Hybrid Technologies
Автор: Albert J. Marcella
Издательство: CRC Press
Год: 2021
Страниц: 382
Язык: английский
Формат: pdf (true)
Размер: 25.4 MB

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. Written by professionals responsible for routinely performing forensic investigations, presenting legal arguments and evidence in court, along with information security, privacy, and information technology (IT) audit professionals, this book examines the role which cyber forensics plays in such critical business areas as the Internet of Things (IoT); cloud computing; risk mitigation and management; fraud; operational technologies and Supervisory Control and Data Acquisition (SCADA) systems; mobile technologies; and emerging fields, such as unmanned aircraft systems and social network forensics.