Vtome.ru - электронная библиотека

  • Добавил: Chipa
  • Дата: 1-12-2025, 13:35
  • Комментариев: 0

Название: Генеративный ИИ с обучением больших языковых моделей (LLM) для джунов
Автор: Шамим Бхуян, Тимур Исаченко
Издательство: бомбора
Год: 2025
Формат: PDF
Страниц: 322
Размер: 4 Mb
Язык: Русский

Хотите создавать собственные ИИ-приложения, но вас пугает сложность технологий? Эта книга – практический гид для разработчиков, аналитиков данных и энтузиастов, которые только начинают свой путь в машинном обучении. Вы с нуля освоите ключевые концепции: от основ ML и глубокого обучения до архитектуры трансформеров, лежащей в основе современных LLM.

  • Добавил: literator
  • Дата: 1-12-2025, 04:06
  • Комментариев: 0
Название: IPv6 On-Path Telemetry: Driving New Transformation in Network O&M
Автор: Zhenbin Li, Pingan Yang, Tao Han, Tianran Zhou
Издательство: CRC Press
Год: 2026
Страниц: 360
Язык: английский
Формат: pdf (true), epub
Размер: 31.2 MB

Built on Huawei’s pioneering research, this book provides a comprehensive introduction to the architecture, techniques, and deployment of IPv6 on-path telemetry, highlighting the most recent developments in IP network technologies. IPv6 on-path telemetry is a network Operations and Maintenance technology that has emerged alongside the development of IP network services in the 5G and cloud computing era. It has gradually achieved large-scale deployment and application. Starting with the challenges that 5G and cloud computing pose to IP networks and the shortcomings of traditional O&M, the book analyzes the differences between IPv6 on-path telemetry and traditional Operations, Administration, and Maintenance (OAM) technologies. It emphasizes the technical value of IPv6 on-path telemetry from a service perspective in the 5G and cloud era. Then, the book illustrates the technical implementation and deployment of IPv6 on-path telemetry, providing instructions supported by Huawei use cases. This book is intended for network planning engineers, technical support engineers, and network administrators. It will also appeal to researchers, students, and professionals interested in IP network technologies and communication networks.
  • Добавил: literator
  • Дата: 30-11-2025, 15:04
  • Комментариев: 0
Название: AI and ML Techniques in IoT-based Communication: A Path to Sustainable Development Goals
Автор: Sumita Mishra, Nishu Gupta, Polat Goktas
Издательство: Wiley-IEEE Press
Год: 2026
Страниц: 426
Язык: английский
Формат: pdf
Размер: 10.1 MB

An insightful and up-to-date discussion of how to use contemporary IoT and AI technology to advance sustainable development initiatives. In AI and ML Techniques in IoT-based Communication: A Path to Sustainable Development Goals, a team of distinguished editors presents an astute discussion of the importance of connected devices and intelligent algorithms in the generation of innovative solutions to global challenges. The book explains how to exploit the synergy between Internet of Things (IoT) and Artificial Intelligence (AI) technologies to further the United Nations’ Sustainable Development Goals (SDGs). Readers will learn how to enable smarter, data-driven approaches to difficult global problems, including climate change, inadequate health care delivery, and energy inefficiency. Expert contributors explore emerging trends, potential pitfalls, and likely future developments in IoT, AI, and Machine Learning (ML) in sustainable development.
  • Добавил: literator
  • Дата: 30-11-2025, 02:56
  • Комментариев: 0
Название: Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
Автор: Bhavik Shah
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 236
Язык: английский
Формат: epub (true)
Размер: 36.6 MB

Demystifying Network Traces with Wireshark. In today’s digital world, Wireshark stands as the most powerful tool for uncovering what truly happens on a network. Network Forensics with Wireshark will take you through a structured, hands-on journey — from grasping the basics of TCP/IP communication to advanced forensic analysis. Beginning with how data flows across networks, readers will learn to capture and interpret packets, identify anomalies, and analyze encrypted traffic through SSL/TLS decryption. As the book progresses, it dives into detecting malware behavior, tracing covert channel attacks, and understanding how attackers exploit vulnerabilities across evolving network architectures. Each concept is reinforced with practical exercises and real-world case studies, helping readers apply theory to investigation. So, whether you are a student, network engineer, or cybersecurity professional, this book empowers you to analyze smarter, respond faster, and transform data into actionable security insight.
  • Добавил: literator
  • Дата: 29-11-2025, 18:40
  • Комментариев: 0
Название: Digital Immune System: Principles and Practices
Автор: Sujata Priyambada Dash,Vaibhav Mishra, Bijeta Shaw, Sandeep Kumar Panda, S. Balamurugan
Издательство: Wiley-Scrivener
Год: 2026
Страниц: 416
Язык: английский
Формат: epub
Размер: 15.7 MB

Equip yourself with the knowledge to build a resilient digital infrastructure by understanding how the digital immune system leverages advanced technologies to proactively defend against cyber threats. The concept of the digital immune system represents a significant advancement in cybersecurity, reflecting the industry’s shift toward more intelligent and adaptive defense mechanisms. Drawing inspiration from biological immune systems, the digital immune system offers a solution that naturally adapts and responds to evolving threats. This book explores this evolving landscape, focusing on the integration of advanced technologies like artificial intelligence, machine learning, and automation to build resilient digital infrastructures. It delves into how these technologies can create a self-sustaining ecosystem that detects, responds to, and mitigates cyber threats in real-time and highlights the significance of predictive analytics and behavioral analysis in identifying potential threats before they materialize. For research scholars in computer science and AI, IT professionals, network administrators, cybersecurity and blockchain technology experts, engineering students and government research agencies looking to the future of cybersecurity.
  • Добавил: literator
  • Дата: 26-11-2025, 07:07
  • Комментариев: 0
Название: Deep Learning for Intrusion Detection: Techniques and Applications
Автор: Faheem Syeed Masoodi, Alwi Bamhdi
Издательство: Wiley
Год: 2026
Страниц: 333
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Comprehensive resource exploring Deep Learning techniques for intrusion detection in various applications such as cyber physical systems and IoT networks
Deep Learning for Intrusion Detection provides a practical guide to understand the challenges of intrusion detection in various application areas and how deep learning can be applied to address those challenges. It begins by discussing the basic concepts of intrusion detection systems (IDS) and various deep learning techniques such as convolutional neural networks (CNNs), recurrent neural networks (RNNs), and deep belief networks (DBNs). Later chapters cover timely topics including network communication between vehicles and unmanned aerial vehicles. The book closes by discussing security and intrusion issues associated with lightweight IoTs, MQTT networks, and Zero-Day attacks. The book presents real-world examples and case studies to highlight practical applications, along with contributions from leading experts who bring rich experience in both theory and practice.
  • Добавил: literator
  • Дата: 26-11-2025, 06:47
  • Комментариев: 0
Название: MC Microsoft Certified Azure Fundamentals Study Guide: Exam AZ-900, 2nd Edition
Автор: Jim Boyce
Издательство: Sybex
Год: 2026
Страниц: 288
Язык: английский
Формат: epub (true)
Размер: 11.1 MB

The fastest and most effective way to learn the fundamentals of Azure cloud technology and prepare for the AZ-900 certification exam. The newly updated second edition of MC Microsoft Certified Azure Fundamentals Study Guide is an accurate and up-to-date roadmap to the AZ-900 certification exam and a reliable, effective resource for everyone seeking to learn about or reinforce their knowledge of Azure services, pricing, security and compliance, resource management, and more. Ideal for technical and non-technical professionals alike, this straightforward Study Guide draws on the proven Sybex model to explain core Azure features and concepts. It will get you ready to succeed on the widely used AZ-900 certification test and elevate your understanding of Azure cloud software, improving your day-to-day performance in any role that directly or indirectly intersects with the cloud platform.
  • Добавил: literator
  • Дата: 26-11-2025, 06:32
  • Комментариев: 0
Название: Cloud Security: Managing Emerging Threats
Автор: Ankur Chowdhary, Abdulhakim Sabur
Издательство: CRC Press
Год: 2026
Страниц: 276
Язык: английский
Формат: epub (true)
Размер: 11.6 MB

The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment. The incident response life cycle is used to prepare for, identify, contain, and eradicate security threats in the cloud. It discusses how automation and autonomous cyber defense tools based on Artificial Intelligence and Machine Learning and techniques can help resourceconstrained security teams address cloud security at a scale. The book also elaborates upon some helpful case studies on the practical deployment of cloud security solutions, their limitations, and lessons learned based on case-studies experience in cloud security.
  • Добавил: literator
  • Дата: 26-11-2025, 05:02
  • Комментариев: 0
Название: Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)
Автор: Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2026
Страниц: 236
Язык: английский
Формат: pdf (true), epub
Размер: 56.9 MB

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today’s evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises. This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations.
  • Добавил: literator
  • Дата: 25-11-2025, 19:44
  • Комментариев: 0
Название: Design and Deploy Microsoft Azure Sentinel for IoMT: Enhance IoMT Cybersecurity Operations with Intelligent Analytics
Автор: Puthiyavan Udayakumar, Dr. R Anandan
Издательство: Apress
Год: 2025
Страниц: 372
Язык: английский
Формат: pdf (true), epub (true)
Размер: 12.0 MB

Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments. The book guides you to deploy, and optimize Microsoft Sentinel specifically for IoMT environments, guaranteeing the protection of critical medical systems and patient data. The book starts with introducing the fundamental concepts of Sentinel, its role in securing IoMT, and the latest advancements in healthcare cybersecurity. Engineering Microsoft Sentinel for Security Operations explores how security engineers can configure analytics, automate threat response, and optimize Security Operations Center (SOC) workflows to mitigate IoMT-specific threats, such as ransomware attacks on medical devices or unauthorized access to patient records. By the end of this book, you will be equipped to design, implement, and operate a comprehensive security framework for IoMT environments using Microsoft Sentinel. For Azure Administrators, Network & security administrator.