Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 18-07-2024, 07:46
  • Комментариев: 0
Название: Cybersecurity for Space: A Guide to Foundations and Challenges (2nd Edition)
Автор: Jacob G. Oakley
Издательство: Apress
Год: 2024
Страниц: 299
Язык: английский
Формат: epub
Размер: 10.1 MB

Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will prime the reader with the knowledge needed to understand the unique challenges to space operations which affect the implementation of cybersecurity. Further, the reader will have foundational knowledge on what impacts cyber threats can have on space systems and how cybersecurity must rise to meet them. The author, who spent years in the United States Marine Corps, originally involved in satellite communications is now a seasoned cyber security practitioner who has provided cyber security vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing the final frontier. This book is written for anyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, as well as security practitioners and policy or decision makers who are on the sending or receiving end of such activity.
  • Добавил: literator
  • Дата: 18-07-2024, 02:53
  • Комментариев: 0
Название: Cloud Security: Concepts, Applications and Practices
Автор: Jamuna S. Murthy, Siddesh G.M., Srinivasa K.G.
Издательство: CRC Press
Год: 2025
Страниц: 311
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This comprehensive work surveys the challenges, the best practices in the industry, and the latest developments and technologies. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security, including risk management, threat analysis, data protection, identity and access management, and compliance. Cloud Security explores the latest security technologies, such as encryption, multi‑factor authentication, and intrusion detection and prevention systems, and their roles in securing the cloud environment. Cloud computing has revolutionized the landscape of data sharing, serving as a transformative catalyst in the way organizations collaborate and exchange information. The hallmark of cloud computing is its scalable and on‑demand access to resources, fundamentally altering the traditional paradigms of data sharing. Unlike conventional methods, cloud‑based data sharing goes beyond geographical constraints, opening up avenues for real‑time collaboration and reducing latency. Platforms like Google Cloud and Amazon Web Services (AWS) stand as exemplars, showcasing the unprecedented efficiency gains achievable through cloud‑driven data sharing. This book is aimed at postgraduate students, professionals, and academic researchers working in the fields of Computer Science and cloud computing.
  • Добавил: literator
  • Дата: 18-07-2024, 02:24
  • Комментариев: 0
Название: 5G Networks: An Overview of Architecture, Design, Use Cases and Deployment
Автор: Atahar Khan, Satya Priyo Dhar, Ramakrishnan Shanmugasun­daram
Издательство: River Publishers
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true)
Размер: 16.8 MB

This book provides comprehensive coverage of building an end-to-end view on how to architect, design, and orchestrate a 5G capable network that will integrate with 5G RAN, IP transport, datacenters, Telco Cloud, and 5G packet networks. It contains real-world examples with challenges and success strategies for deploying 5G Transport with closed-loop automation. It also focuses on aspects like scale, performance, latency, security, and manageability while building 5G transport for some of the world's largest 5G networks as well as migration approaches from 4G to 5G transport and core network. 5G is an emerging technology that mobile service providers (MNO/MVNO) across the world are embracing. They are willing to invest in enabling their infrastructure for 5G and explore new business opportunities with their enterprise/mobile customers. As per the Gartner survey, the majority of communication service provider (CSP) revenue will come from 5G. 5G is going to open the door to new applications such as wireless virtual reality, low latency machine-to-machine communication, smart city infrastructure, autonomous vehicles, IoT deployment, artificial intelligence-based applications, industrial automation and so much more. 5G is not merely mobile technology evolution, but the breadth is extended beyond mobile communication to address all forms of communication and its enabling new services and enhancing existing services like enhanced mobile broadband (eMBB), critical communications (CC) and ultra reliable and low latency communications (URLLC), massive Internet of Things (mIoT) and flexible network operations. 5G architecture brings a drastic change from radio network to IP transport and mobile packets core for mobile network operators (MNOs) and mobile virtual network operators (MVNOs).
  • Добавил: literator
  • Дата: 17-07-2024, 17:34
  • Комментариев: 0
Название: Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence
Автор: Rong Su
Издательство: CRC Press
Год: 2025
Страниц: 283
Язык: английский
Формат: pdf (true)
Размер: 26.2 MB

This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.
  • Добавил: gol8425
  • Дата: 17-07-2024, 13:54
  • Комментариев: 0
Название: Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Автор: Robert La Lau
Издательство: Apress
Год: 2021
Формат: true pdf/epub
Страниц: 411
Размер: 10.4 Mb
Язык: English

Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.
  • Добавил: literator
  • Дата: 16-07-2024, 23:57
  • Комментариев: 0
Название: Blockchain for IoT Systems: Concept, Framework and Applications
Автор: V. Sridhar, Sita Rani, Piyush Kumar Pareek, Pankaj Bhambri
Издательство: CRC Press
Год: 2025
Страниц: 271
Язык: английский
Формат: pdf (true)
Размер: 16.3 MB

Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on IoT, Data Science, society, industry, commerce, and government. This book studies the potential impact of Blockchain and distributed-ledger technologies on IoT. It highlights the application of possible solutions in the domain of Blockchain and IoT system security, including cryptology, distributed systems, law, formal methods, code verification and validation, software, and systems metrics. As the field is growing fast, the book adapts to the changing research landscape, integrates and cross-link studies and citations in related subfields, and provides an overview of these fields and how they complement each other. This book is intended for postgraduate students and researchers in the departments of Computer Science, working in the areas of IoT, blockchain, Deep Learning, Machine Learning, image processing and Big Data.
  • Добавил: literator
  • Дата: 16-07-2024, 23:35
  • Комментариев: 0
Название: IoT Fundamentals with a Practical Approach
Автор: Neera Batra, Sonali Goyal
Издательство: CRC Press
Год: 2025
Страниц: 289
Язык: английский
Формат: pdf (true)
Размер: 47.3 MB

"Introduction to IoT" is an insightful book that serves as a comprehensive guide to understanding the foundations and key concepts of the Internet of Things (IoT) technology. The book begins by introducing readers to the concept of IoT, explaining its significance and potential impact on various industries and domains. It covers the underlying principles of IoT, including its architecture, connectivity, and communication protocols, providing readers with a solid understanding of how IoT systems are structured and how devices interact within the IoT ecosystem. This book dives into the crucial components that form the backbone of IoT systems. It explores sensors and actuators, explaining their roles in collecting and transmitting data from the physical environment. The book also covers electronic components used in IoT devices, such as microcontrollers, communication modules, and power management circuits. This comprehensive understanding of the building blocks of IoT allows readers to grasp the technical aspects involved in developing IoT solutions. Overall, "Introduction to IoT" is an indispensable book that offers a comprehensive and practical exploration of the essential principles, components, and challenges of IoT. With its broad coverage and real-world examples, it is an excellent resource for anyone seeking to grasp the fundamentals of this transformative technology.
  • Добавил: literator
  • Дата: 16-07-2024, 05:59
  • Комментариев: 0
Название: CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, 2nd Edition
Автор: Jason Ball
Издательство: Cisco Press/Pearson
Год: 2024
Страниц: 992
Язык: английский
Формат: epub (true)
Размер: 36.8 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE CLCOR 350-801 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, Second Edition, helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Jason Ball shares preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills.
  • Добавил: literator
  • Дата: 16-07-2024, 05:36
  • Комментариев: 0
Название: The Modern Security Operations Center: The People, Process, and Technology for Operating SOC Services (Final)
Автор: Joseph Muniz
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2021
Страниц: 751
Язык: английский
Формат: True/Retail PDF
Размер: 21.6 MB

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services. This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. I believe anybody with an interest in cybersecurity will benefit from this book. I explain concepts using different viewpoints ranging from what leadership expects to those behind the keyboard care about. Topics include building a SOC, risk management, vulnerability management, incident management, analysis of malware, compliance, digital forensics, situational and security awareness, and research and development. All of these topics correspond to services that are provided by mature SOCs around the world. Anybody who is interested in learning how to build these services into their security practice will benefit from this book.
  • Добавил: literator
  • Дата: 14-07-2024, 13:03
  • Комментариев: 0
Название: Fluidware: Novel Approaches for Large-Scale IoT Systems
Автор: Franco Zambonelli, Giancarlo Fortino, Barbara Re, Mirko Viroli
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 208
Язык: английский
Формат: pdf (true), epub
Размер: 17.5 MB

This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project. The authors start by presenting Fluidware, which develops a novel programming model for IoT services and applications, along with the associated and robust large-scale IoT services and applications. Starting from previous findings in the areas of field-based coordination, collective adaptive systems, stream computing and aggregate computing, the authors address the complexity of building modern, large-scale IoT systems, by a full-fledged engineering approach revolving around a new notion of distributed programming. The authors show how the key innovative idea of Fluidware is to abstract collectives of devices of the IoT fabric as sources, digesters, and targets of distributed "flows" of contextualized events, carrying information about data produced and actuating commands. The book is divided into three parts: (i) the first part is a general introduction to the Fluidware ideas and to the key problems associated with programming IoT systems, (ii) the second part presents the key results achieved within the Fluidware project; (iii) the third part identified open challenges and research directions. However, IoT applications and services can be hard to program and deploy. Indeed, services and applications for the IoT may involve composing and coordinating myriads of heterogeneous devices, typically dispersed over an environment. In the above context, the IoT research community worldwide started putting notable investigation efforts toward the identification of novel programming approaches for IoT applications that could make it possible to deal with the above sources of complexity automatically and rather enable programmers to easily program and deploy flexible and adaptive applications, enabling to express in full the potentials of the IoT fabric.