Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 29-06-2024, 08:09
  • Комментариев: 0
Название: Cyberpsychology Can Help Us Understand Cybercrime
Автор: Bradley Fowler, Bruce G. Chaundy
Издательство: Nova Science Publishers, Inc.
Год: 2024
Страниц: 162
Язык: английский
Формат: pdf (true)
Размер: 14.2 MB

Cyberpsychology is a growing central phenomenon that helps us understand human behavior as it correlates with technology. This book provides knowledge about cyberpsychology and its ability to help us understand the mental and emotional motivation behind cybercriminals deployment of cybercrime and cyber-attacks, domestically and internationally. Research in this book examines forty-two countries’ experiences with cyberattacks and explores how cyberpsychology can help us deter cybercriminals from engaging in cybercrime activities. However, to effectively implement methods of deterrence requires understanding the psychology behind those who engage in cyberattack, cyberespionage, cyberwarfare, cyberterrorism, and cybercrime. The introduction of cyberpsychology has created a clear path to understanding the motivation behind many cybercriminals' malicious acts of terror and attack. Although still in its infancy of development, cyberpsychology can enable governments, psychologists, forensic psychologists, and leaders of academia to begin assessing acts of cyberattack through a lens of mental and emotional human behavior to discover the hidden motivation behind cybercriminals malicious cyber incidents. This book provides some insight into the knowledge of cyberpsychology, helping readers comprehend the role cyberpsychology plays in helping thwart and deter successful cyberattacks, cyberwarfare, cyberterrorism, cybercrime, and cyberespionage.
  • Добавил: magnum
  • Дата: 28-06-2024, 23:24
  • Комментариев: 0
Google User Manual - 5th Edition 2024Название: Google User Manual - 5th Edition 2024
Автор: Papercut
Издательство: Papercut Limited
Год: 2024
Страниц: 146
Формат: True PDF
Размер: 50,2 MB
Язык: английский

Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Начав со скромной поисковой системы, Google теперь предоставляет электронную почту с бесплатным онлайн-хранилищем, управление и редактирование фотографий, социальные сети с миллионами пользователей, один из лучших интернет-браузеров, крупнейший в мире видеосайт, ведущую на рынке операционную систему для смартфонов Android, интерактивные карты и навигацию, бесплатную платформу для ведения блогов и многое, многое другое. 100% неофициальное руководство.
  • Добавил: literator
  • Дата: 28-06-2024, 20:31
  • Комментариев: 0
Название: Blockchain: the Chain for the Changing Marketing Sphere
Автор: Amandeep Singh, Sandhir Sharma, Amrinder Singh, Geetika Madaan
Издательство: Nova Science Publishers, Inc.
Год: 2024
Страниц: 162
Язык: английский
Формат: pdf (true)
Размер: 12.0 MB

Marketing has changed a lot in the past decade, but it is about to go through another revolution, thanks in large part to the blockchain. Yes, while most of us associate digital marketing with things like AI and analytics, blockchain may be the most disruptive technology yet to hit marketers in every industry. Blockchain is changing digital marketing, and you may be surprised who will benefit. Blockchain has brought a drastic change to the technology in the last few years and it is referred to as Distributed Ledger Technology (DLT), making the historical backdrop of any computerized resource unalterable and straightforward using decentralization and cryptographic hashing. This book will be useful to all who are involved in using Blockchain technology along with Researchers and policymakers. No doubt, the intermediary of Blockchain technology and its marketers are also be benefited from going through the book. It is assumed that the book will provide proper insights into Blockchain technology to the students and creates a topical interest. Blockchain gained its fame through bitcoin cryptocurrency at the beginning stages. But nowadays blockchain is not only used in digital currencies. It is a decentralized ledger for recording, sharing, and confidential maintenance of transactions that cannot be changed or disrupted. The data are stored digitally in blocks i.e., the customers’ data are stored in digital format, which cannot be altered by any common person.
  • Добавил: literator
  • Дата: 28-06-2024, 04:53
  • Комментариев: 0
Название: Comptia Network+ N10-009 Exam Cram
Автор: Emmett Dulaney
Издательство: Pearson Education
Серия: Exam Cram
Год: 2025
Страниц: 878
Язык: английский
Формат: epub (true)
Размер: 21.3 MB

CompTIA Network+ N10-009 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Network+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review Cram Sheet. The Network+ exam has become the leading introductory-level network certification available today. It is recognized by both employers and industry giants as providing candidates with a solid foundation of networking concepts, terminology, and skills. The Network+ exam covers a broad range of networking concepts to prepare candidates for the technologies they are likely to work with in today’s network environments. Exam Crams are designed to give you the information you need to know to prepare for a certification exam. They cut through the extra information, focusing on the areas you need to get through the exam. With this in mind, the elements within the Exam Cram titles are aimed at providing the exam information you need in the most succinct and accessible manner.
  • Добавил: magnum
  • Дата: 27-06-2024, 23:52
  • Комментариев: 0
Smart Cities: Blockchain, AI, and Advanced ComputingНазвание: Smart Cities: Blockchain, AI, and Advanced Computing
Автор: Bhisham Sharma, Manik Gupta, Gwanggil Jeon
Издательство: CRC Press
Год выхода: 2025
Страниц: 273
Формат: True PDF
Размер: 10,2 MB
Язык: английский

Smart Cities: Blockchain, AI, and Advanced Computing is structured with independent chapters, each highlighting the current and future state-of-the-art technologies addressing smart city challenges. The book covers a variety of application areas, including healthcare, transportation, smart grids, supply chain management, and financial systems.
  • Добавил: literator
  • Дата: 27-06-2024, 17:02
  • Комментариев: 0
Название: The Real Internet Architecture: Past, Present, and Future Evolution
Автор: Pamela Zave, Jennifer Rexford
Издательство: Princeton University Press
Год: 2024
Страниц: 256
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

A new way to understand the architecture of today's Internet, based on an innovative general model of network architecture that is rigorous, realistic, and modular. This book meets the long-standing need for an explanation of how the Internet's architecture has evolved since its creation to support an ever-broader range of the world's communication needs. The authors introduce a new model of network architecture that exploits a powerful form of modularity to provide lucid, insightful descriptions of complex structures, functions, and behaviors in today's Internet. Countering the idea that the Internet's architecture is "ossified" or rigid, this model—which is presented through hundreds of examples rather than mathematical notation—encompasses the Internet's original or "classic" architecture, its current architecture, and its possible future architectures. For practitioners, the book offers a precise and realistic approach to comparing design alternatives and guiding the ongoing evolution of their applications, technologies, and security practices. For educators and students, the book presents patterns that recur in many variations and in many places in the Internet ecosystem. Each pattern tells a compelling story, with a common problem to be solved and a range of solutions for solving it. For researchers, the book suggests many directions for future research that exploit modularity to simplify, optimize, and verify network implementations without loss of functionality or flexibility. We expect this book to be interesting to anyone involved with today’s computer networks, regardless of whether they are engineers (network designers and operators), academics (faculty and graduate students), researchers, or product developers. The book is not an introductory text, however, and readers will get the most out of this book if they have the kind of general knowledge taught in an undergraduate networking course.
  • Добавил: literator
  • Дата: 27-06-2024, 09:37
  • Комментариев: 0
Название: Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition (Final)
Автор: Amanda Berlin, Lee Brotherston, William F. Reyor III
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 417
Язык: английский
Формат: epub
Размер: 10.1 MB

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs. This book is designed to serve as a Security 101 handbook that is applicable to as many environments as possible, in order to drive maximum improvement in your security posture for the minimum financial spend. Types of positions that will be able to take away knowledge and actionable data from this include upper-level chief information officers (CIOs), directors, security analysts, systems administrators, and other technological roles.
  • Добавил: Igor1977
  • Дата: 27-06-2024, 09:25
  • Комментариев: 0

Название: Основы проектирования и моделирования вычислительных сетей
Автор: Тарасов В.Н., Бахарева Н.Ф.
Издательство: Москва, Вологда: Инфра-Инженерия
Год: 2023
Формат: pdf
Страниц: 212
Размер: 21 mb
Язык: русский

Представлены общие сведения об известных программных продуктах, используемых в предметной области, вероятностно-временные характеристики передачи на базе непрерывных марковских моделей, основные результаты теории массового обслуживания, принципы создания имитационных моделей на основе дискретно-событийного моделирования и принципы топологического проектирования сетей. Приводятся примеры, демонстрирующие возможности применения рассмотренных методов моделирования.
  • Добавил: literator
  • Дата: 27-06-2024, 02:56
  • Комментариев: 0
Название: Security Officers and Supervisors: 150 Things You Should Know
Автор: Lawrence J. Fennelly, Marianna A. Perry
Издательство: CRC Press
Год: 2025
Страниц: 396
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Security Officers and Supervisors: 150 Things You Should Know presents an array of relevant topics, including addressing “Tips of the Trade” in how to manage a team of professionals and serve as an effective supervisor. This includes both keeping management informed of decisions, aligning policy, procedure, and training with business objectives, and hiring and managing a team of professionals to maintain continuity of operations and a safe, secure environment. There are many factors involved in managing a department and workforce and the book uses a handy-reference format to present the salient information, both concrete knowledge as well as the softer skills, required for managers to motivate individuals and lead teams to pull in the same direction. Short, easy-to-read chapters include lists of relevant definitions, some do’s and don’ts, best practices, emerging trends, and well as example case studies based upon the authors’ professional experience. The primary goal is to provide a foundation for readers to identify, comprehend, and apply management concepts and security principles in their own environments so that readers will be readily prepared to troubleshoot problems and overcome challenges.
  • Добавил: literator
  • Дата: 27-06-2024, 02:28
  • Комментариев: 0
Название: Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems, Third Edition
Автор: Eric D. Knapp
Издательство: Syngress/Elsevier
Год: 2024
Страниц: 518
Язык: английский
Формат: epub (true)
Размер: 48.6 MB

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. Authors Eric Knapp and Joel Langill examine the unique protocols and applications that are the foundation of Industrial Control Systems (ICS), and provide clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Formal education is offered by many universities as well as organizations such as the Cybersecurity and Infrastructure Security Agency (CISA), the International Information System Security Certification Consortium (ISC2), the SANS Technology Institute, and others. At the same time, for many readers coming from backgrounds in both industrial control (“OT”) and information technology (“IT”), the idea of industrial cyber security will be entirely new. One thing that has definitely changed: it is no longer optional to ignore the subject of securing industrial automation and process control environments from the ever rising threat of a cyberattack.