Vtome.ru - электронная библиотека

  • Добавил: TRex
  • Дата: 6-02-2020, 16:00
  • Комментариев: 0
Название: Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services
Автор: Silvano Gai
Издательство: Addison-Wesley Professional
Год: 2020
Формат: EPUB
Страниц: 272
Размер: 10 Mb
Язык: English

Prepare for the future of cloud infrastructure: Distributed Services Platforms
By moving service modules closer to applications, Distributed Services (DS) Platforms will future-proof cloud architectures–improving performance, responsiveness, observability, and troubleshooting. Network pioneer Silvano Gai demonstrates DS Platforms’ remarkable capabilities and guides you through implementing them in diverse hardware.
  • Добавил: literator
  • Дата: 5-02-2020, 19:01
  • Комментариев: 0
Название: Intrusion Detection: A Data Mining Approach
Автор: Nandita Sengupta, Jaya Sil
Издательство: Springer
Год: 2020
Страниц: 151
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style.
  • Добавил: literator
  • Дата: 5-02-2020, 18:30
  • Комментариев: 0
Название: Data Science in Cybersecurity and Cyberthreat Intelligence
Автор: Leslie F. Sikos, Kim-Kwang Raymond Choo
Издательство: Springer
Год: 2020
Страниц: 140
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence
  • Добавил: TRex
  • Дата: 5-02-2020, 04:31
  • Комментариев: 0
Название: Adaptive Autonomous Secure Cyber Systems
Автор: Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang , Michael Wellman
Издательство: Springer
Год: 2020
Формат: PDF
Страниц: 291
Размер: 12 Mb
Язык: English

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:
Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;
  • Добавил: harun54
  • Дата: 4-02-2020, 19:26
  • Комментариев: 0
Название: Mobility Internet of Things 2018: Mobility IoT
Автор: Dagmar Cagáňová and Natália Horňáková
Издательство: Springer
Год: 2020
Формат: PDF
Размер: 11 Мб
Язык: английский / English

The scientific monograph Mobility IoT deals with innovative technologies influencing industry and connectivity sectors in the future industrial, urban, social and sustainable development. The mobility and Internet of Things are worldwide phenomena almost in everyday life. It is a challenge in many industries, not only in car manufacturing sector but additionally in e-mobility, smart cities, smart factories (Industry 4.0), smart logistics, social mobility, technological innovations, sustainability, multicultural development, Internet of Things sectors, etc., belonging to the topic of SMART Mobility IoT issue.
  • Добавил: buratino
  • Дата: 3-02-2020, 13:09
  • Комментариев: 0
Название: Applied Incident Response
Автор: Steve Anson
Издательство: Wiley
Год: 2020
Формат: True PDF
Страниц: 464
Размер: 17.5 Mb
Язык: English

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network
  • Добавил: buratino
  • Дата: 3-02-2020, 12:50
  • Комментариев: 0
Название: (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Second Edition
Автор: Ben Malisow
Издательство: Sybex
Год: 2020
Формат: True PDF
Страниц: 400
Размер: 10 Mb
Язык: English

With over 1,000 practice questions, this book gives you the opportunity to test your level of understanding and gauge your readiness for the Certified Cloud Security Professional (CCSP) exam long before the big day. These questions cover 100% of the CCSP exam domains, and include answers with full explanations to help you understand the reasoning and approach for each. Logical organization by domain allows you to practice only the areas you need to bring you up to par, without wasting precious time on topics you’ve already mastered.
  • Добавил: buratino
  • Дата: 3-02-2020, 00:17
  • Комментариев: 0
Название: Cryptography Arithmetic: Algorithms and Hardware Architectures (Advances in Information Security)
Автор: Amos R. Omondi
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 336
Размер: 10 Mb
Язык: English

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it is necessary that the arithmetic be realized at the hardware (chip) level. This book is an introduction to the implementation of cryptosystems at that level.
  • Добавил: Igor1977
  • Дата: 2-02-2020, 13:38
  • Комментариев: 0

Название: Effective Cybersecurity A Guide to Using Best Practices and Standards (2019)
Автор: William Stallings
Издательство: Pearson Education Limited
Год: 2019
Формат: pdf
Страниц: 893
Размер: 17 mb
Язык: Английский

In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action.
  • Добавил: tatanavip
  • Дата: 1-02-2020, 11:16
  • Комментариев: 0

Название: Вся правда о хайпе в социальных сетях
Автор: Андрюша Хайпович, Ксюша Ким
Издательство: Издательские решения
Год: 2019
Формат: pdf, rtf
Размер: 14,8 Мб
Качество: Хорошее
Язык: Русский

Хайп – «назойливая реклама», «возбуждение». В простонародье «хайпить» – поднимать шумиху, создавать ажиотаж вокруг событий, продуктов и людей. Большинство SMM-методов уже устарели: сейчас недостаточно настроить таргетинг и закупить рекламу у блогеров. Появилась необходимость напрягать извилины, включать креативность и самостоятельно создавать ХАЙП.