Vtome.ru - электронная библиотека

  • Добавил: buratino
  • Дата: 22-07-2019, 13:08
  • Комментариев: 0
Название: Docker Management Design Patterns: Swarm Mode on Amazon Web Services
Автор: Deepak Vohra
Издательство: Apress
ISBN: 148422972X
Год: 2017
Страниц: 329
Язык: английский
Формат: True PDF
Размер: 10.3 MB

Master every aspect of orchestrating/managing Docker including creating a Swarm, creating services, using mounts, scheduling, scaling, resource management, rolling updates, load balancing, high availability, logging and monitoring, using multiple zones, and networking. This book also discusses the managed services for Docker Swarm: Docker for AWS and Docker Cloud Swarm mode.
  • Добавил: buratino
  • Дата: 21-07-2019, 10:49
  • Комментариев: 0
Название: Cyber Security Intelligence and Analytics (Advances in Intelligent Systems and Computing)
Автор: Zheng Xu (Editor), Kim-Kwang Raymond Choo (Editor), Ali Dehghantanha (Editor), Reza Parizi (Editor), Mohammad Hammoudeh (Editor)
Издательство: Springer
Год: 2019
Формат: True PDF
Страниц: 1453
Размер: 50 Mb
Язык: English

This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics.
  • Добавил: SCART56
  • Дата: 20-07-2019, 22:27
  • Комментариев: 0

Название: Цифровая экономика, хактивизм и кибербезопасность
Автор(ы): Буряк В.В.
Издательство: Симферополь: ИП Зуева Т.В.
Год: 2019
Страниц: 140
Формат: PDF
Размер: 11 Мб
Язык: русский

В монографии рассматриваются такие актуальные темы, как цифровая экономика, хактивизм, кибервойны и кибербезопасность в условиях информационного общества. Показано, что технонаучный прогресс и информационные технологии в особенности не только ускоряют социально-экономическое развитие человеческой цивилизации, но также инициируют техногенные риски. Увеличение скоростей передачи информации, её доступность и переформатирование ресурсной базы высокотехнологичного потенциала неизбежно ведут к локальным, региональным и глобальным конфликтам, что проявляется в увеличении масштабов киберпреступности и кибервойн.
  • Добавил: buratino
  • Дата: 20-07-2019, 14:06
  • Комментариев: 0
Название: MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
Автор: Jeremy Moskowitz
Издательство: Sybex
Год: 2019
Формат: True PDF
Страниц: 552
Размер: 79.3 Mb
Язык: English

The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz!
With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop—for PCs, tablets, and phones—through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools.
  • Добавил: buratino
  • Дата: 20-07-2019, 09:17
  • Комментариев: 0
Название: Cyber Mercenaries: The State, Hackers, and Power
Автор: Tim Maurer
Издательство: Cambridge University Press
Год: 2018
Формат: True PDF
Страниц: 268
Размер: 11.6 Mb
Язык: English

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation.
  • Добавил: buratino
  • Дата: 19-07-2019, 23:41
  • Комментариев: 0
Название: Handbook of Multimedia Information Security: Techniques and Applications
Автор: Amit Kumar Singh (Editor), Anand Mohan (Editor)
Издательство: Springer
Год: 2019
Формат: True PDF
Страниц: 798
Размер: 22.1 Mb
Язык: English

This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function.
  • Добавил: buratino
  • Дата: 19-07-2019, 23:20
  • Комментариев: 0
Название: Internet of Nano-Things and Wireless Body Area Networks (WBAN)
Автор: Fadi Al-Turjman
Издательство: Auerbach Publications
Год: 2019
Формат: True PDF
Страниц: 255
Размер: 11.1 Mb
Язык: English

The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems.
  • Добавил: literator
  • Дата: 19-07-2019, 18:12
  • Комментариев: 0
Название: Cryptographic Security Solutions for the Internet of Things
Автор: Mohammad Tariq Banday
Издательство: IGI Global
ISBN: 1522557423
Год: 2019
Страниц: 393
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things.
  • Добавил: literator
  • Дата: 18-07-2019, 17:54
  • Комментариев: 0
Название: Smart Cities Performability, Cognition, & Security
Автор: Fadi Al-Turjman
Издательство: Springer
Год: 2019 (2020 Edition)
Страниц: 247
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides knowledge into the intelligence and security areas of smart-city paradigms. It focuses on connected computing devices, mechanical and digital machines, objects, and/or people that are provided with unique identifiers. The authors discuss the ability to transmit data over a wireless network without requiring human-to-human or human-to-computer interaction via secure/intelligent methods. The authors also provide a strong foundation for researchers to advance further in the assessment domain of these topics in the IoT era. The aim of this book is hence to focus on both the design and implementation aspects of the intelligence and security approaches in smart city applications that are enabled and supported by the IoT paradigms.
  • Добавил: literator
  • Дата: 18-07-2019, 17:23
  • Комментариев: 0
Название: Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations
Автор: John Bair
Издательство: Academic Press
Год: 2018
Страниц: 526
Язык: английский
Формат: True PDF
Размер: 13.1 MB

Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. This book is intended for any professional that is interested in pursuing work that involves mobile forensics, and is designed around the outcomes of criminal investigations that involve mobile digital evidence. Author John Bair brings to life the techniques and concepts that can assist those in the private or corporate sector.