Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 26-11-2025, 06:47
  • Комментариев: 0
Название: MC Microsoft Certified Azure Fundamentals Study Guide: Exam AZ-900, 2nd Edition
Автор: Jim Boyce
Издательство: Sybex
Год: 2026
Страниц: 288
Язык: английский
Формат: epub (true)
Размер: 11.1 MB

The fastest and most effective way to learn the fundamentals of Azure cloud technology and prepare for the AZ-900 certification exam. The newly updated second edition of MC Microsoft Certified Azure Fundamentals Study Guide is an accurate and up-to-date roadmap to the AZ-900 certification exam and a reliable, effective resource for everyone seeking to learn about or reinforce their knowledge of Azure services, pricing, security and compliance, resource management, and more. Ideal for technical and non-technical professionals alike, this straightforward Study Guide draws on the proven Sybex model to explain core Azure features and concepts. It will get you ready to succeed on the widely used AZ-900 certification test and elevate your understanding of Azure cloud software, improving your day-to-day performance in any role that directly or indirectly intersects with the cloud platform.
  • Добавил: literator
  • Дата: 26-11-2025, 06:32
  • Комментариев: 0
Название: Cloud Security: Managing Emerging Threats
Автор: Ankur Chowdhary, Abdulhakim Sabur
Издательство: CRC Press
Год: 2026
Страниц: 276
Язык: английский
Формат: epub (true)
Размер: 11.6 MB

The book reviews the zero-trust model that deviates from the traditional definition of trust boundaries and validates all interactions in a cloud environment. The incident response life cycle is used to prepare for, identify, contain, and eradicate security threats in the cloud. It discusses how automation and autonomous cyber defense tools based on Artificial Intelligence and Machine Learning and techniques can help resourceconstrained security teams address cloud security at a scale. The book also elaborates upon some helpful case studies on the practical deployment of cloud security solutions, their limitations, and lessons learned based on case-studies experience in cloud security.
  • Добавил: literator
  • Дата: 26-11-2025, 05:02
  • Комментариев: 0
Название: Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2)
Автор: Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2026
Страниц: 236
Язык: английский
Формат: pdf (true), epub
Размер: 56.9 MB

Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2) offers a hands-on, real-world approach to developing modern cybersecurity skills. This volume builds on foundational concepts to provide readers with practical techniques and toolsets that are essential in today’s evolving threat landscape. Each chapter dives into a critical area of cybersecurity, emphasizing applied learning through real-world scenarios, case studies, and step-by-step exercises. This book begins with an in-depth focus on network security, guiding readers through capturing and analyzing traffic using command-line tools and understanding how attackers exploit unencrypted protocols. It then progresses to more complex attack vectors such as man-in-the-middle attacks, DNS spoofing, and email threats, reinforcing defensive strategies using tools like Wireshark and Tcpdump. The exploration of open-source intelligence (OSINT) offers a comprehensive look at harvesting digital footprints from publicly accessible data, applying techniques and tools such as Shodan, Google Dorking, and reverse image searches for real investigations.
  • Добавил: literator
  • Дата: 25-11-2025, 19:44
  • Комментариев: 0
Название: Design and Deploy Microsoft Azure Sentinel for IoMT: Enhance IoMT Cybersecurity Operations with Intelligent Analytics
Автор: Puthiyavan Udayakumar, Dr. R Anandan
Издательство: Apress
Год: 2025
Страниц: 372
Язык: английский
Формат: pdf (true), epub (true)
Размер: 12.0 MB

Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments. The book guides you to deploy, and optimize Microsoft Sentinel specifically for IoMT environments, guaranteeing the protection of critical medical systems and patient data. The book starts with introducing the fundamental concepts of Sentinel, its role in securing IoMT, and the latest advancements in healthcare cybersecurity. Engineering Microsoft Sentinel for Security Operations explores how security engineers can configure analytics, automate threat response, and optimize Security Operations Center (SOC) workflows to mitigate IoMT-specific threats, such as ransomware attacks on medical devices or unauthorized access to patient records. By the end of this book, you will be equipped to design, implement, and operate a comprehensive security framework for IoMT environments using Microsoft Sentinel. For Azure Administrators, Network & security administrator.
  • Добавил: literator
  • Дата: 25-11-2025, 09:35
  • Комментариев: 0
Название: The Complete AZ-900 Handbook: Straightforward strategies to pass the exam
Автор: Tom Taulli
Издательство: BPB Publications
Год: 2026
Страниц: 234
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Cloud computing is changing the way businesses operate, making it easier for them to launch new services and expand rapidly. Due to this major shift, there is a growing need for professionals who understand how to work with these technologies. This is mainly for Azure, which continues to be one of the biggest cloud platforms worldwide. This book is your practical handbook to passing the AZ-900 certification exam. You will gain a solid understanding of core cloud concepts, along with Azure’s architecture, global infrastructure, and its key services. You will also learn about compute, networking, and storage resources, as well as important management and security frameworks like Zero Trust. Then there is coverage of important topics like governance, compliance, and cost management. The target audience is broad for the AZ-900 exam. It includes IT professionals, business analysts, project managers, sales professionals, and students. The exam is ideal for anyone looking to start a new career, improve cloud computing skills, or understand AWS services.
  • Добавил: literator
  • Дата: 24-11-2025, 21:00
  • Комментариев: 0
Название: AI and ML-Driven Cybersecurity: Industrial IoT and WSN with Python Scripting
Автор: Atdhe Buja
Издательство: CRC Press
Год: 2026
Страниц: 141
Язык: английский
Формат: pdf (true), epub
Размер: 15.9 MB

While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing. This book provides a hands-on, research-driven guide to building, deploying, and understanding Machine Learning models tailored for securing IIoT and WSN environments. Whether you’re a student, researcher, or professional, this book takes you through the full Data Science lifecycle—from data collection and EDA to model development and deployment—with a special focus on real-world attack detection, anomaly analysis, and predictive defense strategies. This book is intended for cybersecurity professionals working in industrial or smart environments, including smart cities, aerospace, manufacturing, etc. It is also a valuable resource for data scientists and ML engineers applying AI to security, industrial engineers, and university students and educators in Computer Science, Data Science, and security. Examples in Python.
  • Добавил: literator
  • Дата: 24-11-2025, 04:52
  • Комментариев: 0
Название: Cloud Security for Beginners: Exploring the foundations
Автор: Sasa Kovacevic
Издательство: BPB Publications
Год: 2025
Страниц: 398
Язык: английский
Формат: pdf
Размер: 29.7 MB

The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud security, from basics to advanced concepts and trends. It covers cloud service and deployment models, security principles like IAM and network security, and best practices for securing infrastructure, including virtual machines, containers, and serverless functions. It encompasses foundational cybersecurity principles, complex networking architectures, application security, and infrastructure design. Advanced topics like DevSecOps, AI security, and platform engineering are explored, along with critical areas such as compliance, auditing, and incident response. This book is for beginners and it will help them understand more about cloud and cloud security. It will also teach the readers to work with others in their organization and to manage the security of their cloud workloads.
  • Добавил: literator
  • Дата: 23-11-2025, 21:22
  • Комментариев: 0
Название: Security and Privacy in 6G Communication Technology
Автор: Parita Jain, Puneet Kumar Aggarwal, Mandeep Singh, Sushil Kumar Singh, Amit Singhal
Издательство: Wiley-Scrivener
Год: 2026
Страниц: 376
Язык: английский
Формат: pdf (true)
Размер: 16.0 MB

Future-proof your knowledge and expertise in telecommunications with this essential guide, which provides a comprehensive analysis of the critical security and privacy challenges in the transition to 6G communication. The advancement from 5G to 6G communication represents a quantum leap in wireless technology, promising unprecedented speeds, ultra-low latency, and ubiquitous connectivity. As the industry embarks on this journey, it encounters a host of technical challenges, particularly in ensuring the security and privacy of data transmitted across these networks. The interconnected nature of 6G systems, combined with the proliferation of Internet of Things devices and the sheer volume of data exchanged, creates a fertile ground for cyber threats and privacy breaches. Through 14 chapters, this book presents in-depth discussions on key security frameworks, advanced cryptographic techniques, privacy-preserving architectures, and future research directions to establish secure and privacy-compliant 6G ecosystems.
  • Добавил: literator
  • Дата: 23-11-2025, 13:03
  • Комментариев: 0
Название: Mastering AWS Cloud: Cloud adoption using the AWS cloud computing ecosystem
Автор: Paulo H. Leocadio
Издательство: BPB Publications
Год: 2026
Страниц: 498
Язык: английский
Формат: epub (true)
Размер: 13.0 MB

Cloud computing has redefined how modern businesses scale, secure, and innovate. Amazon Web Services (AWS) is the world’s leading cloud platform, providing the essential compute, storage, networking, and database power that runs modern applications. It stands as the global leader in cloud platforms, empowering millions of organizations with robust infrastructure, automation, and AI-driven services. This book provides a comprehensive, expert-guided journey through the AWS ecosystem. You will explore core services, advanced networking, infrastructure as code, serverless design, edge computing, and real-world deployment architectures. Each chapter demystifies one vital aspect of AWS mastery, including governance, observability, media streaming, IoT, AI, and global infrastructure best practices. This book is for cloud architects, DevOps engineers, solution designers, IT managers, and technical leads aiming to gain practical mastery of AWS. It also benefits advanced learners, certification candidates, and professionals building real-world, production-ready cloud systems.
  • Добавил: umkaS
  • Дата: 22-11-2025, 10:22
  • Комментариев: 0
Название: Компьютерная безопасность. Криптографические методы защиты
Автор: Петров А.А.
Издательство: Профобразование
Год: 2019
Cтраниц: 445
Формат: pdf
Размер: 54 мб
Язык: русский

В книге рассматриваются актуальные вопросы защиты данных при создании распределенных информационных систем масштаба предприятия, приводятся подробные описания принципов применения современных криптографических средств, имеющихся на рынке («Криптон», «Верба», «Шип», «Игла» и др.). Значительное место уделяется проблемам сохранения тайны при финансовых обменах через Internet, а также электронной коммерции. Завершают книгу приложения, посвященные практическим рекомендациям по самым острым вопросам обеспечения защиты информации.