Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 24-01-2024, 04:34
  • Комментариев: 0
Название: Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
Автор: Bob Chaput
Издательство: Apress
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf
Размер: 37.1 MB

This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities. ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy.
  • Добавил: literator
  • Дата: 23-01-2024, 10:49
  • Комментариев: 0
Название: Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
Автор: Roger A. Grimes, Dr. John N. Just
Издательство: Wiley
Год: 2024
Страниц: 450
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks. Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. This book is for anyone interested in fighting social engineering and phishing attacks—from entire organizations to single individuals, from dedicated anti-phishing employees to IT managers, and for any IT security practitioner.
  • Добавил: literator
  • Дата: 22-01-2024, 23:13
  • Комментариев: 0
Название: 5G Non-Terrestrial Networks: Technologies, Standards, and System Design
Автор: Alessandro Vanelli-Coralli, Nicolas Chuberre, Gino Masini
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true), epub
Размер: 21.4 MB

Provides a complete and detailed description of the non-terrestrial component in the 5G ecosystem. 5G Non-Terrestrial Networksis the first multi-authored reference dedicated to the integration of non-terrestrial networks (NTN) into the 5G ecosystem. Written by leaders in the development of the 3GPP 5G NTN specification, this authoritative resource addresses all key aspects of non-terrestrial components of 5G systems, including standardization, architecture, protocols, and regulatory considerations. Drawing from their expertise in academic and industrial research and development, the authors introduce fundamental principles of non-terrestrial communications, define the NTN architecture and radio protocol stacks, describe applications to support mobility and radio resource management, and more. The book covers 5G New Radio-based technology for NTN as well as LTE NB-IoT/eMTC, providing a well-rounded understanding of the unique characteristics of 5G-NTN systems. Throughout the text, the authors offer insights on various design approaches, technical choices, and trade-off options. This book aims at providing an overview of this 3GPP-defined “NTN” standard. Aimed at easing the inclusion of NTN elements in the 5G ecosystem, the work was conducted within the 3GPP starting with the identification of the technical challenges and potential solutions to support New Radio (NR) protocols and features over satellite links.
  • Добавил: literator
  • Дата: 22-01-2024, 14:32
  • Комментариев: 0
Название: Azure Security (Final Release)
Автор: Bojan Magušić
Издательство: Manning Publications
Год: 2024
Страниц: 336
Язык: английский
Формат: epub
Размер: 15.1 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Attacks against cloud-based applications are increasingly common and sophisticated. It’s vital for any developer or resource owner to understand how to properly configure their Azure cloud environments and establish reliable security best practices. The Azure platform comes with dozens of built-in security tools to help keep your systems safe. This book will teach you exactly how to set them up for maximum effectiveness. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you’ve learned.
  • Добавил: literator
  • Дата: 21-01-2024, 19:41
  • Комментариев: 0
Название: Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique
Автор: Tarun Vashishth
Издательство: BPB Publications
Год: 2024
Страниц: 414
Язык: английский
Формат: epub (true)
Размер: 25.3 MB

Learn using Cloud data technologies for improving data analytics and decision-making capabilities for your organization. Digital forensics is the art and science of extracting the hidden truth and this book is your hands-on companion, bringing the world of digital forensics to life. Starting with the core principles of digital forensics, the book explores the significance of various case types, the interconnectedness of the field with cybersecurity, and the ever-expanding digital world's challenges. As you progress, you will explore data acquisition, image formats, digital evidence preservation, file carving, metadata extraction, and the practical use of essential forensic tools like HxD, The Sleuth Kit, Autopsy, Volatility, and PowerForensics. The book offers step-by-step instructions, real-world case studies, and practical examples, ensuring that beginners can confidently set up and use forensic tools. Experienced professionals, on the other hand, will find advanced insights into memory analysis, network forensics, anti-forensic techniques, and more. This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails. Digital forensics analysts may be called upon to investigate crimes committed using a computer or other digital device. It could include hacking, identity theft, data exfiltration, sabotage, etc.
  • Добавил: literator
  • Дата: 20-01-2024, 21:12
  • Комментариев: 0
Название: Guide to Computer Network Security (6th Edition)
Автор: Joseph Migga Kizza
Издательство: Springer
Серия: Texts in Computer Science
Год: 2024
Страниц: 654
Язык: английский
Формат: pdf (true), epub
Размер: 27.7 MB

In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing Artificial Intelligence (AI) models across all computing security systems spheres, blockchain technology, and the Metaverse, leading toward security systems virtualizations. This guide is a comprehensive volume touching not only on every major topic in computing and information security and assurance realms, but also has gone beyond the security of computer networks as we used to know them, to embrace new and more agile and Artificial Intelligence boosted mobile systems, new online social networks and virtual platforms that are interweaving into our everyday fabric, if not already and creating an ever-growing ecosystem of intelligent digital and associated social networks. We bring into our ongoing discussion on computer network security, a broader view of the new ever-growing ecosystem of fixed, wireless, mobile, and virtual and online social networks.
  • Добавил: literator
  • Дата: 19-01-2024, 20:07
  • Комментариев: 0
Название: Trivergence: Accelerating Innovation with AI, Blockchain, and the Internet of Things
Автор: Bob Tapscott
Издательство: Wiley
Год: 2024
Страниц: 256
Язык: английский
Формат: pdf, epub (true), mobi
Размер: 10.1 MB

A Breakthrough Introduction to The Next Phase of the Digital Age. In Trivergence, Bob Tapscott, writer, speaker, complex system designer, and former CIO introduces an exciting new concept in explaining how the intersection of Artificial Intelligence (AI), Blockchain, and the Internet of Things (IoT) will transform business and society. He explains the synergies between these technologies and the disruptive potential that they will offer, as well as the challenges and risks to making it happen. He offers an insightful guide through the difficult decisions that businesses and society must make to thrive in a new era where decisions will be difficult, and uncertainties abound. You'll discover how and why AI's power is now exploding, its growth driven by smarter approaches to neural networks trained on a new hardware architecture that can derive its intelligence from ever more massive datasets. AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that had previously required human cognitive functions. From recognizing patterns in vast datasets to making recommendations for decision-making, AI is transforming industries such as healthcare, finance, and manufacturing. AI-powered virtual assistants, self-driving cars, and personalized content recommendations are just a glimpse of its potential. The significance of AI lies in its ability to automate complex tasks, enhance efficiency, and uncover insights hidden within data. Recent advances in Deep Learning have expanded beyond focusing on analyzing complex data sets to make predictions to generate entirely new content in data, text, speech, and image.
  • Добавил: literator
  • Дата: 17-01-2024, 23:14
  • Комментариев: 0
Название: Forensic Radio Survey Techniques for Cell Site Analysis, 2nd Edition
Автор: Joseph Hoy
Издательство: Wiley
Год: 2024
Страниц: 411
Язык: английский
Формат: pdf (true), epub
Размер: 37.0 MB

Overview of the end-to-end process of planning, undertaking, and reporting of forensic radio surveying to support cell site analysis. The newly updated and revised Second Edition of Forensic Radio Survey Techniques for Cell Site Analysis provides an overview of the end-to-end process of planning, undertaking, and reporting of forensic radio surveying to support the forensic discipline of cell site analysis. It starts by recapping and explaining, in an accessible way, the theory, structure, and operation of cellular communications networks, then moves on to describe the techniques and devices employed to undertake forensic radio surveys. Worked examples are used throughout to demonstrate the practical steps required to plan and undertake forensic radio surveys, including the methods used to analyze radio survey data and compile it into a court report. A summary section condenses the technical and practical elements of the book into a handy reference resource for busy practitioners. The Second Edition contains 25% brand new material covering 5G New Radio networks and '6G and beyond,' critical communications, mobile satellite communications, IoT networks, Cell Site Analysis Tools, and much more.
  • Добавил: literator
  • Дата: 17-01-2024, 07:19
  • Комментариев: 0
Название: Online Security For Beginners - 17th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 100
Язык: английский
Формат: pdf
Размер: 50.3 MB

Online Security For Beginners is your first choice as Internet security is a hot topic in this modern, digital age. With hackers gaining access to our valuable data, scams that rob us of our money, and children being targeted by individuals, we need to protect ourselves online. This book will help you understand the dangers of the internet, and how best to stop them happening to you and your children.
  • Добавил: umkaS
  • Дата: 13-01-2024, 14:05
  • Комментариев: 0
Название: Криптографические методы защиты информации
Автор: Б.Я. Рябко, А.Н. Фионов
Издательство: М.: Горячая Линия - Телеком
Год: 2012
Страниц: 230
Формат: pdf/djvu
Размер: 12 мб
Язык: русский

Изложены основные подходы и методы современной криптографии для решения задач, возникающих при обработке, хранении и передаче информации. Основное внимание уделено новым направлениям криптографии, связанным с обеспечением конфиденциальности взаимодействий пользователей компьютеров и компьютерных сетей.