Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 5-06-2025, 19:16
  • Комментариев: 0
Название: Cybersecurity of Industrial Internet of Things (IIoT)
Автор: Atdhe Buja
Издательство: CRC Press
Год: 2026
Страниц: 160
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

While the Industrial Internet of Things (IIoT) continues to redefine industrial infrastructure, the need for thriving Cybersecurity measures has never been more pressing. Cybersecurity of Industrial Internet of Things (IIoT) contends with the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and professionals pursuing to understand and implement effective Cybersecurity solutions. It covers the fundamentals of cyber-physical systems (CPS), Internet of Things (IoT), and IT systems, while handing insights into prevailing and emerging cyber threats targeting industrial environments. This book is thoughtful for cybersecurity professionals working in cyber-physical systems and critical infrastructure domains, including smart cities, aerospace, manufacturing, etc. It is also a valuable resource for Chief Information Officers (CIOs), industrial engineers, and researchers engaged in industrial engineering. Whether you are a practitioner, a professional, or a student casting to upskill, this book provides the essential tools and insights to navigate the emerging perspective of industrial cybersecurity.
  • Добавил: literator
  • Дата: 5-06-2025, 18:31
  • Комментариев: 0
Название: Systematic Security: A CISO's Playbook
Автор: Timur Qader
Издательство: CRC Press
Год: 2026
Страниц: 204
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

In today’s rapidly evolving digital landscape, safeguarding critical data and systems has never been more vital—or more challenging. Systematic Security: A CISO’s Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation. Timur begins with describing the current state of security and the landscape security professionals find themselves in that offer both opportunity and risk. He goes on to systematically address strategic design, operational efficiency, risk-based modeling, and a rapidly growing regulatory landscape. This essential resource provides step-by-step strategies for implementing a comprehensive security framework. Whether you're launching a new security program or transforming an existing one, this book delivers actionable insights on governance, compliance, and advanced security operations. Whether you’re an aspiring CISO, a security professional, or a business leader looking to fortify your organization’s defenses, Systematic Security delivers the strategies and tools to create lasting security excellence.
  • Добавил: Chipa
  • Дата: 5-06-2025, 14:52
  • Комментариев: 0

Название: Создавайте уникальные фотографии с помощью искусственного интеллекта
Автор: Анастасия Мизгир
Издательство: Интернет-издание
Год: 2025
Формат: Docx/jpg
Страниц: много
Размер: 846 Mb
Язык: Русский

Это полный гайд по работе с нейросетями, где ты научишься создавать крутой контент: оживлять фото, генерировать видео, делать профессиональные нейрофотосессии и даже продвигать свои услуги с помощью ИИ.
  • Добавил: gol8425
  • Дата: 4-06-2025, 17:38
  • Комментариев: 0
Название: Надежность компьютерных сетей
Автор: Цвитун А.А., Корнейчук В.И.
Издательство: Корнійчук
Год: 2010
Страниц: 116
Формат: pdf
Размер: 52 мб
Качество: хорошее
Язык: русский

Описана методика расчета локальных и корпоративных компьютерных сетей на основе собранных и обобщенных справочных данных по интенсивности отказов и ремонтопригодности электронных компонент сетей. На конкретных примерах рассмотрены методы повышения надежности компьютерных сетей с математическим анализом их эффективности и целесообразности применения.
  • Добавил: literator
  • Дата: 3-06-2025, 05:22
  • Комментариев: 0
Название: 6G Cyber Security Resilience: Trends and Challenges
Автор: H.L. Gururaj, VinayaKumar Ravi, J. Shreyas, N. Pavithra, R. Sapna
Издательство: Springer
Год: 2025
Страниц: 265
Язык: английский
Формат: pdf (true), epub
Размер: 31.8 MB

This book offers a comprehensive analysis of intersection of significant domains, including information security, 6G technology, and cybersecurity. This reference work addresses gaps in existing literature by providing insights, research findings, and personal evaluations from esteemed scholars in the field. Holographic-type communications (HTC), tactile Internet, connected autonomous vehicles (CAVs), unmanned aerial vehicles (UAVs), autonomous healthcare solutions, manufacturing systems, and virtual/augmented/extended reality (VR/AR/XR), along with other cutting-edge applications, will continue to advance with the advent of 6G. The advent of the 6G era has been ushered in by the rapid advancement of communication technologies, promising unprecedented applications and connectivity. As we venture into this unexplored domain, the criticality of cybersecurity resilience cannot be overstated. This book examines and assesses the emerging trends in 6G technology, with a particular focus on the intricate challenges encountered in the realm of cybersecurity. The primary audience of this book is industrialists, academicians, researchers, and UG/PG students.
  • Добавил: literator
  • Дата: 2-06-2025, 07:53
  • Комментариев: 0
Название: The Cybersecurity Workforce of Tomorrow
Автор: Michael Nizich
Издательство: Emerald Publishing Limited
Год: July 31, 2023
Страниц: 224
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

The field of cybersecurity - the protection of electronic data - offers one of the fastest growing job markets today. As the sector grows in importance there will be a rapidly growing demand for qualified analysts, cryptographers, engineers, architects, managers, and executive leaders. The Cybersecurity Workforce of Tomorrow discusses the current requirements of the cybersecurity worker and analyses the ways in which these roles may change in the future as attacks from hackers, criminals and enemy states become increasingly sophisticated. So what is a malicious cyberattack? A malicious cyberattack, if successful, allows unwanted access to unauthorized actors, resulting in potential loss of information integrity. There are also nonmalicious acts that threaten the confidentiality, integrity, and availability of information within a system. For instance, if access is mistakenly granted to an unauthorized employee outside a project team, any intentional or unintentional change in the data leading to serious implications is counted as a cyber breach. There are different forms of cyberattacks which might cause damage or disrupt the assets.
  • Добавил: magnum
  • Дата: 1-06-2025, 00:41
  • Комментариев: 0
WhatsApp Tricks, Tipps und Guides - Juni 2025Название: WhatsApp Tricks, Tipps und Guides - Juni 2025
Автор: Papercut Limited
Издательство: Papercut Limited
Год выхода: 2025
Страниц: 118
Формат: PDF
Размер: 70,6 MB
Язык: немецкий/Deutsch

WhatsApp Tricks, Tips and Guides is the perfect digital publication for the user that wants to take their skill set to the next level. Do you want to enhance your user experience? Or wish to gain insider knowledge? Do you want to learn directly from experts in their field? Learn the numerous short cuts that the professionals use? Over the pages of the new advanced user guide you will learn everything you will need to know to become a more confident, better skilled and experienced owner. A user that will make the absolute most of their use and ultimately WhatsApp itself. An achievement you can earn by simply enabling us to exclusively help and teach you the abilities we have gained over our decades of experience.
  • Добавил: literator
  • Дата: 31-05-2025, 03:40
  • Комментариев: 0
Название: Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer
Автор: Mike Chapple, Joe Shelley, James Michael Stewart
Издательство: Wiley
Год: 2025
Страниц: 320
Язык: английский
Формат: PDF, True/Retail EPUB, RTF, Mobi
Размер: 10.1 MB

A fast, accurate, and up-to-date desk reference for information security and privacy practitioners everywhere. Information security and privacy roles demand up-to-date knowledge coming from a seemingly countless number of sources, including several certifications—like the CISM, CIPP, and CISSP—legislation and regulations issued by state and national governments, guidance from local and industry organizations, and even international bodies, like the European Union. The Information Security and Privacy Quick Reference: The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer is an updated, convenient, and accurate desk reference for information privacy practitioners who need fast and easy access to the latest guidance, laws, and standards that apply in their field. This book is the most effective resource for information security professionals who need immediate and correct solutions to common and rarely encountered problems. Information Security and Privacy Quick Reference is a must-have resource for CISOs, CSOs, Chief Privacy Officers, and other information security and privacy professionals seeking a reliable, accurate, and fast way to answer the questions they encounter at work every single day.
  • Добавил: literator
  • Дата: 31-05-2025, 01:41
  • Комментариев: 0
Название: CCISO Exam Guide and Security Leadership Essentials: Essential strategies for today's security leaders
Автор: Gopi Thangavel
Издательство: BPB Publications
Год: 2025
Страниц: 480
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you with the skills to navigate the complexities of the modern CISO role. This comprehensive guide delves deep into all five CCISO domains. You will learn to align security with business goals, communicate with boards, and make informed security investment decisions. It also explores operational security, including incident handling, vulnerability assessments, and BCDR planning, with real-world case studies and hands-on exercises. By mastering the content within this book, you will gain the confidence and expertise necessary to excel in the CCISO exam and effectively lead information security initiatives, becoming a highly competent and sought-after cybersecurity professional. This book is tailored for seasoned information security professionals, including security managers, IT directors, and security architects, preparing for CCISO certification and senior leadership roles, seeking to strengthen their strategic security acumen.
  • Добавил: literator
  • Дата: 30-05-2025, 21:36
  • Комментариев: 0
Название: Social Engineering Cookbook: 100 recipes for OSINT, NLP, and digital footprinting in advanced security strategies
Автор: Manish Sharma
Издательство: BPB Publications
Год: 2025
Страниц: 412
Язык: английский
Формат: epub (true)
Размер: 56.3 MB

Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information and to protect yourself from such attacks. In this book, you will learn how to anticipate the moves of social engineers, what tools they use, and how they use the art of deception for personal gain. You will master information gathering with search engines and specialized tools, learn to analyze email trails, and understand the execution of various social engineering attacks. Advanced techniques like micro-expression reading and NLP are explored, alongside real-world case studies to illustrate potential risks. Finally, it examines emerging trends like AI manipulation and ethical applications of these techniques. This Social Engineering Cookbook is for anyone seeking to understand social engineering, from beginners to experienced professionals like security personnel, ethical hackers, and penetration testers, as well as individuals aiming to enhance their security awareness.