Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 10-12-2023, 21:44
  • Комментариев: 0
Название: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies (Early Release)
Автор: Omar Santos, Samer Salam, Hazim Dahir
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2023
Страниц: 261
Язык: английский
Формат: epub
Размер: 10.1 MB

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify security measures, generate predictive analytics in real time, and so much more. In this comprehensive guide, Cisco professionals Omar Santos, Samer Salam, and Hazim Dahir engage you in both AI application and theory through practical case studies and predictions of future trends, which makes this book not just a valuable guide for today, but an indispensable resource for tomorrow. You’ll discover how AI is building robust bridges in collaboration tools and turning IoT into a super-intelligent network of devices so you can quickly identify and resolve network security threats while enhancing network performance. This book will show you how AI can help you modernize and fortify your operations and make yourself a key asset to your company.
  • Добавил: literator
  • Дата: 10-12-2023, 21:01
  • Комментариев: 0
Название: Intelligent Surfaces Empowered 6G Wireless Network
Автор: Qingqing Wu, Trung Q. Duong, Derrick Wing Kwan Ng, Robert Schober
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 365
Язык: английский
Формат: pdf (true)
Размер: 11.4 MB

Integrate intelligent surfaces into the wireless networks of the future. The next generation of wireless technology (6G) promises to transform wireless communication and human interconnectivity like never before. Intelligent surface, which adopts significant numbers of small reflective surfaces to reconfigure wireless connections and improve network performance, has recently been recognized as a critical component for enabling future 6G. The next phase of wireless technology demands engineers and researchers are familiar with this technology and are able to cope with the challenges. Intelligent Surfaces Empowered 6G Wireless Network provides a thorough overview of intelligent surface technologies and their applications in wireless networks and 6G. It includes an introduction to the fundamentals of intelligent surfaces, before moving to more advanced content for engineers who understand them and look to apply them in the 6G realm. Its detailed discussion of the challenges and opportunities posed by intelligent surfaces empowered wireless networks makes it the first work of its kind. Intelligent Surfaces Empowered 6G Wireless Network is a must for students, researchers, and working engineers looking to understand this vital aspect of the coming 6G revolution.
  • Добавил: literator
  • Дата: 9-12-2023, 19:05
  • Комментариев: 0
Название: Autonomous Driving Network: Network Architecture in the Era of Autonomy
Автор: Wenshuan Dang, River Huang, Yijun Yu
Издательство: CRC Press
Год: 2024
Страниц: 400
Язык: английский
Формат: pdf (true)
Размер: 25.3 MB

Aiming to outline the vision of realizing automated and intelligent communication networks in the era of intelligence, this book describes the development history, application scenarios, theories, architectures, and key technologies of Huawei's Autonomous Driving Network (ADN) solution. In the book, the authors explain the design of the top-level architecture, hierarchical architecture (ANE, NetGraph, and AI Native NE), and key feature architecture (distributed AI and endogenous security) that underpin Huawei's ADN solution. The book delves into various key technologies, including trustworthy AI, distributed AI, digital twin, network simulation, digitization of knowledge and expertise, human-machine symbiosis, NE endogenous intelligence, and endogenous security. It also provides an overview of the standards and level evaluation methods defined by industry and standards organizations, and uses Huawei's ADN solution as an example to illustrate how to implement AN. Autonomous Networks (AN), a product of the mutual development between network and digital technologies, has become an indispensable capability for future networks. It will help coordinate network devices and management systems, improve network intelligence, enable intelligent services, and promote transformation toward digital, automated, and intelligent infrastructure.
  • Добавил: literator
  • Дата: 9-12-2023, 17:10
  • Комментариев: 0
Название: Хакерство. Физические атаки с использованием хакерских устройств
Автор: Андрей Жуков
Издательство: БХВ-Петербург
Год: 2023
Страниц: 306
Язык: русский
Формат: pdf
Размер: 38.6 MB

Книга посвящена физическим атакам на беспроводные сети и компьютеры с использованием самодельных хакерских устройств и защите от них. Показан способ дампа памяти компьютера при помощи обычной флешки, метод перехвата сетевого трафика посредством зажимов-«крокодилов». Подробно освещены различные атаки BadUSB, продемонстрирован метод организации несанкционированного доступа к компьютеру при помощи 4G-модема и подключения к локальной сети через хакерское устройство на базе одноплатного компьютера. Описаны атаки на беспроводные сети и уличные IP-камеры с помощью самодельного устройства Wi-Fi Pineapple. Продемонстрирован способ атаки на сеть и устройства с использованием дрона, оборудованного одноплатным компьютером. Описана конструкция защищенного от помех квадрокоптера с управлением по мобильной сотовой сети. Рассказано о том, как превратить обычный мобильный телефон в «трекер» или хакерское устройство, позволяющее управлять гаражными воротами или шлагбаумами. Для пентестеров и специалистов по информационной безопасности.
  • Добавил: literator
  • Дата: 9-12-2023, 06:49
  • Комментариев: 0
Название: CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-003), 3rd Edition
Автор: Mya Heath, Bobby E. Rogers, Brent Chapman
Издательство: McGraw Hill
Год: 2024
Страниц: 560
Язык: английский
Формат: epub (true)
Размер: 17.4 MB

Prepare for the CompTIA CySA+ certification exam using this fully updated self-study resource. Take the current version of the challenging CompTIA CySA+ certification exam with confidence using the detailed information contained in this up-to-date integrated study system. Based on proven pedagogy, the book contains detailed explanations, real-world examples, step-by-step exercises, and exam-focused special elements that teach and reinforce practical skills. CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Third Edition (Exam CS0-003) covers 100% of 2023 exam objectives and features re-structured content and new topics. Online content enables you to test yourself with full-length, timed practice exams or create customized quizzes by chapter or exam domain. Designed to help you pass the exam with ease, this comprehensive guide also serves as an essential on-the-job reference. In our discussion of network analysis tools, it’s important to start with BPF (Berkeley Packet Filter). BPF is a critical low-level filtering technology that forms the backbone of various network analysis tools, including Wireshark, TShark, and tcpdump. By delving into BPF first, we can establish a solid understanding of its capabilities and inner workings. This knowledge will serve as a foundation for our subsequent discussions on tcpdump and Wireshark.
  • Добавил: literator
  • Дата: 9-12-2023, 06:14
  • Комментариев: 0
Название: Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner
Автор: Seth James Nielson
Издательство: Apress
Год: 2023
Страниц: 447
Язык: английский
Формат: pdf (true), epub
Размер: 27.7 MB

The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission. This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives. For professionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
  • Добавил: umkaS
  • Дата: 9-12-2023, 01:54
  • Комментариев: 0
Название: Основы современной криптографии и стеганографии
Автор: Рябко Б.Я., Фионов А.Н.
Издательство: Горячая линия-Телеком
Год: 2010
Cтраниц: 220
Формат: pdf
Размер: 11 мб
Язык: русский

В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации. Рассмотрены основные шифры с открытыми ключами, методы цифровой подписи, основные криптографические протоколы, блоковые и потоковые шифры, криптографические хешфункции, а также редко встречающиеся в литературе вопросы о конструкции доказуемо невскрываемых криптосистем и криптографии на эллиптических кривых.
  • Добавил: literator
  • Дата: 8-12-2023, 19:39
  • Комментариев: 0
Название: AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach
Автор: Syed Rehan
Издательство: Apress
Год: 2024
Страниц: 355
Язык: английский
Формат: pdf
Размер: 15.2 MB

In an era where the fusion of connectivity and technology is redefining industries, this book is a must-have guide for aspiring technologists and seasoned professionals alike. This meticulously crafted handbook guides you through every aspect of AWS IoT, touching upon vital spheres such as edge computing, machine learning, and industrial IoT, with a distinct spotlight on cybersecurity. Over the course of this book, industry veteran Syed Rehad unveils the secrets to setting up your AWS IoT environment and walks you through advanced concepts such as leveraging MQTT, mastering Digital Twin implementation, and plumbing the depths of edge machine learning. Whether you're experimenting with virtual devices or hands-on with Raspberry Pi setups, this book will steer you towards innovation and a transformative journey where technology meets intelligence and security, all under the expansive umbrella of AWS IoT. For IoT developers and enthusiasts, professionals who want to implement IoT solutions in industrial scenarios, system architects and designers interested in edge machine learning, business intelligence analysts, and cybersecurity professionals.
  • Добавил: literator
  • Дата: 7-12-2023, 22:46
  • Комментариев: 0
Название: Cloud and Edge Networking
Автор: Kamel Haddadou, Guy Pujolle
Издательство: Wiley-ISTE
Год: 2023
Страниц: 303
Язык: английский
Формат: pdf (true)
Размер: 56.4 MB

A major transformation in the world of networks is underway, as the focus shifts from physical technology to software-based solutions. In this book, the authors present this new generation of networks that are based in the Cloud by detailing the transition from a complex environment to a simple digital infrastructure. This infrastructure brings together connected devices, the antennas that collect radio waves, the optical fibers that carry signals and the data center that handles all of the different processes. From this perspective, the data center becomes the brain, managing network services, controls, automation, intelligence, security and other applications. This architecture is relevant to carrier networks, the Internet of Things, enterprise networks and the global networks of the major Internet companies. Cloud Networking is revolutionizing the field of networks by proposing a complete paradigm shift. The Cloud imposes a completely different vision of the Internet with centralized controls and a virtualization of all the functions necessary to the life of a network, the latter consisting of the replacement of hardware equipment by software equipment which runs in the Cloud. As a result, physical networks are replaced by logical networks that run in data centers that are more or less remote from the network nodes themselves.
  • Добавил: literator
  • Дата: 7-12-2023, 05:40
  • Комментариев: 0
Название: Enhancing IoT Security: A holistic approach to security for connected platforms
Автор: Vidushi Sharma, Gamini Joshi
Издательство: BPB Publications
Год: 2024
Страниц: 748
Язык: английский
Формат: epub (true)
Размер: 31.8 MB

Everything you need to know to secure your IoT devices. The Internet of Things (IoT) is a rapidly growing network of physical devices that are connected to the internet and can collect and exchange data. It can potentially revolutionize many industries but also raises serious security concerns. This book provides a holistic overview of the security challenges and requirements of IoT. It starts by introducing the fundamentals of IoT security, such as the different types of threats and vulnerabilities. It then discusses the security lifecycle of IoT devices, from design and deployment to operation and maintenance. This book also covers a variety of security technologies and techniques that can be used to protect IoT devices, such as encryption, authentication, and access control. In addition to the technical aspects of IoT security, this book discusses the legal and regulatory landscape that governs IoT devices. Lastly, it focuses on the ethical implications of IoT security, such as the need to protect user privacy. By the end of this book, you will have a thorough understanding of the security challenges and requirements of the IoT. The book is designed for engineering students and researchers who are studying IoT security in graduate and postgraduate courses such as computer science, information technology, electronics and communication, networking applications, and electrical and electronics.