Vtome.ru - электронная библиотека

  • Добавил: umkaS
  • Дата: 3-09-2023, 08:00
  • Комментариев: 0
Название: Кибероружие и кибербезопасность. О сложных вещах простыми словами
Автор: Белоус А.И., Солодуха В.А.
Издательство: Инфра-Инженерия
Год: 2020
Cтраниц: 692, цвет.ил.
Формат: pdf
Размер: 155 мб
Язык: русский

Книга по широте охвата проблемы, новизне и практической значимости является фактически энциклопедией по кибербезопасности. Здесь вы найдете многочисленные примеры применения информационных атак, а также наиболее эффективные методы защиты от их воздействия. В доступной форме изложены теоретические основы информационной безопасности и базовые технологии защиты информации.
  • Добавил: literator
  • Дата: 3-09-2023, 04:46
  • Комментариев: 0
Название: Cisco Certified Support Technician CCST Networking 100-150 Official Cert Guide
Автор: Russ White
Издательство: Cisco Press/Pearson Education
Год: 2024
Страниц: 845
Язык: английский
Формат: epub
Размер: 44.4 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCST Networking 100-150 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, Cisco Certified Support Technician Networking 100-150 Official Cert Guide helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Leading Cisco technology expert and best-selling author Russ White shares preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills. The Cisco Certified Support Technician (CCST) Networking certification is designed to be a first step into network engineering. The test is designed to validate an individual’s skills and knowledge of computer network operation, as well as basic configuration and troubleshooting. The CCST is also a first step toward the CCNA certification, which can then lead into various expert-level certifications like the CCIE and CCDE.
  • Добавил: umkaS
  • Дата: 2-09-2023, 08:45
  • Комментариев: 0
Название: Основы кибербезопасности : стандарты, концепции, методы и средства обеспечения
Автор: Белоус А. И. , Солодуха В. А.
Издательство: Техносфера
Год: 2021
Cтраниц: 482 с. : схем., ил., табл.
Формат: pdf
Размер: 43 мб
Язык: русский

Эта книга фактически представляет собой научно-практическую энциклопедию по современной кибербезопасности. Здесь анализируются предпосылки, история, методы и особенности киберпреступности, кибертерроризма, киберразведки и киберконтрразведки, этапы развития кибероружия, теория и практика его применения, технологическая платформа кибероружия (вирусы, программные и аппаратные трояны), методы защиты (антивирусные программы, проактивная антивирусная защита, кибериммунные операционные системы).
  • Добавил: literator
  • Дата: 1-09-2023, 03:53
  • Комментариев: 0
Название: Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Автор: Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki
Издательство: CRC Press
Серия: Artifcial Intelligence (AI): Elementary to Advanced Practices
Год: 2024
Страниц: 508
Язык: английский
Формат: pdf (true)
Размер: 15.2 MB

The fast-growing number of patients suffering from various ailments has overstretched the carrying capacity of traditional healthcare systems. Often, it becomes challenging to get reliable, accurate, effcient, and adequate medical results using conventional methods of healthcare delivery. In order to address this problem, the Internet of Medical Things (IoMT) was proposed. IoMT accelerates the remote monitoring of medical services and aids early detection of any medical problem in patients. Recently, Artifcial Intelligence (AI) application to medical data analysis has remarkably facilitated the treating and diagnosing of critical health issues. Integrating Artifcial Intelligence into the Internet of Medical Things has given birth to Artifcial Intelligence of Medical Things (AIoMT). AIoMT has ushered a dramatic change in the medical feld to orchestrate rapid diagnosis, treatment, and management of health issues suffered by a growing number of patients worldwide. Also, the book explores the application of cryptographic and noncryptographic solutions to addressing critical security and privacy concerns in AIoMT devices and systems.
  • Добавил: literator
  • Дата: 31-08-2023, 00:33
  • Комментариев: 0
Название: Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy
Автор: Kevin Lynn McLaughlin
Издательство: CRC Press
Год: 2024
Страниц: 137
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and cybersecurity Threat Intelligence Center (TIC). In this book, Dr. McLaughlin, who is a well-respected cybersecurity expert, provides a comprehensive guide to the critical importance of having an SOFC and the various options available to organizations to either build one from scratch or purchase a ready-made solution. The author takes the reader through the crucial steps of designing an SOFC model, offering expert advice on selecting the right partner, allocating resources, and building a strong and effective team. The book also provides an in-depth exploration of the design and implementation of the SOFC infrastructure and toolset, including the use of virtual tools, the physical security of the SOFC, and the impact of COVID-19 on remote workforce operations. A bit of gamification is described in the book as a way to motivate and maintain teams of high-performing and well-trained cybersecurity professionals.
  • Добавил: literator
  • Дата: 30-08-2023, 19:28
  • Комментариев: 0
Название: Beginning AWS Security: Build Secure, Effective, and Efficient AWS Architecture
Автор: Tasha Penwell
Издательство: Apress
Год: 2023
Страниц: 150
Язык: английский
Формат: pdf , epub
Размер: 16.4 MB

Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You’ll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization’s needs. You’ll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization’s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures.
  • Добавил: literator
  • Дата: 30-08-2023, 18:46
  • Комментариев: 0
Название: Hands-On Ethical Hacking and Network Defense, 4th Edition
Автор: Michael T. Simpson, Nicholas D. Antill, Robert S. Wilson
Издательство: Cengage Learning
Год: 2022
Страниц: 386
Язык: английский
Формат: pdf (true)
Размер: 25.3 MB

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.
  • Добавил: literator
  • Дата: 30-08-2023, 03:44
  • Комментариев: 0
Название: Home Networking Tricks and Tips 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Язык: английский
Формат: pdf
Размер: 34.6 MB

"Home Networking Tricks and Tips" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Вы хотите повысить свой пользовательский опыт? Или хотите получить новые знания? Хотите учиться непосредственно у экспертов в своей области? Узнать о многочисленных приемах, которыми пользуются профессионалы? На страницах нового руководства для продвинутых пользователей вы узнаете все, что необходимо знать, чтобы стать более уверенным в себе, более квалифицированным и опытным владельцем. Пользователем, который будет получать максимальную отдачу от своего устройства и, в конечном счете, от всего "умного дома". Это достижение вы можете заслужить, просто позволив нам оказать вам эксклюзивную помощь и обучить вас тем навыкам, которые мы приобрели за десятилетия нашего опыта.
  • Добавил: literator
  • Дата: 28-08-2023, 18:47
  • Комментариев: 0
Название: Wireless Networks: Cyber Security Threats and Countermeasures
Автор: Hamid Jahankhani, Ayman El Hajjar
Издательство: Springer
Год: 2023
Страниц: 352
Язык: английский
Формат: pdf (true)
Размер: 10.5 MB

In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things (IoT) and Internet of Everything (IoE) communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicious use of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security.
  • Добавил: literator
  • Дата: 28-08-2023, 17:34
  • Комментариев: 0
Название: Blockchain Technology for Secure Social Media Computing
Автор: Robin Singh Bhadoria, Neetesh Saxena, Bharti Nagpal
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 265
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Blockchain is a digital ledger of transactions duplicated and distributed across an entire network of computer systems on the blockchain which makes it more difficult to hack or tamper with. The popularity of blockchain has been increasing with the growth of social media and the Internet of Things (IoT). Social media are interactive digitally mediated technologies that facilitate the creation or sharing and exchange of information, ideas, opinions and interests via virtual communities and social network platforms. However, unmonitored social accounts can be the target of hackers who post fraudulent messages or virus-infected links that spread to contacts and followers, and "employee weakness" is responsible for 20% of cyberattacks in companies. So, it has become essential to secure both personal and professional social media networks, accounts and data. Blockchain Technology for Secure Social Media Computing covers recent advances, trends and future opportunities in the security framework of social media-computing. The contributors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with blockchain technology.