Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 17-06-2023, 05:32
  • Комментариев: 0
The Complete Internet Security Manual - 18th Edition 2023Название: The Complete Internet Security Manual - 18th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 196
Язык: английский
Формат: pdf
Размер: 121.8 MB

Viruses, malware, ransomware, phishing, smishing, vishing, social engineering... the list of digital threats with peculiar names expands daily and hardly a moment goes by without some form of attack appearing in the news. We live in interesting times, where data is worth more than oil or gold and your personal information is greatly sought after by cybercriminals, scammers and hackers. How prepared are you for this new age of digital vandalism and theft? Is your Windows computer secure against the continual onslaught of the modern online world? We'll help you secure your computer, network and devices against such threats and with easy to follow tutorials, help arm you against potential threats and attacks. For parents and guardians, we also cover looking out for your children when online, together with guides on how best to protect them and advice from industry experts. You'll soon be security savvy and prepared for whatever digital threat looms on the horizon.

  • Добавил: literator
  • Дата: 17-06-2023, 03:21
  • Комментариев: 0
IoT and Analytics in Renewable Energy Systems (Volume 1) Sustainable Smart Grids & Renewable Energy SystemsНазвание: IoT and Analytics in Renewable Energy Systems (Volume 1): Sustainable Smart Grids & Renewable Energy Systems
Автор: O.V. Gnana Swathika, K. Karthikeyan
Издательство: CRC Press
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true)
Размер: 21.4 MB

Smart grid technologies include sensing and measurement technologies, advanced components aided with communications and control methods along with improved interfaces and decision support systems. Smart grid techniques support the extensive inclusion of clean renewable generation in power systems. Smart grid use also promotes energy saving in power systems. Cyber security objectives for the smart grid are availability, integrity and confidentiality. Nowadays we get to see the rapid expansion of technologies with the influence of Internet of Things (IoT) and Smart Grid (SG). So, whatever IoT devices we are using with some sort of protocols and parameters, we should be able to manage and know the measures and estimation of power consumption, interoperability, price forecasting, etc.

  • Добавил: literator
  • Дата: 16-06-2023, 21:34
  • Комментариев: 0
IoT and Analytics in Renewable Energy Systems (Volume 2)Название: IoT and Analytics in Renewable Energy Systems (Volume 2): AI, ML and IoT Deployment in
Sustainable Smart Cities
Автор: O.V. Gnana Swathika, K. Karthikeyan
Издательство: CRC Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true)
Размер: 29.6 MB

Smart cities emanate from a smart renewable-energy-aided power grid. The smart grid technologies offer an array of benefits like reliability, availability, and resiliency. Smart grids phenomenally contribute to facilitating cities reaching those sustainability goals over time. Digital technologies, such as the Internet of Things (IoT), automation, Artificial Intelligence (AI) and Machine Learning (ML) significantly contribute to the two-way communication between utilities and customers in smart cities.

  • Добавил: polyanskiy
  • Дата: 16-06-2023, 20:50
  • Комментариев: 0

Автор: И. И. Блох
Название: Основные понятия теории информации
Издательство: Ленинград
Год: 1959
Страниц: 29
Формат: DJVU, PDF
Размер: 11 МБ

Введение. Что такое информация. Общая схема передачи сообщении. Как измерить информацию. Информация сложных событий. Каналы связи и их пропускная способность. Кодирование. Переработка, передача и использование информации. Теория информации в биологии. Применение теории информации к языкознанию. Заключение
  • Добавил: literator
  • Дата: 16-06-2023, 20:08
  • Комментариев: 0
Azure Security (MEAP v10)Название: Azure Security (MEAP v10)
Автор: Bojan Magusic
Издательство: Manning Publications
Год: 2023
Страниц: 458
Язык: английский
Формат: pdf, epub
Размер: 22.4 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud.

  • Добавил: literator
  • Дата: 14-06-2023, 04:52
  • Комментариев: 0
Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive GuideНазвание: Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide
Автор: Alexander Kott
Издательство: Springer
Серия: Advances in Information Security
Год: 2023
Страниц: 468
Язык: английский
Формат: pdf (true), epub
Размер: 37.1 MB

This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. This book is based on the premise that the future of cyber-defense and cyber resilience will depend largely on autonomous, Artificially Intelligent (AI) agents. Such an agent will reside on a system that includes one or more computing devices and be responsible for defending the system from cyber compromises. If a compromise occurs, the agent will then be responsible for response and recovery of the system, usually autonomously. To refer to such a class of agents, we use the term Autonomous Intelligent Cyber-defense Agent (AICA). In this book, we explore how AICA will be designed and how it will operate.

  • Добавил: literator
  • Дата: 13-06-2023, 21:58
  • Комментариев: 0
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd EditionНазвание: Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd Edition
Автор: Ryan Leirvik
Издательство: Apress
Год: 2023
Страниц: 222
Язык: английский
Формат: pdf, epub
Размер: 12.8 MB

When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available―many with sound advice, management approaches, and technical solutions―but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization. This second edition provides tools and methods in a straight-forward, practical manner to guide the management of a cybersecurity program.

  • Добавил: literator
  • Дата: 13-06-2023, 17:53
  • Комментариев: 0
Advanced Wireless Communication and Sensor Networks: Applications and SimulationsНазвание: Advanced Wireless Communication and Sensor Networks: Applications and Simulations
Автор: Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victoria Barbosa
Издательство: CRC Press
Год: 2023
Страниц: 355
Язык: английский
Формат: pdf (true)
Размер: 35.7 MB

This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Wireless communication is one of the dominant communication systems in the current era. It has permeated into every sphere of our modern day-to-day activities and the industrial sector. There are certain benefits of using wireless communications. The notable merits include cost, mobility, ease of installation, reliability, and disaster recovery. Meanwhile, new paradigm shifts have also revolutionized wireless communication. Some adaptations such as Bluetooth, Wi-Fi 802.11, WiMax 802.16 need mention here. Brimming with a multitude of merits, these standards have improved wireless communications systems to a great extent.

  • Добавил: literator
  • Дата: 13-06-2023, 07:26
  • Комментариев: 0
Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processesНазвание: Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processes for an ethical hacker
Автор: Sharon Ferrone
Издательство: BPB Publications
Год: 2022
Страниц: 571
Язык: английский
Формат: pdf, epub
Размер: 33.97 MB

In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company's people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you'll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting. This book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them. It also includes obtaining open-source intelligence to develop a dangerous environment for your potential customer. You'll learn how to install and employ offensive tactics used by skilled hackers as you go. Before eventually launching assaults against systems in an industrial network, you'll learn about industrial equipment, port, and service discovery, pivoting, and much more.

  • Добавил: literator
  • Дата: 13-06-2023, 05:23
  • Комментариев: 0
Social Engineering Attack: Rethinking Responsibilities and SolutionsНазвание: Social Engineering Attack: Rethinking Responsibilities and Solutions
Автор: Gunikhan Sonowal
Издательство: Nova Science Publishers
Год: 2023
Страниц: 284
Язык: английский
Формат: pdf (true)
Размер: 28.2 MB

The social engineering attack is presented in the first chapter of the book. It covers the definition, background, motives, and outcome of the social engineering attack. The life cycle of a social engineering attack is covered in the second chapter of the book. Attack formulation, information collecting, preparation, cultivating relationships, exploitation, and debriefing are the six phrases used by social engineering attackers throughout the life cycle. The basic concepts of social engineering attacks are covered in the third chapter of the book. The six principles of social engineering include scarcity, commitment, authority, social proof, reciprocity, social proof, and social proof. Various forms of social engineering attacks are discussed in the fourth chapter of the book. The physical method, social approach, reverse social engineering approach, technical approach, and socio-technical approach are the five main forms of social engineering attacks. Identity theft is discussed in five of the book's chapters. The purpose of the information that attackers stole from users is explained in this chapter. Social engineering tools are covered in the book's six chapters.