Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 28-10-2024, 16:49
  • Комментариев: 0
Название: Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition
Автор: Jeffrey Caruso
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 161
Язык: английский
Формат: True/Retail PDF, True EPUB
Размер: 58.7 MB, 12.4 MB

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physical destruction of the target and the pairing of cognitive with maneuver warfare.
  • Добавил: literator
  • Дата: 28-10-2024, 11:34
  • Комментариев: 0
Название: Quantum Networks: Introduction and Applications
Автор: Ming-Xing Luo
Издательство: Springer
Год: 2024
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides a comprehensive overview of the rapidly advancing research in quantum networks, both in theory and application. While the classical internet has become essential in our daily lives, its communication techniques have limitations, such as vulnerability to interception and eavesdropping. Quantum networks, by transmitting quantum qubits, address these security concerns using the principles of quantum mechanics, such as superposition, no-cloning, and Heisenberg uncertainty. Kimble first proposed the concept of a quantum internet in 2008, envisioning a network that harnesses quantum devices and laws to transmit information. Wehner and colleagues reviewed the steps necessary to achieve a quantum internet in 2018, outlining development stages leading to increasingly powerful applications. While a fully functional quantum internet is still in progress, significant advances have been made through experiments, such as satellite-based quantum key distribution networks and quantum metropolitan area networks. This book aims to provide a unified theoretical framework for students and researchers interested in the quantum Internet, offering insights into topics like network communication theory, secure communication, distributed computation, nonlocality, and quantum configuration. By presenting cutting-edge research and potential applications in the field of quantum information processing, including the quantum Internet, this book stands out as a valuable resource for beginners, undergraduate students, graduate students, and researchers in physics, computer science, and information science. It bridges the gap between theoretical perspectives and practical applications, offering a comprehensive guide to the exciting possibilities of quantum networks.
  • Добавил: Chipa
  • Дата: 27-10-2024, 17:00
  • Комментариев: 1

Название: Тревожный чемоданчик складчика 4
Автор: Webщик
Издательство: Интернет-издание
Год: 2024
Формат: HTML
Страниц: много
Размер: 224 Mb
Язык: Русский

В четвёртом выпуске из серии "Тревожный чемоданчик" мы продолжаем прокачивать безопасность своего цифрового "имущества". Разберем целый спектр областей с которыми мы сталкиваемся каждый день, и наведём в них порядок.

  • Добавил: umkaS
  • Дата: 27-10-2024, 16:30
  • Комментариев: 0
Название: Киберщит. Искусственный интеллект и кибербезопасность
Автор: Менисов А.Б.
Издательство: Ай Пи Ар, EDP Hub (Идипи Хаб)
Год: 2024
Cтраниц: 165
Формат: pdf
Размер: 15 мб
Язык: русский

Ежедневно в мире происходит более 2 тысяч кибератак. Кибербезопасность входит в число отраслей, которым в ближайшие 5 лет прогнозируют невероятный рост. Она обеспечивает защиту компьютерных систем, сетей, программ и данных от киберугроз (хакерских атак, вирусов, вредоносного ПО и др.).
  • Добавил: Chipa
  • Дата: 27-10-2024, 16:07
  • Комментариев: 0

Название: Свободный интернет для всех-всех-всех 2024
Автор: [Webщик]
Издательство: Интернет-издание
Год: 2024
Формат: PDF
Страниц: много
Размер: 19 Mb
Язык: Русский

Блокировки наших любимых сайтов ужесточаются с каждым днём. Руки цензоров уже дотянулись до тех ресурсов, без которых сложно представить современный интернет. Нам хотят навязать чьё-то искажённое видение "правильных" источников контента, якобы защищая нас от т.н. нежелательной информации...

  • Добавил: literator
  • Дата: 27-10-2024, 11:50
  • Комментариев: 0
Название: Principles of Cybersecurity
Автор: Joy Crelin
Издательство: Salem Press/Grey House Publishing, Inc.
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This volume introduces students to the technologies and controls that protect our hardware, software, and data from cyberthreats. With everything from schools to financial accounts to vital infrastructure under threat from various bad actors, technological advances require constant new approaches to keep our businesses running, our sensitive information out of the hands of cybercriminals, and our data safe. The recent shift to remote work has increased vulnerability to cyber disruptions. Although newer tools like Artificial Intelligence (AI) can help with predicting cyberattacks before they occur—something traditional security professionals find challenging—these methods can also be used by hackers to learn about and exploit weaknesses in a system. Students and researchers wishing to gain a solid background in cybersecurity and related fields will find this volume an invaluable resource to developing a deeper and meaningful understanding of this important and evolving topic. Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, cloud services, and other computer and internet-connected technologies from a wide range of cyberattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism. This volume will be an important resource for students at the high school and undergraduate levels, especially those considering careers in cybersecurity.
  • Добавил: literator
  • Дата: 27-10-2024, 01:13
  • Комментариев: 0
Название: Fusion and Integration of Clouds, Edges, and Devices
Автор: Junlong Zhou, Kun Cao, Jin Sun, Keqin Li
Издательство: CRC Press
Год: 2025
Страниц: 228
Язык: английский
Формат: pdf (true), epub
Размер: 31.8 MB

This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions. It aims to present state-of-the-art models and optimization methods for fusing and integrating clouds, edges, and devices. Cloud-edge-end computing provides users with low-latency, high-reliability, and cost-effective services through the fusion and integration of clouds, edges, and devices. As a result, it is now widely used in various application scenarios. The book introduces the background and fundamental concepts of clouds, edges, and devices, and details the evolution, concepts, enabling technologies, architectures, and implementations of cloud-edge-end computing. It also examines different types of cloud-edge-end orchestrated systems and applications and discusses advanced performance modeling approaches, as well as the latest research on offloading and scheduling policies. It also covers resource management methods for optimizing application performance on cloud-edge-end orchestrated systems. The intended readers of this book are researchers, undergraduate and graduate students, and engineers interested in cloud computing, edge computing, and the Internet of Things (IoT). The knowledge of this book will enrich our readers to be at the forefront of cloud-edge-end computing.
  • Добавил: literator
  • Дата: 25-10-2024, 02:57
  • Комментариев: 0
Название: Information Security Incident and Data Breach Management: A Step-by-Step Approach
Автор: John Kyriazoglou
Издательство: Apress
Год: 2024
Страниц: 164
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company’s reputation and brand name. For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong.
  • Добавил: literator
  • Дата: 24-10-2024, 02:16
  • Комментариев: 0
Название: Boardroom Cybersecurity: A Director's Guide to Mastering Cybersecurity Fundamentals
Автор: Dan Weis
Издательство: Apress
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory requirements as they impact your boardroom decisions, and expose the vulnerabilities that leave organizations susceptible to data breaches. But why should cyber security be a top priority for CEOs, directors, and board members? A successful cyber-attack can be catastrophic. Beyond financial losses, data breaches can erode customer trust, damage brand reputation, disrupt critical operations, and even lead to legal ramifications for the board and for directors, such as regulatory fines and lawsuits. This book empowers you to make informed decisions for your organization regarding cyber risk. We will equip you to not only understand the evolving threat landscape and the potential impact of an attack, but also to proactively reduce and mitigate those risks. This knowledge will ensure you fulfill your reporting obligations and demonstrate strong corporate governance in the face of ever-present cyber threats. For boards, directors, and management who have a responsibility over cyber security and ensuring cyber resilience for their organization.
  • Добавил: literator
  • Дата: 23-10-2024, 20:24
  • Комментариев: 0
Название: Плейбук реагирования на инциденты. Утечки данных в Дарквебе
Автор: Лаборатория Касперского
Издательство: Лаборатория Касперского
Серия: Утечки данных в Дарквебе
Год: 2024
Язык: русский
Формат: pdf
Размер: 12.2 MB

Киберпреступники постоянно придумывают новые способы кражи конфиденциальной информации, и сегодня утечка данных – реальная угроза как для крупных, так и для небольших компаний. В последние годы новости о масштабных утечках данных все чаще попадают на первые полосы популярных изданий, серьезно вредя репутации пострадавших компаний. В этой статье мы расскажем, что делать, если данные вашей компании были опубликованы в дарквебе, и как минимизировать последствия таких инцидентов.