Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 11-04-2025, 19:15
  • Комментариев: 0
Название: Cybersecurity for Everyone: A Human-Centered Approach to Protecting Yourself and Your Community
Автор: Cathy Olieslaeger
Издательство: Apress
Год: 2025
Страниц: 200
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

In a world where cyber threats are growing exponentially in number and complexity, it’s time to ask the tough question: What are we doing wrong? We’ve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap in the cybersecurity industry remains a persistent challenge. It’s time to break the cycle. This book takes a bold, fresh look at cybersecurity by shifting the focus away from the technical jargon and putting the spotlight on the people who matter most—you. Whether you’re a student, a professional, a parent, or a business leader, this book is designed to help you understand cybersecurity’s role in everyday life and how you can make a difference. From the classroom to the boardroom, there’s a shared responsibility in keeping our digital world safe. Unlike traditional cybersecurity books filled with complex terminology and tech-heavy concepts, this book humanizes the topic. It provides practical, real-world solutions for protecting yourself, your family, your workplace, and your community. You’ll learn not just the how but also the why—why cybersecurity matters and why it's a people-first issue that concerns all of us, regardless of our background or profession.
  • Добавил: gol8425
  • Дата: 11-04-2025, 17:16
  • Комментариев: 0
Название: Как быстро найти нужную информацию в Интернете
Автор: Рощин Сергей
Издательство: Пресс
Год: 2010
Формат: pdf
ISBN: 978-5-94074-610-2
Размер: 11,12 мб
Качество: хорошее
Язык: русский

В книге изложены сведения об информационных ресурсах Интернета - глобальной компьютерной информационной сети, объединяющей сотни миллиардов документов.
  • Добавил: literator
  • Дата: 11-04-2025, 06:37
  • Комментариев: 0
Название: Quantum Communication and Quantum Internet Applications
Автор: Daniel Minoli, Benedict Occhiogrosso
Издательство: CRC Press
Год: 2025
Страниц: 399
Язык: английский
Формат: epub (true)
Размер: 58.0 MB

Quantum computing, particularly in conjunction with a high level of interconnectivity facilitated by quantum connectivity, can facilitate a host of new, previously unattainable applications―these include blind quantum computation, (information) teleporting, clock synchronization, quantum key distribution, secure access to remote quantum computers, superdense coding, secure identification, quantum-secure encryption, distributed sensors, and other scientific and commercial applications, including new drug development. Quantum Communication and Quantum Internet Applications is a basic introduction to quantum computing and presents the emerging foundations of quantum communications and applications. Written for telecommunications professionals, the book explains basic principles of quantum mechanics and strives to make quantum science accessible with a minimal mathematical investment. This book is a point of departure into the application of quantum computing and mechanics to communications.
  • Добавил: literator
  • Дата: 10-04-2025, 22:28
  • Комментариев: 0
Название: The Confluence of Cryptography, Blockchain and Artificial Intelligence
Автор: Ankita, Nayancy, Rajat Verma
Издательство: CRC Press
Год: 2025
Страниц: 272
Язык: английский
Формат: epub (true)
Размер: 10.5 MB

With blockchain underpinning cryptocurrencies and improving IoT security, this book uncovers the evolution of blockchain (1.0 to 4.0) and its applications. It also introduces AI, discussing its development, paradigms, and industry-wide impact. The book explores the integration of cryptography, blockchain, and Artificial Intelligence (AI) in areas such as big data, bioinformatics, IoT, 5G, and Industry 4.0. It highlights how these technologies drive the digital revolution, enabling multi-agent systems, autonomous models, and enhanced security. This book explores the integration of Cryptography, Blockchain, and Artificial Intelligence (AI) in areas like Big Data, bioinformatics, IoT, 5G, and Industry 4.0.
  • Добавил: literator
  • Дата: 10-04-2025, 03:48
  • Комментариев: 0
Название: Reliability Engineering in the Cloud: Strategies and Practices for AI-Powered Cloud-Based Systems (Final Release)
Автор: Mariya Breyter, Carlos Rojas
Издательство: Pearson/Addison-Wesley Professional
Год: 2025
Страниц: 272
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Deliver Resilient, Scalable, and Fault-Tolerant Cloud Services with AI, Lean, and Reliability Engineering. The success of your business hinges on the resilience of your cloud infrastructure. System failures and downtime can devastate your bottom line, erode customer trust, and undermine your competitive edge. Reliability Engineering in the Cloud: Strategies and Practices for Resilient Cloud-Based Systems is your essential guide to creating robust, fault-tolerant cloud systems that deliver seamless performance, no matter the challenge. Packed with actionable strategies and expert insights, this book empowers you to design, build, and maintain cloud infrastructure that supports your business goals. Whether you're a software engineer, DevOps professional, or business/engineering leader, this book equips you with the tools and knowledge to create highly available, fault-tolerant cloud systems that consistently exceed user expectations. Start your journey to cloud resilience today and transform your systems into a competitive advantage.
  • Добавил: literator
  • Дата: 9-04-2025, 17:39
  • Комментариев: 0
Название: The Cybersecurity Control Playbook: From Fundamentals to Advanced Strategies
Автор: Jason Edwards
Издательство: Wiley
Год: 2025
Страниц: 544
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Implement effective cybersecurity measures for all organizations. Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers a step-by-step guide for implementing cybersecurity controls that will protect businesses and prepare them to compete in an overwhelmingly networked landscape. With balanced coverage of both foundational and advanced topics, and concrete examples throughout, this is a must-own resource for professionals looking to keep their businesses safe and secure. Cybersecurity controls comprise a comprehensive set of processes, policies, tools, and techniques to safeguard information systems, data, and digital infrastructure from risks and malicious activities. By implementing these controls, organizations aim to ensure their digital assets' Confidentiality, Integrity, and Availability—collectively known as the CIA triad. In today's interconnected world, where cyber threats are as pervasive as the air we breathe, understanding and deploying these controls is beneficial and essential.
  • Добавил: literator
  • Дата: 8-04-2025, 18:37
  • Комментариев: 0
Название: The Comprehensive Guide to Cybersecurity’s Most Infamous Hacks: 70 Case Studies of Cyberattacks
Автор: Jason Edwards
Издательство: J. Ross Publishing
Год: 2025
Страниц: 320
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Understanding the evolving nature of cybersecurity threats has never been more important in a world increasingly reliant on digital technology. The Comprehensive Guide to Cybersecurity's Most Infamous Hacks offers readers a guided journey through the history of cyberattacks, examining key incidents that have defined and shaped modern cybersecurity. This book dissects major cyber events and their impact, from early hacking exploits like the Phreaking era to sophisticated breaches affecting corporations and governments. Each chapter is dedicated to a specific type of cyberattack, highlighting notorious breaches, malware outbreaks, and nation-state operations. These case studies are paired with a “Lessons Learned” section that offers readers insights into how these attacks were conducted, what vulnerabilities were exploited, and how the affected organizations responded. While the incidents discussed are technical, this book simplifies complex cyber topics to make them accessible to a broad audience, whether you're a cybersecurity enthusiast, a student, or an industry professional.
  • Добавил: SCART56
  • Дата: 6-04-2025, 20:36
  • Комментариев: 0

Название: Сеть для офиса и Linux-сервер своими руками
Автор: Стахнов А.А.
Издательство: БХВ-Петербург
Год: 2006
Страниц: 318
ISBN: 5-94157-668-4
Формат: PDF
Размер: 40.2 Mб
Язык: русский

Описывается установка, конфигурирование и настройка Linux-сервера для небольшой локальной офисной сети, где клиентские машины работают под управлением Microsoft Windows. Рассмотрен жизненный цикл небольшой компании, которая расширяется, и по мере расширения усложняются задачи, возложенные на сервер организации.
  • Добавил: literator
  • Дата: 6-04-2025, 17:29
  • Комментариев: 0
Название: Taming the Hacking Storm: A Framework for Defeating Hackers and Malware
Автор: Roger A. Grimes
Издательство: Wiley
Год: 2025
Страниц: 336
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

A transformative new approach to Internet security from an experienced industry expert. Taming the Hacking Storm: A Framework for Defeating Hackers and Malware is a groundbreaking new roadmap to solving the ubiquitous Internet security issues currently plaguing countries, businesses, and individuals around the world. In easy-to-understand and non-technical language, author and cybersecurity veteran Roger Grimes describes the most prevalent threats to our online safety today and what ties them all together. He goes on to lay out a comprehensive and robust framework for combating that threat—one that rests on a foundation of identity verification—and explains exactly how to implement it in the real world. Secure coding includes all the education, policies, tools, and methods that are used to reduce the number of vulnerabilities and exposure to vulnerabilities when developing software and firmware code. All developers (and anyone else in the development delivery chain, such as managers) need to be taught secure programming, including common vulnerabilities, common exploitation techniques, access control, least privilege, and fail-safe defaults. All developers should understand the CIA (confidential, integrity, availability) triad that drives the cybersecurity industry. Programmers need to understand authentication, access control, authorization, impersonation, delegation, accounting, auditing, and logging.
  • Добавил: Chipa
  • Дата: 6-04-2025, 12:48
  • Комментариев: 0

Название: Нейросеть ChatGPT - расширенная версия
Автор: Дмитрий Зверев
Издательство: Интернет-издание
Год: 2025
Формат: PDF
Страниц: 1222
Размер: 211 Mb
Язык: Русский

Контент-планы, посты, письма, pdf-отчеты, статьи, истории, сценарии для видео и презентаций, продающие тексты, закрытие возражений, выжимки, подборки, Dalle, Sora, GPTs, холсты, проекты, документы, голосовой и видео-режимы и другие функции