Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 24-09-2024, 04:28
  • Комментариев: 0
Название: Internet of Things and Big Data Analytics-Based Manufacturing
Автор: Arun Kumar Rana, Sudeshna Chakraborty, Pallavi Goel, Sumit Kumar Rana, Ahmed A. Elngar
Издательство: CRC Press
Год: 2025
Страниц: 288
Язык: английский
Формат: pdf (true), epub
Размер: 28.9 MB

By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries. Modern businesses can more readily implement new data-driven strategies and deal with the pressure of international competition thanks to Industrial IoT. But as the use of IoT grows, the amount of created data rises, turning industrial data into Industrial Big Data. Internet of Things and Big Data Analytics-Based Manufacturing shows how Industrial Big Data can be produced as a result of IoT usage in manufacturing, considering sensing systems and mobile devices. Different IoT applications that have been developed are demonstrated and it is shown how genuine industrial data can be produced, leading to Industrial Big Data. This book is organized into four sections discussing IoT and technology, the future of Big Data, algorithms, and case studies demonstrating the use of IoT and Big Data in a variety of industries, including automation, industrial manufacturing, and healthcare. This reference title brings all related technologies into a single source so that researchers, undergraduate and postgraduate students, academicians, and those in the industry can easily understand the topic and further their knowledge.
  • Добавил: literator
  • Дата: 23-09-2024, 19:56
  • Комментариев: 0
Название: Cloud Native Application Protection Platforms: A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Автор: Russ Miles, Stephen Giguere, Taylor Smith
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 204
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Cloud native security isn't a game for individual players. It requires team collaboration with a platform that can help cloud security engineers, developers, and operations people do their best work. That's what the cloud native application protection platform (CNAPP) delivers. With this practical guide, you'll learn how CNAPPs can help you consolidate security through DevSecOps across cloud native technologies, practices, and application lifecycles. Through real-life attack scenarios, authors Russ Miles, Steve Giguere, and Taylor Smith help you explore how CNAPP not only mitigates multidimensional threats, but also reduces complexity and helps your team stay one step ahead of attackers. CNAPP provides a holistic approach to your cloud native development across identities, workloads, networks, and infrastructure. Security is everyone’s job, and this book has something for all technology areas, from DevOps to SecOps, but most certainly, it is for those daring to secure the murky waters of cloud native application development. The book does assume that users have a basic understanding of the cloud native ecosystem.
  • Добавил: umkaS
  • Дата: 23-09-2024, 13:41
  • Комментариев: 0
Название: Сетевые технологии высокоскоростной передачи данных
Автор: Будылдина Н.В., Шувалов В.П.
Издательство: Горячая линия-Телеком
Год: 2018
Cтраниц: 342
Формат: pdf (ocr)
Размер: 11 мб
Язык: русский

В компактной форме изложены вопросы построения инфокоммуникационных сетей, обеспечивающих высокоскоростную передачу данных. Представлены разделы, которые необходимы для понимания того как можно обеспечить передачу не только с высокой скоростью, но и с другими показателями, характеризующими качество предоставляемой услуги.
  • Добавил: literator
  • Дата: 21-09-2024, 02:29
  • Комментариев: 0
Название: Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
Автор: Kodi A. Cochran
Издательство: Apress
Год: 2024
Страниц: 542
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Embarking on the journey through this comprehensive cybersecurity guide promises readers a transformative experience, equipping them with invaluable insights, practical skills, and a profound understanding of the intricate world of digital defense. Whether you're an industry professional seeking to enhance your expertise or a newcomer eager to navigate the cybersecurity landscape, this guide serves as your trusted companion. Expect to gain a profound grasp of foundational concepts, illustrated through real-world examples and practical applications. Dive into the logical flow of CompTIA Pentest+ objectives and (ISC)2 SSCP & CCSP, aligning your learning with industry standards. Beyond theory, this guide empowers you with actionable tips and emerging trends, ensuring your knowledge remains current in the dynamic realm of cybersecurity. As you progress through each chapter, anticipate a hands-on exploration of offensive and defensive security, offering a pathway to certification from a vendor-neutral perspective. Ultimately, this guide is designed to not only enhance your cybersecurity skill set but to foster a holistic approach, making you adept at navigating the evolving cyber landscape with confidence and expertise. For anyone interested in cybersecurity: recent graduates, IT professionals transitioning into security, veterans, and those who are self taught. One of the largest motivating factors is that there are several certifications—this book will greatly improve the reader's chance of obtaining.
  • Добавил: literator
  • Дата: 20-09-2024, 17:16
  • Комментариев: 0
Название: The CISO Playbook
Автор: Andres Andreu
Издательство: CRC Press
Год: 2025
Страниц: 293
Язык: английский
Формат: pdf (true), epub
Размер: 13.2 MB

A CISO is the ultimate guardian of an organization’s digital assets. As a cybersecurity leader, a CISO must possess a unique balance of executive leadership, technical knowledge, strategic vision, and effective communication skills. The ever-evolving cyberthreat landscape demands a resilient, proactive approach coupled with a keen ability to anticipate attack angles and implement protective security mechanisms. Simultaneously, a cybersecurity leader must navigate the complexities of balancing security requirements with business objectives, fostering a culture of cybersecurity awareness, and ensuring compliance with regulatory frameworks. The CISO Playbook aims to provide nothing but real-world advice and perspectives to both up-and-coming cybersecurity leaders as well as existing ones looking to grow. The book does not approach cybersecurity leadership from the perspective of the academic, or what it should be, but more from that which it really is. Moreover, it focuses on the many things a cybersecurity leader needs to “be” given that the role is dynamic and ever-evolving, requiring a high level of adaptability. A CISO’s career is touched from many differing angles, by many different people and roles. A healthy selection of these entities, from executive recruiters to salespeople to venture capitalists, is included to provide real-world value to the reader. To augment these, the book covers many areas that a cybersecurity leader needs to understand – from the pre-interview stage to the first quarter and from security operations to the softer skills such as storytelling and communications.
  • Добавил: literator
  • Дата: 20-09-2024, 04:41
  • Комментариев: 0
Название: Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence
Автор: Atif Ali, Baber Majid Bhatti
Издательство: CRC Press
Год: 2025
Страниц: 287
Язык: английский
Формат: pdf (true)
Размер: 52.1 MB

In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr. Atif and Dr. Baber emerges as a critical beacon of knowledge and understanding. This book delves into the shadowy world of cyber threats, unraveling the complex web of digital espionage, cybercrime, and the innovative defenses that stand between safety and digital chaos. Dr. Atif, leveraging his profound expertise in Artificial Intelligence and cybersecurity, offers not just an exploration but a comprehensive guide to navigating the tumultuous digital landscape. What sets this book apart is its unique blend of technical depth, real-world examples, and accessible writing, making the intricate world of cyber threats understandable and engaging for a broad audience. This book is an essential resource for anyone keen on understanding the intricacies of cybersecurity and the critical role it plays in our interconnected society. From cybersecurity professionals, IT students, and corporate leaders to policy makers and general readers with an interest in the digital world, Spies in the Bits and Bytes serves as a comprehensive guide to the challenges and solutions in the realm of cyber threat intelligence, preparing its audience for the ongoing battle against digital adversaries.
  • Добавил: literator
  • Дата: 19-09-2024, 15:52
  • Комментариев: 0
Название: The Code of Honor: Embracing Ethics in Cybersecurity
Автор: Paul J. Maurer, Ed Skoudis
Издательство: Wiley
Год: 2024
Страниц: 221
Язык: английский
Формат: pdf (true), epub (true)
Размер: 10.1 MB

A comprehensive and practical framework for ethical practices in contemporary cybersecurity. While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies – called Critical Applications – at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.
  • Добавил: Chipa
  • Дата: 19-09-2024, 10:07
  • Комментариев: 0

Название: Гайд по Midjourney
Автор: Максим Булатов
Издательство: Интернет-издание
Год: 2024
Формат: PDF
Страниц: 55
Размер: 24 Mb
Язык: Русский

24 слайда мы будем разбираться с основой: установкой, оплатой, новой структурой составления запросов, функциями и ещё кучей всего… (и сделаем две домашки) а потом приступим к самому интересному! киношным сценам, созданию набора типографики в одном стиле, генерации иллюстраций, обработке своих фото и применению миджорни в коммерции

  • Добавил: literator
  • Дата: 18-09-2024, 16:37
  • Комментариев: 0
Название: Artificial Intelligence and Communication Techniques in Industry 5.0
Автор: Payal Bansal, Rajeev Kumar, Ashwani Kumar, Daniel D. Dasig, Jr.
Издательство: CRC Press
Год: 2025
Страниц: 421
Язык: английский
Формат: pdf (true)
Размер: 51.4 MB

The book highlights the role of Artificial Intelligence (AI) in driving innovation, productivity, and efficiency. It further covers applications of Artificial Intelligence for digital marketing in Industry 5.0 and discusses data security and privacy issues in Artificial Intelligence, risk assessments, and identification strategies. We explore the diverse range of AI algorithms that are pushing the boundaries of innovation and discovery, from traditional algorithms like decision trees and support vector machines to state-​of-​the-​art Deep Learning architectures and Reinforcement Learning strategies. Additionally, we highlight new directions and paradigms that are changing the field of AI research and development, such as neuromorphic computing, quantum computing-​based algorithms, explainable AI, and Federated Learning. The book presents 24 chapters dealing with the applications areas of Artificial Intelligence (AI) and communication techniques in Industry 5.0. Chapter 1 explores the applications of AI in various aspects of manu­ facturing, including intelligent automation, predictive maintenance, and quality control. By leveraging AI’s capabilities for data analysis, Machine Learning, and decision-​making, manufacturers can achieve significant gains in efficiency, productivity, and product quality. Chapter 2 explores this transformation, detailing the key features of Industry 5.0, human–​machine collaboration, sustainability, and advancements like AI. Chapter 3 describes the various emerging applications of AI in the era of Industry 5.0 revolution.
  • Добавил: literator
  • Дата: 17-09-2024, 17:24
  • Комментариев: 0
Название: Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices
Автор: Mariya Ouaissa, Mariyam Ouaissa
Издательство: CRC Press
Серия: Cyber Shorts Series
Год: 2025
Страниц: 116
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.1 MB

The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats. The book offers strategies of practical aspects of cybersecurity, covers the main disciplines needed to understand cybersecurity, and demonstrates ethical and legal concepts of cyber activities. It presents important concepts relevant for cybersecurity strategies, including the concept of cybercrime, cyber defense, protection of IT systems, and analysis of risks. In cybersecurity, strategies are broadly divided into two categories: offensive and defensive. While both approaches are vital, they offer different perspectives on protecting, detecting, and responding to threats. The key is employing the right strategy at the right time in order to protect against attackers, maintain business continuity in the face of cyberattacks, optimize resources, and adhere to regulatory compliance. Offensive cybersecurity, commonly called “OffSec,” focuses on actively seeking out systems’ vulnerabilities, flaws, and weaknesses before attackers can exploit them. The premise behind OffSec is simple: to best defend oneself, one must think and act like an attacker. This proactive approach includes strategies like penetration testing (or pentesting), red teaming, phishing simulations, and vulnerability assessments. While offensive cybersecurity aims to identify vulnerabilities by actively simulating cyberattacks, defensive cybersecurity, or “DefSec,” focuses on building and maintaining resilient systems that can prevent, detect, and respond to threats as they arise. This approach emphasizes layers of protection, including firewalls, antivirus software, intrusion detection systems (IDS), intrusion prevention systems (IPS), and incident response teams.