Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 31-10-2022, 21:51
  • Комментариев: 0
Making Sense of CybersecurityНазвание: Making Sense of Cybersecurity
Автор: Thomas Kranz
Издательство: Manning Publications
Год: 2022
Страниц: 288
Язык: английский
Формат: epub (true), mobi
Размер: 15.2 MB

A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
  • Добавил: literator
  • Дата: 30-10-2022, 15:31
  • Комментариев: 0
Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven ApplicationsНазвание: Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications
Автор: Pethuru Raj, Skylab Vanga
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 354
Язык: английский
Формат: pdf (true)
Размер: 28.1 MB

Explore the cloud-native paradigm for event-driven and service-oriented applications. In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful treatment of cloud-native computing technologies and tools. With a particular emphasis on the Kubernetes platform, as well as service mesh and API gateway solutions, the book demonstrates the need for reliability assurance in any distributed environment.
  • Добавил: literator
  • Дата: 29-10-2022, 15:21
  • Комментариев: 0
How to Create a Web3 Startup: A Guide for Tomorrow’s Breakout CompaniesНазвание: How to Create a Web3 Startup: A Guide for Tomorrow’s Breakout Companies
Автор: Tom Taulli
Издательство: Apress
Год: 2022
Страниц: 179
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Web3 is the next evolution for the World Wide Web based on Blockchain technology. ​This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum. The Web3 Tech Stack describes the tools for product development. These include libraries, platforms, IDEs, databases, web services, and so on. There are certain types of tech stacks that have become quite common in the startup world. For example, there is MERN, which has the following systems: MongoDb, Express, React, Node.
  • Добавил: literator
  • Дата: 29-10-2022, 14:56
  • Комментариев: 0
Third Generation Internet Revealed: Reinventing Computer Networks with IPv6Название: Third Generation Internet Revealed: Reinventing Computer Networks with IPv6
Автор: Lawrence E. Hughes
Издательство: Apress
Год: 2022
Страниц: 428
Язык: английский
Формат: pdf (true), epub
Размер: 34.1 MB

This book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space. IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation.
  • Добавил: literator
  • Дата: 26-10-2022, 03:33
  • Комментариев: 0
MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500Название: MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500
Автор: Shimon Brathwaite
Издательство: Sybex
Год: 2023
Страниц: 352
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex. In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You’ll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. The Microsoft Azure Platform is one of the most popular and diverse cloud-computing platforms in existence. It includes a wide range of security features designed to help clients protect their cloud environments.
  • Добавил: literator
  • Дата: 26-10-2022, 02:47
  • Комментариев: 0
Losing the Cybersecurity War And What We Can Do to Stop ItНазвание: Losing the Cybersecurity War: And What We Can Do to Stop It
Автор: Steve King, Kiren Chaudry
Издательство: CRC Press
Год: 2023
Страниц: 173
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The Internet was created for communication and sharing purposes without security in mind. As it expanded exponentially via cloud and edge and computing, the notion of defending the perimeter has become more challenging. There are more vulnerabilities (and targets) created every day with added devices and users, and attackers are taking advantage of our security predicaments. Zero Trust begins with the premise of implicitly not trusting any devices, assets, services, workflows, or people connected to the network. The next step is to assume everything connected is hostile and needs to be authenticated. Employing a strategy of Zero Trust makes profound sense for improving cybersecurity fortification. It is already being widely adopted by the Pentagon and the Department of Homeland Security, and it is being mandated to other agencies via Presidential orders.
  • Добавил: literator
  • Дата: 24-10-2022, 23:20
  • Комментариев: 0
Converged Communications: Evolution from Telephony to 5G Mobile InternetНазвание: Converged Communications: Evolution from Telephony to 5G Mobile Internet
Автор: Erkki Koivusalo
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 479
Язык: английский
Формат: pdf (true)
Размер: 10.3 MB

A one-of-a-kind exploration of the past, present, and future of telecommunications. In Converged Communications: Evolution from Telephony to 5G Mobile Internet, telecommunications industry veteran Erkki Koivusalo delivers an essential reference describing how different communications systems work, how they have evolved from fixed telephone networks to the latest 5G mobile systems, and how the voice and data services converged. The central theme of the book is to build deeper understanding about incremental technological progress by introducing both state of the art and their predecessor technologies. The book explores four main areas, including fixed telephone systems, data communication systems, mobile cellular systems, and IP multimedia systems. It clearly explains architectures, protocols, and functional procedures, and discusses a variety of topics ranging from physical layer processes to system level interactions.
  • Добавил: literator
  • Дата: 24-10-2022, 03:52
  • Комментариев: 0
Cisco SD-WAN : A Practical Guide to Understand the Basics of Cisco Viptela Based SD-WAN solutionНазвание: Cisco SD-WAN : A Practical Guide to Understand the Basics of Cisco Viptela Based SD-WAN solution
Автор: Toni Pasanen
Издательство: Leanpub
Серия: The Network Times
Год: 2021-05-23
Страниц: 305
Язык: английский
Формат: pdf (true)
Размер: 60.6 MB

A modern SD-WAN solution offers automated and secure device onboarding as well well as Centralized Management and Control Plane. It also supports multiple VPNs over a common underlay network as well as highly secure Direct Cloud/Internet Access and Application-Aware Routing. I wrote this book primarily for those of you who want to learn the basics of a Cisco SD-WAN solution. The first two chapters explain how to set up your local test environment. You will learn how to install certificates to vBond, vManage, vSmart, and vEdge and how to set up underlay and Out-of-Band management network connections. Chapter three introduces a centralized control plane with the Overlay Management Protocol (OMP) running between vEdges and vSmart. After reading this chapter, you should be familiar with how overlay tunnels between vEdges are built by using TLOC routes. Besides, you learn how Sevice VPN routing information is advertised by using OMP routes.
  • Добавил: literator
  • Дата: 24-10-2022, 03:13
  • Комментариев: 0
Microsoft Defender for CloudНазвание: Microsoft Defender for Cloud
Автор: Yuri Diogenes, Tom Janetscheck
Издательство: Microsoft Press/Pearson Education
Год: 2023
Страниц: 510
Язык: английский
Формат: epub
Размер: 39.9 MB

The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management – all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors.
  • Добавил: literator
  • Дата: 21-10-2022, 15:23
  • Комментариев: 0
Cross-Industry Applications of Cyber Security FrameworksНазвание: Cross-Industry Applications of Cyber Security Frameworks
Автор: Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan
Издательство: IGI Global
Год: 2022
Страниц: 265
Язык: английский
Формат: pdf (true), epub
Размер: 25.9 MB

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Chapter 2 talks about the role of Artificial Intelligence (AI) on cybersecurity and its control. Nowadays, cyber security is paramount in all aspects of life, particularly in digital technology. Stories of Artificial Intelligence and data breaches, ID theft, cracking the security code, operating machines with remote sensors, and other such incidents abound, affecting millions of individuals and organizations. The problems in developing appropriate controls and processes and applying them with utmost precision to combat cyber-attacks & crimes have always been unending. With recent advances in Artificial Intelligence, the ever-increasing danger of cyber-attacks and crimes has grown tremendously.