СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 106
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Администрирование почтовых серверов sendmail (2021)
/ Комментариев: 0/

Название: Администрирование почтовых серверов sendmail
Автор: Блам Р.
Издательство: ИНТУИТ
Год: 2021
Cтраниц: 700
Формат: pdf
Размер: 88 мб
Язык: русский

Основной целью создания данного учебного пособия является оказание помощи сетевым администраторам небольших учреждений в организации высокопроизводительной и качественной системы электронной почты, которая бы не уступала коммерческим аналогам. Вся информация, представленная в издании, может использоваться либо в учебных целях, либо в качестве справочника (или и в том, и другом качестве). В книге приводятся примеры установки и настройки сервера электронной почты (почтового сервера) на базе ОС Linux для вымышленной организации.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Securing Systems: Applied Security Architecture and Threat Models
/ Комментариев: 0/

Securing Systems: Applied Security Architecture and Threat ModelsНазвание: Securing Systems: Applied Security Architecture and Threat Models
Автор: Brook S. E. Schoenfield
Издательство: CRC Press
Год: 2015
Страниц: 416
Язык: английский
Формат: pdf (true)
Размер: 14.5 MB

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacking with Kali Linux
/ Комментариев: 0/

Название: Hacking with Kali Linux
Автор: Casey Pena
Издательство: Casey Pena
Год: 2022
Формат: ePUB
Страниц: 95
Размер: 10 Mb
Язык: English

Hacking is a phenomenon that is sweeping the globe.
With more individuals migrating online and doing nearly every work that they can, it is expected that hacking and other similar assaults will rise with time. Our personal, financial, and commercial information can all be available online, which is a bonanza for hackers all around the globe.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacker's Manual 2021, 11th Edition
/ Комментариев: 0/

Название: Hacker's Manual 2021, 11th Edition
Автор: Charles Ginger (Editor)
Издательство: Future Publishing Limited
Год: 2021
Формат: True PDF
Страниц: 164
Размер: 30,1 Mb
Язык: English

Welcome to the 2021 edition of the Hacker’s Manual! You hold in your hands 164 pages of Linux hacking tutorials, guides and features from the experts at Linux Format magazine – the home of open source software. In this edition we’ve gone in hard for security. You’ll find guides to securing servers, getting a grounding in hacking, using security tools such as Kali and Fedora Security Lab, alongside solid features explaining how to protect your privacy online using established tools like Tails. But we shouldn’t live in fear! Hacking is monumental fun. Never mind setting up and playing with Linux, we take a look at hacking tablets, media servers, virtual machines, cloud servers, multi-booting with Grub and much more. If you’re a little timid when it comes to the Terminal we even have a meaty reference section at the back.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Electro-optic Modulation for Photonic Networks
/ Комментариев: 0/

Название: Electro-optic Modulation for Photonic Networks: Precise and high-speed control of lightwaves
Автор: Tetsuya Kawanishi
Издательство: Springer
Год: 2022
Формат: PDF
Страниц: 241
Размер: 10 Mb
Язык: English

This textbook provides comprehensive and detailed information on electro-optic modulation, which plays important roles in lightwave networks including optical fiber links, visible ray communications, fiber-wireless, etc. The first part of this book describes roles and basic functions of optical modulators as well as various modulation schemes. The second part is on mathematical expressions dedicated to optical modulation, where sideband generation are clearly described.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Recurrent Neural Networks: From Simple to Gated Architectures
/ Комментариев: 0/

Название: Recurrent Neural Networks: From Simple to Gated Architectures
Автор: Fathi M. Salem
Издательство: Springer
Год: 2022
Формат: PDF
Страниц: 130
Размер: 10 Mb
Язык: English

This textbook provides a compact but comprehensive treatment that provides analytical and design steps to recurrent neural networks from scratch. It provides a treatment of the general recurrent neural networks with principled methods for training that render the (generalized) backpropagation through time (BPTT). This author focuses on the basics and nuances of recurrent neural networks, providing technical and principled treatment of the subject, with a view toward using coding and deep learning computational frameworks, e.g., Python and Tensorflow-Keras.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
/ Комментариев: 0/

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkНазвание: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
Автор: Cynthia Brumfield and Brian Haugli
Издательство: Wiley
Год: 2022
Страниц: 224
Язык: английский
Формат: epub
Размер: 10.2 MB

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
/ Комментариев: 0/

Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis CommunicationНазвание: Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
Автор: Holger Kaschner
Издательство: Springer
Год: 2021
Страниц: 230
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Cyber attacks and IT outages threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. With its practical structure, it is ideally suited to day-to-day business for crisis team members, communicators, security, IT and data protection experts. With numerous illustrations and checklists. A cyber crisis is therefore a crisis in which IT systems and the data processed on them play a central role. This involves the classic protection goals of information security: confidentiality, integrity, and availability of the data as well as authenticity of the communication participants and contents of the communication (technically as well as organizationally). We are therefore dealing with a cyber crisis whenever a breach of the protection goals (can) result in real dangers to the life and limb of people or to the strategic goals, reputation, or survivability of our organization.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Deep Learning Approaches to Cloud Security
/ Комментариев: 0/

Название: Deep Learning Approaches to Cloud Security
Автор: Pramod Singh Rathore, Vishal Dutt, Rashmi Agrawal, Satya Murthy Sasubilli and Srinivasa Rao Swarna
Издательство: Wiley
Год: 2022
Формат: PDF
Страниц: 301
Размер: 30 Mb
Язык: English

Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Social Networks: Modelling and Analysis
/ Комментариев: 0/

Social Networks: Modelling and AnalysisНазвание: Social Networks: Modelling and Analysis
Автор: Niyati Aggrawal, Adarsh Anand
Издательство: CRC Press
Год: 2022
Страниц: 254
Язык: английский
Формат: pdf (true)
Размер: 12.8 MB

The goal of this book is to provide a reference for applications of mathematical modeling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making. Social Networks: Modeling and Analysis provide the essential knowledge of network analysis applicable to real-world data, with examples from today's most popular social networks such as Facebook, Twitter, Instagram, YouTube, etc. Chapter 1 discusses the basic concepts and terminologies related to network analysis applicable to real-world data, with examples from today's most popular social networks. Chapter 2 discusses the need for scientific analysis wherein the representation of a network as a graph (various kind of graphs). Chapter 10 gives an overview of the information diffusion process on social networking platforms and various mathematical modelling frameworks. Chapter 11 gives a brief overview about security and privacy issues on social networks, and Chapter 12 provides an overview of the various social networking tools such as Gephi, UCINET, NetworkX, Pajek and many more.