СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 136
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Active Directory глазами хакера
/ Комментариев: 0/

Active Directory глазами хакераНазвание: Active Directory глазами хакера
Автор: Ralf Hacker
Издательство: БХВ-Петербург
Год: 2021
Страниц: 178
Язык: русский
Формат: pdf
Размер: 65.7 MB

Рассмотрена архитектура системы безопасности Active Directory. Приведены сведения об используемом хакерами инструментарии. Последовательно и подробно описываются все этапы атаки на домен глазами злоумышленника: поиск уязвимостей и разведка в атакуемой сети, повышение привилегий, боковое перемещение, поиск и сбор критически важных данных. Описаны способы противодействия обнаружению атаки с применением различных инструментальных средств. Рассматриваются методы сохранения доступа к скомпрометированной сети как с помощью сторонних инструментов, так и с использованием групповых политик домена.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Securing Social Networks in Cyberspace
/ Комментариев: 0/

Название: Securing Social Networks in Cyberspace
Автор: Al-Sakib Khan Pathan
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 317
Размер: 13 Mb
Язык: English

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Art of Attack: Attacker Mindset for Security Professionals
/ Комментариев: 0/

The Art of Attack: Attacker Mindset for Security ProfessionalsНазвание: The Art of Attack: Attacker Mindset for Security Professionals
Автор: Maxie Reynolds
Издательство: Wiley
Год: 2021
Страниц: 307
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB, 19.6 MB

Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers. In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Autonomous Airborne Wireless Networks
/ Комментариев: 0/

Название: Autonomous Airborne Wireless Networks
Автор: Muhammad Ali Imran, Oluwakayode Onireti
Издательство: ‎‎Wiley-IEEE Press
Год: 2021
Формат: PDF
Размер: 10 Мб
Язык: английский / English

Autonomous Airborne Wireless Networks delivers an insightful exploration of recent advances in the theory and practice of using airborne wireless networks to provide emergency communications, coverage and capacity expansion, information dissemination, and more. The distinguished engineers and editors have selected resources that cover the fundamentals of airborne networks, including channel models, recent regulation developments, self-organized networking, AI-enabled flying networks, and notable applications in a variety of industries. The book evaluates advances in the cutting-edge of unmanned aerial vehicle wireless network technology while offering readers new ideas on how airborne wireless networks can support various applications expected of future networks. The rapidly developing field is examined from a fresh perspective, one not just concerned with ideas of control, trajectory optimization, and navigation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
AI-Enabled Threat Detection and Security Analysis for Industrial IoT
/ Комментариев: 0/

AI-Enabled Threat Detection and Security Analysis for Industrial IoTНазвание: AI-Enabled Threat Detection and Security Analysis for Industrial IoT
Автор: Hadis Karimipour, Farnaz Derakhshan
Издательство: Springer
Год: 2021
Страниц: 252
Язык: английский
Формат: pdf (true), epub
Размер: 38.6 MB

This contributed volume provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet of Things (IIoT). More specifically, this book discusses the security challenges in CPS and IIoT systems as well as how Artificial Intelligence (AI) and Machine Learning (ML) can be used to address these challenges. Furthermore, this book proposes various defence strategies, including intelligent cyber-attack and anomaly detection algorithms for different IIoT applications.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Designing Secure Systems
/ Комментариев: 0/

Designing Secure SystemsНазвание: Designing Secure Systems
Автор: Michael Melone
Издательство: CRC Press
Год: 2021
Страниц: 220
Язык: английский
Формат: pdf (true)
Размер: 13.1 MB

Modern systems are an intertwined mesh of human process, physical security, and technology. Many times, an attacker will leverage a weakness in one form of security to gain control over an otherwise protected operation. In Designing Secure Systems, we begin by describing the core concepts of access, authorization, authentication, and exploitation. We then break authorization down into five interrelated components and describe how these aspects apply to physical, human process, and cybersecurity.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Teach Yourself VISUALLY Microsoft Teams
/ Комментариев: 0/

Название: Teach Yourself VISUALLY Microsoft Teams
Автор: Wade Matt; Seidenberg Sven
Издательство: Visual
Год: 2021
Формат: PDF
Страниц: 695
Размер: 31 Mb
Язык: English

Discover the power of Microsoft Teams with this intuitive and timely new guide
Microsoft Teams is unlocking the potential of remote work and virtual meetings at a time when they couldn’t be more necessary. Its feature-rich interface and ease-of-use promise to bring your team together―as long as you can harness its full suite of capabilities.
In Teach Yourself VISUALLY Microsoft Teams, Microsoft experts and authors Matt Wade and Sven Seidenberg turn their years of engineering and IT experience loose on the virtual collaboration software now used by over one hundred million people across the globe.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Machine Learning Approach for Cloud Data Analytics in IoT
/ Комментариев: 0/

Название: Machine Learning Approach for Cloud Data Analytics in IoT
Автор: Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Monika Mangla, Suneeta Satpathy, Sirisha Potluri
Издательство: Wiley
Год: 2021
Формат: True PDF
Страниц: 528
Размер: 36,9 Mb
Язык: English

In this era of IoT, edge devices generate gigantic data during every fraction of a second. The main aim of these networks is to infer some meaningful information from the collected data. For the same, the huge data is transmitted to the cloud which is highly expensive and time-consuming. Hence, it needs to devise some efficient mechanism to handle this huge data, thus necessitating efficient data handling techniques. Sustainable computing paradigms like cloud and fog are expedient to capably handle the issues of performance, capabilities allied to storage and processing, maintenance, security, efficiency, integration, cost, energy and latency. However, it requires sophisticated analytics tools so as to address the queries in an optimized time.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Creating an Information Security Program from Scratch
/ Комментариев: 0/

Название: Creating an Information Security Program from Scratch
Автор: Walter Williams
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 223
Размер: 10 Mb
Язык: English

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
/ Комментариев: 0/

Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 ImplicationsНазвание: Cybersecurity: Ambient Technologies, IoT, and Industry 4.0 Implications
Автор: Gautam Kumar, Om Prakash Singh, Hemraj Saini
Издательство: CRC Press
Год: 2021
Страниц: 238
Язык: английский
Формат: pdf (true)
Размер: 45.1 MB

It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.0 related concerns. This book serves as a useful guide for researchers and industry professionals and will help beginners to learn the basics to the more advanced topics. Along with exploring security and privacy issues through the IoT ecosystem and examining its implications to the real-world, this book addresses cryptographic tools and techniques and presents the basic and high-level concepts that can serve as guidance for those in the industry as well as help beginners get a handle on both the basic and advanced aspects of security related issues. The book goes on to cover major challenges, issues, and advances in IoT and discusses data processing as well as applications for solutions, and assists in developing self-adaptive cyberphysical security systems that will help with issues brought about by new technologies within IoT and Industry 4.0.