СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 28
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacker: Hack The System - The "Ethical" Python Hacking Guide
/ Комментариев: 0/

Название: Hacker: Hack The System - The "Ethical" Python Hacking Guide
Автор: Takehiro Kanegi
Издательство: Reactive Publishing
Год: 2024
Страниц: 259
Язык: английский
Формат: pdf
Размер: 25.3 MB

Dive into the electrifying depths of the digital world with 'Hacker,' a book that doesn't just tell you about cybersecurity—it thrusts you into the heart of the action. This gripping guide peels back the layers of the internet we interact with daily, revealing a hidden universe teeming with potential and peril. From the basics of coding to the complexities of cyber attacks and defense mechanisms, 'Hacker' empowers you with the knowledge to explore the digital world safely and ethically. Experience firsthand the adrenaline of outsmarting cyber threats through immersive tutorials and real-world scenarios that transform abstract concepts into tangible skills. 'Hacker' is more than a book; it's your initiation into a clandestine community dedicated to safeguarding our digital frontier. Whether you're aspiring to become a cybersecurity expert or simply curious about how digital defenses are constructed and breached, this book offers a comprehensive and engaging journey through the landscape of modern hacking techniques.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Cybersecurity Guide to Governance, Risk, and Compliance
/ Комментариев: 0/

Название: The Cybersecurity Guide to Governance, Risk, and Compliance
Автор: Jason Edwards, Griffin Weaver
Издательство: Wiley
Год: 2024
Страниц: 667
Язык: английский
Формат: pdf (true), azw3
Размер: 10.1 MB

Understand and respond to a new generation of cybersecurity threats. Cybersecurity has never been a more significant concern of modern businesses, with security breaches and confidential data exposure as potentially existential risks. Managing these risks and maintaining compliance with agreed-upon cybersecurity policies is the focus of Cybersecurity Governance and Risk Management. This field is becoming ever more critical as a result. A wide variety of different roles and categories of business professionals have an urgent need for fluency in the language of cybersecurity risk management. The Cybersecurity Guide to Governance, Risk, and Compliance meets this need with a comprehensive but accessible resource for professionals in every business area. Filled with cutting-edge analysis of the advanced technologies revolutionizing cybersecurity, increasing key risk factors at the same time, and offering practical strategies for implementing cybersecurity measures, it is a must-own for CISOs, boards of directors, tech professionals, business leaders, regulators, entrepreneurs, researchers, and more.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Complete Cloud Computing Manual - 21th Edition, 2024
/ Комментариев: 0/

Название: The Complete Cloud Computing Manual - 21th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 164
Язык: английский
Формат: pdf
Размер: 24.1 MB

Облачные вычисления - одно из самых важных достижений в области цифровых технологий за последнее десятилетие. С помощью облачных вычислений мы можем помочь науке, обрабатывая огромные числа и объемы данных, от раскрытия секретов Вселенной до попыток предсказать следующую пандемию или просто обеспечить безопасное и надежное хранилище для наших личных файлов и информации. Облако всемогуще, но оно также является нашей человеческой и цифровой связью со следующим этапом развития вычислительной техники: ИИ (Искусственным Интеллектом). С помощью облака мы создаем эволюцию машинного обучения, которая поможет нам в ближайшие годы, поскольку мы все больше и больше полагаемся на технологии, чтобы помочь нам в нашей повседневной жизни. В этой книге вы узнаете, что такое облако, как оно работает и как оно может принести пользу вашему бизнесу. Мы рассмотрим основных игроков на облачном рынке систем хранения данных, а также проведем глубокий анализ их ключевых особенностей. Мы расскажем о том, как создать собственное облако, как использовать домашние устройства Google, а также множество информации, которая поможет вам быть в курсе новейшей облачной терминологии и технологий.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Complete Google User Manual - 21th Edition 2024
/ Комментариев: 0/

The Complete Google User Manual - 21th Edition 2024Название: The Complete Google User Manual - 21th Edition 2024
Автор: Papercut
Издательство: Papercut Limited
Год: 2024
Страниц: 148
Формат: PDF
Размер: 86,6 MB
Язык: английский

Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Начав со скромной поисковой системы, Google теперь предоставляет электронную почту с бесплатным онлайн-хранилищем, управление и редактирование фотографий, социальные сети с миллионами пользователей, один из лучших интернет-браузеров, крупнейший в мире видеосайт, ведущую на рынке операционную систему для смартфонов Android, интерактивные карты и навигацию, бесплатную платформу для ведения блогов и многое, многое другое. 100% неофициальное руководство.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
WSN and IoT: An Integrated Approach for Smart Applications
/ Комментариев: 0/

Название: WSN and IoT: An Integrated Approach for Smart Applications
Автор: Shalli Rani, Ashu Taneja
Издательство: CRC Press
Год: 2024
Страниц: 407
Язык: английский
Формат: pdf (true)
Размер: 15.5 MB

Nowadays, all of us are connected through a large number of sensor nodes, smart devices, and wireless terminals. For these Internet of Things (IoT) devices to operate seamlessly, the Wireless Sensor Network (WSN) needs to be robust to support huge volumes of data for information exchange, resource optimization, and energy efficiency. This book provides in-depth information about the emerging paradigms of IoT and WSN in new communication scenarios for energy-efficient and reliable information exchange between a large number of sensor nodes and applications. WSN and IoT: An Integrated Approach for Smart Applications discusses how the integration of IoT and WSN enables an efficient communication flow between sensor nodes and wireless terminals and covers the role of Machine Learning (ML), Artificial Intelligence (AI), Deep Learning (DL), and blockchain technologies which give way to intelligent networks. This book presents how technological advancement is beneficial for real-time applications involving a massive number of devices and discusses how the network carries huge amounts of data allowing information to be communicated over the Internet.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
AWS Cloud Automation: In-depth guide to automation using Terraform infrastructure as code solutions
/ Комментариев: 0/

Название: AWS Cloud Automation: In-depth guide to automation using Terraform infrastructure as code solutions
Автор: Oluyemi James Odeyinka
Издательство: BPB Publications
Год: 2024
Страниц: 366
Язык: английский
Формат: pdf, epub (true)
Размер: 10.2 MB

AWS Cloud Automation allows organizations to effortlessly organize and handle their cloud resources. Terraform, an open-source provisioning tool, transforms the old manual way of doing things by allowing users to define, deploy, and maintain infrastructure as code, ensuring consistency, scalability, and efficiency. This book explains AWS Cloud Automation using Terraform, which is a simple and clear syntax that lets users define the infrastructure needs. Terraform simplifies setting up and managing infrastructure, reducing errors and fostering team collaboration. It enables version control, letting you monitor changes and implement CI/CD pipelines, effortlessly. The book guides you in creating and managing AWS resources through a simple configuration file, allowing you to define virtual machines, networks, databases, and more. Discover how Terraform makes organizing infrastructure code easy, promoting reusability and simple maintenance with consistent patterns across projects and teams. Amazon Web Services DevOps is a set of practices and tools that are used by AWS to automate and orchestrate the process of cloud infrastructure deployment and software development. DevOps stands for Development and Operations, and it is a software deployment and development methodology that combines the best practices of software development with the best practices of IT operations.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware
/ Комментариев: 0/

Название: Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware
Автор: Manish Sharma
Издательство: BPB Publications
Год: 2024
Страниц: 402
Язык: английский
Формат: epub (true)
Размер: 26.0 MB

Ethical Hacking and Network Analysis with Wireshark provides you with the tools and expertise to demystify the invisible conversations coursing through your cables. This definitive guide, meticulously allows you to leverage the industry-leading Wireshark to gain an unparalleled perspective on your digital landscape. This book teaches foundational protocols like TCP/IP, SSL/TLS and SNMP, explaining how data silently traverses the digital frontier. With each chapter, Wireshark transforms from a formidable tool into an intuitive extension of your analytical skills. Discover lurking vulnerabilities before they morph into full-blown cyberattacks. Dissect network threats like a forensic scientist and wield Wireshark to trace the digital pulse of your network, identifying and resolving performance bottlenecks with precision. Restructure your network for optimal efficiency, banish sluggish connections and lag to the digital scrapheap.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Zero Trust Networks: Building Secure Systems in Untrusted Networks, 2nd Edition (Final)
/ Комментариев: 0/

Название: Zero Trust Networks: Building Secure Systems in Untrusted Networks, 2nd Edition (Final)
Автор: Razi Rais, Christina Morillo, Evan Gilman
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 332
Язык: английский
Формат: pdf, epub (true)
Размер: 15.6 MB

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture. Zero trust aims to solve the inherent problems in placing our trust in the network. Instead, it is possible to secure network communication and access so effectively that the physical security of the transport layer can be reasonably disregarded. It goes without saying that this is a lofty goal. The good news is that we’ve got pretty powerful cryptographic algorithms these days, and given the right automation systems, this vision is actually attainable. For network engineers, security engineers, CTOs, and everyone in between can benefit from zero trust learnings. Even without a specialized skill set, many of the principles included in this book can be clearly understood, helping leaders make decisions that implement a zero trust model, improving their overall security posture incrementally.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Introduction to Cybersecurity in the Internet of Things
/ Комментариев: 0/

Название: Introduction to Cybersecurity in the Internet of Things
Автор: Keke Gai, Jing Yu, Liehuang Zhu
Издательство: CRC Press
Год: 2024
Страниц: 645
Язык: английский
Формат: pdf (true)
Размер: 16.7 MB

This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture. The authors discuss the overall IoT architecture, covering networking, computing, and security threats and risks to hardware such as sensors, actuators, and portable devices, as well as infrastructure layers. They cover a range of technical concepts such as cryptography, distributed storage, and data transmission, and offer practical advice on implementing security solutions such as authentication and access control. By exploring the future of cybersecurity in the IoT industry, with insights into the importance of big data and the threats posed by data mining techniques, this book is an essential resource for anyone interested in, or working in, the rapidly evolving field of IoT security. The main content in this book is formed by four parts. The first part provides learners with basic information about cybersecurity in mobile computing from three perspectives, including basic concepts, fundamental cyber issues in mobile computing, and relevant knowledge about the Internet-of-Things (IoT) and cloud computing.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Low-Power Wide Area Network for Large Scale Internet of Things
/ Комментариев: 0/

Название: Low-Power Wide Area Network for Large Scale Internet of Things: Architectures, Communication ­Protocols and Recent Trends
Автор: Mariyam Ouaissa, Mariya Ouaissa, Inam Ullah Khan, Zakaria Boulouard
Издательство: CRC Press
Серия: Prospects in Networking and Communication
Год: 2024
Страниц: 275
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents a comprehensive exploration of LPWANs, delving into their fundamental concepts, underlying technologies, and the multifaceted challenges they tackle. This book recognizes that LPWANs don't operate in isolation; they are intimately intertwined with Artificial Intelligence and Machine Learning (AI/ML) technologies, which play a pivotal role in optimizing LPWAN performance and capabilities. The book is a collection of original contributions regarding air interface, transmission technologies and novel network architectures, such as network slicing, cloud/fog/edge computing, ad hoc networks and software-defined network. Also, this book provides a guide for researchers of IoT applications to choose suitable LPWAN technologies and describe the design aspects, network architectures, security issues and challenges.