СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 74
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)
/ Комментариев: 0/

Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)Название: Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)
Автор: J.R. Storment, Mike Fuller
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 483
Язык: английский
Формат: epub
Размер: 10.2 MB

FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the process of building a culture of cloud FinOps by drawing on real-world successes and failures of large-scale cloud spenders. At the time of writing, we assume readers will have a base level of knowledge of at least one of the three main public cloud providers (Amazon Web Services [AWS], Azure, and Google Cloud Platform [GCP]). Readers should understand how the cloud works and charges for resources. They should also be familiar with the major resource types like compute and storage, and higher-level service offerings like managed databases, queues, and object storage. A good starting place for the level of AWS knowledge needed is the AWS Business Professional training, or better, the AWS Cloud Practitioner certification.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Computer Security Fundamentals, Fifth Edition (Final)
/ Комментариев: 0/

Computer Security Fundamentals, Fifth Edition (Final)Название: Computer Security Fundamentals, Fifth Edition
Автор: Dr. Chuck Easttom
Издательство: Pearson Education
Год: 2023
Страниц: 576
Язык: английский
Формат: epub
Размер: 29.3 MB

One-volume introduction to computer security. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned. This book is a guide for any computer-savvy person. This means system administrators who are not security experts and anyone who has a working knowledge of computers and wishes to know more about cybercrime and cyber terrorism could find this book useful. However, the core audience will be students who wish to take a first course in security but may not have a thorough background in computer networks. The book is in textbook format, making it ideal for introductory computer security courses that have no specific prerequisites. That lack of prerequisites means that people outside the normal computer science and computer information systems departments could also avail themselves of a course based on this book. This might be of particular interest to law enforcement officers, criminal justice majors, and even business majors with an interest in computer security.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCP
/ Комментариев: 0/

Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCPНазвание: Google Cloud Platform All-In-One Guide: Get Familiar with a Portfolio of Cloud-based Services in GCP
Автор: Praveen Kukreti
Издательство: BPB Publications
Год: 2023
Страниц: 297
Язык: английский
Формат: pdf, epub (true)
Размер: 10.2 MB

Explore the Essential Concepts, Tools, and Services in GCP. Google Cloud platform has a suite of cloud computing services for developing and maintaining software. It includes products like Google Compute Engine, Google App Engine, Google Cloud Storage, and Google Container Engine. With so much to offer, we will learn how to manage services running on Google Cloud. This book primarily focuses on creating a solid foundation for anyone who wants to learn Cloud computing in general and Google Cloud Platform in particular. We have arranged the overall content of this book in 13 chapters. In each chapter, we have tried to explain about the specific subject in a simple language, post which we have gone a little deeper into each and every topic that is part of the subject. As a result readers develop a fair understanding of Google Cloud services and their functionality. Readers will also find various use cases, case studies and lab activities that will help in enhancing their understanding in a more practical way. By the end of the book, you will be able to design, develop, and deploy apps in GCP.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Final)
/ Комментариев: 0/

Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Final)Название: Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us (Final)
Автор: Eugene H. Spafford, Leigh Metcalf, Josih Dykstra
Издательство: Addison-Wesley/Pearson
Год: 2023
Страниц: 550
Язык: английский
Формат: epub (true), mobi
Размер: 28.6 MB

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them. Cybersecurity is fraught with hidden and unsuspected dangers and difficulties. Despite our best intentions, there are common and avoidable mistakes that arise from folk wisdom, faulty assumptions about the world, and our own human biases. Cybersecurity implementations, investigations, and research all suffer as a result. Many of the bad practices sound logical, especially to people new to the field of cybersecurity, and that means they get adopted and repeated despite not being correct. For instance, why isnt the user the weakest link? Get a high-level exposure to why statistics and figures may mislead as well as enlighten. Develop skills to identify new myths as they emerge, strategies to avoid future pitfalls, and techniques to help mitigate them. Fall down the rabbit hole of analogies with whimsical illustrations of difficult concepts, coupled with extensive citations and humor-tinged prose that explain them.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Zero Trust Networks: Building Secure Systems in Untrusted Network, 2nd Edition (Third Early Release)
/ Комментариев: 0/

Zero Trust Networks: Building Secure Systems in Untrusted Network, 2nd Edition (Third Early Release)Название: Zero Trust Networks: Building Secure Systems in Untrusted Network, 2nd Edition (Third Early Release)
Автор: Razi Rais, Christina Morillo, Evan Gilman, Doug Barth
Издательство: O’Reilly Media, Inc.
Год: 2023-01-18
Страниц: 129
Язык: английский
Формат: epub (true), mobi
Размер: 10.2 MB

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Zero trust aims to solve the inherent problems in placing our trust in the network. Instead, it is possible to secure network communication and access so effectively that physical security of the transport layer can be reasonably disregarded. It goes without saying that this is a lofty goal. The good news is that we’ve got pretty powerful cryptographic algorithms these days, and given the right automation systems, this vision is actually attainable.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Azure Security (MEAP v3)
/ Комментариев: 0/

Azure Security (MEAP v3)Название: Azure Security (MEAP v3)
Автор: Bojan Magusic
Издательство: Manning Publications
Год: 2023
Страниц: 169
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. Attacks against cloud-based applications are increasingly common and sophisticated. It’s vital for any developer or resource owner to understand how to properly configure their Azure cloud environments and establish reliable security best practices. The Azure platform comes with dozens of built-in security tools to help keep your systems safe. This book will teach you exactly how to set them up for maximum effectiveness. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you’ve learned.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Wireless Localization Techniques (Wireless Networks)
/ Комментариев: 0/

Wireless Localization Techniques (Wireless Networks)Название: Wireless Localization Techniques
Автор: Xiaohua Tian, Xinyu Tong, Xinbing Wang
Издательство: Springer
Серия: Wireless Networks
Год: 2023
Страниц: 377
Язык: английский
Формат: pdf (true)
Размер: 15.7 MB

This book first presents a systematic theoretical study of wireless localization techniques. Then, guided by the theoretical results, the authors provide design approaches for improving the performance of localization systems and making the deployment of the systems more convenient. The book aims to address the following issues: how reliable the wireless localization system can be; how the system can scale up with the number of users to be served; how to make key design decisions in implementing the system; and how to mitigate human efforts in deploying the wireless localization system. The book is relevant for researchers, academics, and students interested in wireless localization technology. Wireless localization can be a very appropriate candidate solution, which estimates a wireless terminal’s location by analyzing features of wireless communication signals, such as Wi-Fi, LTE, and BLE.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IoT for Defense and National Security
/ Комментариев: 0/

IoT for Defense and National SecurityНазвание: IoT for Defense and National Security
Автор: Robert Douglass, Keith Gremban, Ananthram Swami, Stephan Gerali
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 516
Язык: английский
Формат: pdf (true), epub
Размер: 40.7 MB

Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments. IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows
/ Комментариев: 0/

Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across WindowsНазвание: Practical Digital Forensics: Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory
Автор: Akashdeep Bhardwaj, Keshav Kaushik
Издательство: BPB Publications
Год: 2023
Страниц: 282
Язык: английский
Формат: epub (true)
Размер: 12.5 MB

A Guide to Enter the Journey of a Digital Forensic Investigator. Forensics offers every IT and computer professional a wide opportunity of exciting and lucrative career. This book is a treasure trove of practical knowledge for anyone interested in forensics, including where to seek evidence and how to extract it from buried digital spaces. The book begins with the exploration of Digital Forensics with a brief overview of the field's most basic definitions, terms, and concepts about scientific investigations. The book lays down the groundwork for how digital forensics works and explains its primary objectives, including collecting, acquiring, and analyzing digital evidence. This book focuses on starting from the essentials of forensics and then practicing the primary tasks and activities that forensic analysts and investigators execute for every security incident. This book will provide you with the technical abilities necessary for Digital Forensics, from the ground up, in the form of stories, hints, notes, and links to further reading. Anyone working as a forensic analyst, forensic investigator, forensic specialist, network administrator, security engineer, cybersecurity analyst, or application engineer will benefit from reading this book. You only need a foundational knowledge of networking and hardware to get started with this book.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Metaverse For Dummies
/ Комментариев: 0/

Metaverse For DummiesНазвание: Metaverse For Dummies
Автор: Ian Khan
Издательство: For Dummies
Год: 2023
Страниц: 307
Язык: английский
Формат: pdf (true)
Размер: 13.3 MB

Your first step to understanding what the metaverse is all about. You've probably heard that the metaverse―a word that seemingly went from nonexistent to everywhere ― is the next big thing in technology. The term metaverse refers to a general category of 3D worlds, mostly accessible with virtual reality (VR) headsets, that you visit and interact with in real time. When you browse the Internet, you look for websites that suit what you want to accomplish. Today the Internet is a place the majority of us visit to connect with friends, buy or sell goods or services, listen to music or watch a movie. You could be using the Internet to learn something new, attend classes, or book flights for your next vacation. Depending on what you need, you probably visit a host of different websites that get you where you want to go or help you accomplish your goals. The metaverse is new and yet similar to the Internet. As with the Internet, when you “browse the metaverse,” you choose the metaverse world that best suits the activity, or experience, you want to immerse yourself in. You may want to meet friends in your hobby group, learn something new, or enjoy a live concert by your favorite artist. The metaverse offers a wide range of activities and yet not all metaverse worlds are the same or identical.