LitMy.ru - литература в один клик

  • Добавил: Chipa
  • Дата: Вчера, 18:50
  • Комментариев: 0

Название: Секретная формула Midjourney
Автор: Мария Дудкина
Издательство: Интернет-издание
Год: 2025
Формат: PDF
Страниц: 511
Размер: 232 Mb
Язык: Русский

Благодаря секретам, описанным в данном курсе вы научитесь взаимодействовать с Midjourney и создавать архитектурные шедевры. Курс предоставляет вам понятные объяснения и практические задания, которые помогут вам разобраться в работе с Midjourney для создания профессиональных изображений.


  • Добавил: literator
  • Дата: 17-07-2025, 05:12
  • Комментариев: 0
Название: Ultimate AWS Certified AI Practitioner (AIF-C01) Exam Guide: Supercharge Your Career in AI with the AWS AI Practitioner (AIF-C01) Certification Using Real-World Applications, Exam Tips and Practical Insights
Автор: Gaurav H Kankaria
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 335
Язык: английский
Формат: epub (true)
Размер: 61.3 MB

Your Complete Roadmap to AWS AI Practitioner Success—Simplified, Practical, and Designed to Help You Pass with Confidence. In today’s AI-powered world, earning the AWS Certified AI Practitioner (AIF-C01) certification is a powerful way to validate your skills, boost your credibility, and stand out in the competitive cloud job market. Ultimate AWS Certified AI Practitioner (AIF-C01) Exam Guide is a comprehensive, beginner-friendly roadmap for professionals, students, and decision-makers looking to master AI and Machine Learning on AWS—and crack the AIF-C01 exam with confidence. Covering everything from AI and ML fundamentals to core AWS services like SageMaker, Bedrock, and Rekognition, this guide also explores Generative AI, vision and language-based AI use cases, and practical tools for personalization, security, and governance. This book is ideal for aspiring AI/cloud professionals, tech sales teams, business leaders, and students seeking a foundational understanding of Artificial Intelligence using AWS.
  • Добавил: literator
  • Дата: 16-07-2025, 18:49
  • Комментариев: 0
Название: Computer Security Fundamentals
Автор: Nastaran Nazar Zadeh
Издательство: Toronto Academic Press
Год: 2025
Страниц: 212
Язык: английский
Формат: pdf (true)
Размер: 17.3 MB

This book aims to provide a thorough understanding of the fundamental concepts of computer security. Topics include cryptography, network security, malware, and risk management. The book also addresses emerging threats and the latest security technologies. Practical examples and case studies help students understand the application of security principles in various contexts. Computer security fundamentals encompass a range of principles, practices, and technologies aimed at protecting computer systems, networks, and data from unauthorized access, attacks, damage, or theft. These fundamentals form the bedrock of a robust security posture and are essential in maintaining the confidentiality, integrity, and availability of information in digital environments. Designed for both undergraduate students and professionals, it lays a solid foundation for further studies in cybersecurity.
  • Добавил: literator
  • Дата: 16-07-2025, 18:05
  • Комментариев: 0
Название: Data and Computer Communications
Автор: Nastaran Nazar Zadeh
Издательство: Toronto Academic Press
Год: 2025
Страниц: 252
Язык: английский
Формат: pdf (true)
Размер: 13.1 MB

The aim of this book is to provide a comprehensive understanding of data and computer communications. Topics include network architecture, protocols, wireless communication, and network security. The book covers both fundamental concepts and advanced technologies in data communication. Practical examples and case studies illustrate the application of concepts in real-world network environments. It is designed for undergraduate and graduate courses in computer science, engineering, and information systems. Data and computer communications refer to the exchange of data between devices or systems with the help of a network. This field encompasses various protocols, technologies and concepts aimed at ensuring efficient and reliable communication. Understanding the foundations of data and computer communications is crucial in an era that is marked by the constant impact of data and the rapid advancement of communication technology. This book aims to provide a thorough exploration of this field through eight insightful chapters.
  • Добавил: literator
  • Дата: 15-07-2025, 19:02
  • Комментариев: 0
Название: Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies
Автор: Dale Meredith
Издательство: BPB Publications
Год: 2025
Страниц: 327
Язык: английский
Формат: epub (true)
Размер: 20.4 MB

Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you through the entire hacking lifecycle, starting with fundamental rules and engagement phases, then moving into extensive reconnaissance using public data, search engines, and social networks to gather intelligence. You will learn active network scanning for live systems, port identification, and vulnerability detection, along with advanced enumeration techniques like NetBIOS, SNMP, and DNS. It also proceeds to explain practical system, exploitation, covering password cracking, social engineering, and specialized tools. It also includes dedicated sections on Wi-Fi network hacks, followed by crucial post-exploitation strategies for maintaining access and meticulously covering your tracks to remain undetected. This book is for IT administrators and security professionals aiming to master hacking techniques for improved cyber defenses.
  • Добавил: literator
  • Дата: 15-07-2025, 08:11
  • Комментариев: 0
Название: Privileged Access Management: Strategies for Zero Trust in the Enterprise
Автор: Gregory C. Rasner, Maria C. Rasner
Издательство: Apress
Год: 2025
Страниц: 295
Язык: английский
Формат: pdf
Размер: 10.1 MB

Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into. Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.
  • Добавил: literator
  • Дата: 15-07-2025, 03:45
  • Комментариев: 0
Название: Cybersecurity, Cybercrimes, and Smart Emerging Technologies
Автор: Ahmed A. Abd El-Latif, Mohammed A ElAffendi, Mohamed Ali AlShara, Yassine Maleh
Издательство: CRC Press
Год: 2026
Страниц: 405
Язык: английский
Формат: pdf (true), epub
Размер: 37.1 MB

This book presents cutting-edge research and advancements in the rapidly evolving fields of cybersecurity, cybercrimes, and smart emerging technologies. It serves as a comprehensive reference guide for the latest trends and challenges in securing our digital world. It highlights critical themes such as the application of AI and Machine Learning in threat detection and automation, the security implications of blockchain and distributed ledger technologies, safeguarding critical infrastructure and the IoT, addressing data privacy and governance, and advancing malware analysis and detection techniques. It also delves into technological breakthroughs in Deep Learning for fake account detection, blockchain for secure data exchange, DDoS mitigation strategies, and novel approaches to malware analysis. These findings provide valuable insights into current and emerging cyber threats and effective countermeasures. This book is an essential resource for researchers, cybersecurity professionals, policymakers, and anyone seeking to understand the complex landscape of cybersecurity in the digital age.
  • Добавил: literator
  • Дата: 11-07-2025, 08:09
  • Комментариев: 0
Название: Practical Cloud Security Handbook: Secure cloud deployments with AWS, Azure, GCP, and IBM Cloud
Автор: Shiv Kumar
Издательство: BPB Publications
Год: 2025
Страниц: 358
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

As organizations rapidly migrate to cloud environments, robust cloud security is no longer optional—it is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native architectures. This handbook systematically guides you from cloud security fundamentals, including the shared responsibility model, through various cloud-native architectural patterns and top cloud workloads like IAM, VPC, and containerization. You will gain a deep understanding of core security concepts, such as encryption and protocols, and then explore the practical, multi-cloud configurations for securing storage, network services, and identity access management across AWS, Azure, IBM, and GCP. The book progresses to vital operational security aspects like monitoring, encryption application, and robust testing. This book is designed for cloud engineers, DevOps professionals, security analysts, and IT architects. It assumes a foundational understanding of cloud computing concepts and basic IT security principles for aspiring cloud security professionals.
  • Добавил: literator
  • Дата: 11-07-2025, 06:40
  • Комментариев: 0
Название: Establishing Security Operations Center: Cyber incident detection analysis and threat hunting for robust security operations
Автор: Sameer Vasant Kulkarni
Издательство: BPB Publications
Год: 2025
Страниц: 567
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and how it helps organizations stay protected 24/7. This book systematically covers the entire lifecycle of a SOC, beginning with cybersecurity fundamentals, the threat landscape, and the profound implications of cyber incidents. It will guide you through why SOCs are critical in today's cyber landscape, how to build one from the ground up, tools, roles, and real-life examples from the industry. The handling of security incidents before they turn into threats can be effective through this book. The entire ecosystem of management of security operations is covered to effectively handle and mitigate them. The book aims to empower the readers to take on the complexities of cybersecurity handling.
  • Добавил: literator
  • Дата: 10-07-2025, 19:16
  • Комментариев: 0
Название: Digital Deception: How Public Access and False MFA Broke the Internet
Автор: Christopher Murphy
Издательство: Apress
Год: 2025
Страниц: 140
Язык: английский
Формат: pdf (true), epub (true), mobi
Размер: 10.1 MB

A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate. Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real Computer Science, to restore trust and security in our digital world. This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet.