LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: Сегодня, 20:57
  • Комментариев: 0
Название: Azure Networking: Understand key concepts and design secure Cloud networking architectures
Автор: Jose Moreno, Adam Stuart
Издательство: BPB Publications
Год: 2025
Страниц: 408
Язык: английский
Формат: epub (true)
Размер: 28.0 MB

In the ever-evolving landscape of Cloud technology, every project demands a robust, high-performance, scalable and secure foundation. Whether you're deploying traditional Virtual Machines or pioneering modern Artificial Intelligence solutions, a well designed Azure Networking infrastructure is critical for success. This book simplifies complex concepts, empowering you to architect reliable and efficient network solutions within the Azure cloud. It takes you from the fundamentals of Azure networking, including VNets, NSGs, and hub-and-spoke models, to advanced topics like Virtual WAN, ExpressRoute, and SD-WAN integration using Route Server. It meticulously covers essential design considerations, security best practices with Azure Firewall, service tags, AVNM security rules and ZTNA, and explores multi-cloud strategies. You will learn how to implement effective DNS with Private Resolver and PaaS networking using Private Link, and master application delivery with load balancing and Front Door. This book is for network architects and engineers familiar with on-premises networking products and protocols. It also benefits cloud architects who understand Azure constructs and want to specialize in its networking capabilities.
  • Добавил: magnum
  • Дата: Вчера, 20:07
  • Комментариев: 0
Advances in Geoinformation SciencesНазвание: Advances in Geoinformation Sciences
Автор: Alias Abdul-Rahman, Ivin A. Musliman, Imzan Hassan, Ainn Zamzuri (Editors)
Издательство: Springer
Год выхода: 2025
Страниц: 378
Формат: True PDF; True ePUB
Размер: 192 MB
Язык: английский

Proceedings of ESRI Users Conference series (by ESRI California); - This book provides discussions on the usage of the specific software like ArcGIS Pro, thus, unlike the intended book which is more advanced solutions and methods. Proceedings of 31st ACM International Conference (by ACM); - This book offers specific solutions to the computing and spatial science community but more for system developers etc, whereas this intended book has broader knowledge spectrum. Proceedings of 18th 3D Geoinfo International Conference (Springer). - This book specifically discusses on 3D GIS research, whereas the intended book gives more breadth thus offers extra insights to the knowledge.
  • Добавил: literator
  • Дата: Вчера, 18:27
  • Комментариев: 0
Название: Hands-on Penetration Testing for Web Applications: Web security testing on modern applications - 2nd Edition
Автор: Richa Gupta
Издательство: BPB Publications
Год: 2025
Страниц: 334
Язык: английский
Формат: epub (true)
Размер: 17.7 MB

Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehensive overview of web application security testing methodologies. Each chapter offers key insights and practical applications that align with the objectives of the course. Students will explore critical areas such as vulnerability identification, penetration testing techniques, using open-source pen test management and reporting tools, testing applications hosted on cloud, and automated security testing tools. Throughout the book, readers will encounter essential concepts and tools such as OWASP Top 10 vulnerabilities, SQL injection, cross-site scripting (XSS), authentication and authorization testing, and secure configuration practices. The target audience for this book includes students, security enthusiasts, penetration testers, and web application developers. Individuals who are new to security testing will be able to build an understanding about testing concepts and find this book useful. People will be able to gain expert knowledge on pentesting tools and concepts.
  • Добавил: literator
  • Дата: 25-05-2025, 20:43
  • Комментариев: 0
Название: The OSINT Bible: The Complete Guide to Mastering Open-Source Intelligence | Discover Critical Information, Protect Sensitive Data, and Gain a Competitive Edge
Автор: Trevor Shelwick
Издательство: Independently published
Год: 2025
Страниц: 357
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

Are you ready to gather critical information that others often overlook? Do you want to use OSINT techniques to uncover the truth and expose hidden threats? In today’s data-driven world, finding the right information can be overwhelming. For professionals in cybersecurity, corporate investigations, or intelligence, missing a critical piece of data could lead to disastrous outcomes. Traditional methods aren’t enough as digital threats evolve, and without the right tools, you risk overlooking vital insights, slowing down your investigations, and falling behind in an ever-changing landscape. Inside this book, you will discover: - 7 Exclusive OSINT Tools: Gain access to unique and powerful tools that will elevate your investigative capabilities; - Master Social Media Investigations: Uncover hidden information from platforms like Facebook, Instagram, and Twitter with advanced techniques; - Image and Video Analysis: Learn how to perform reverse image searches and video forensics to gather critical data; - Anonymity and Security: Protect your identity and secure your OSINT operations with advanced privacy techniques.
  • Добавил: literator
  • Дата: 25-05-2025, 07:44
  • Комментариев: 0
Название: AIoT: Artificial Intelligence of Things
Автор: Arun Sekar Rajasekaran, Fadi Al-Turjman, Suganyadevi S.
Издательство: CRC Press
Серия: Innovations in Intelligent Internet of Everything (IoE)
Год: 2025
Страниц: 421
Язык: английский
Формат: pdf (true), epub
Размер: 48.4 MB

AIoT: Artificial Intelligence of Things explores the integration of Artificial Intelligence (AI) into everyday objects and devices to allow them to analyze data, make decisions, and communicate with each other, which leads to improved efficiency, convenience, and new possibilities in various aspects of daily life. With a wide-ranging scope, the book covers various aspects of Artificial Intelligence of Things (AIoT) from fundamental concepts to advanced applications. It begins with an introduction to AI, Internet of Things (IoT), and their synergistic relationship and explains how AI technologies enhance the capabilities of IoT devices. The book then explores the key components of AIoT, including sensors, connectivity, data processing, and Machine Learning algorithms. The book presents AIoT architectures, such as cloud-based, edge-based, and hybrid systems, and discusses their advantages and challenges. Exploring the role of Big Data analytics in AIoT, it highlights how large-scale data collection and analysis can drive intelligent decision-making and predictive insights. It delves into such AI techniques employed in AIoT systems as natural language processing (NLP), computer vision, Deep Learning, and Reinforcement Learning.
  • Добавил: literator
  • Дата: 23-05-2025, 04:51
  • Комментариев: 0
Название: Infrastructure Attack Strategies for Ethical Hacking: Unleash Advanced Techniques and Strategies to Safeguard Systems, Networks, and Critical Infrastructure in the Ethical Hacking Landscape
Автор: Harpreet Singh, Himanshu Sharma
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 41.1 MB

Defend Systems, Unveil Vulnerabilities, and Safeguard Infrastructure with Expert Strategies. Embark on an immersive journey into the world of ethical hacking with "Infrastructure Attack Strategies for Ethical Hacking". From the initial stages of reconnaissance and enumeration to advanced techniques like attacking routers, databases, and Microsoft Windows systems, this handbook equips you with the skills needed for a comprehensive infrastructure compromise. Encompassing both external and internal enumeration techniques, the book delves into attacking routers and services, establishing footholds, privilege escalation, lateral movement, and exploiting databases and Active Directory. You will gain proficiency in methodologies and tools for ethically compromising systems, navigating through networks, collecting intelligence, and providing effective remediation advice.
  • Добавил: literator
  • Дата: 23-05-2025, 03:07
  • Комментариев: 0
Название: AIoT Innovations in Digital Health: Emerging Trends, Challenges, and Solutions
Автор: Inam Ullah Khan, Salma El Hajjami, Shashi Kant Gupta, Hameedur Rahman
Издательство: CRC Press
Год: 2025
Страниц: 173
Язык: английский
Формат: pdf (true), epub
Размер: 28.2 MB

Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs. This book discusses the use of AI to improve diagnostic accuracy, patient monitoring, the use of remote diagnostic tools, identification of life-threatening diseases, medical robotics applications, drug discovery, technology-driven solutions, and much more. AIoT Innovations in Digital Health: Emerging Trends, Challenges, and Solutions presents integrated technologies such as Green Computing, IoT, and Big Data using AI, Machine Learning, Deep Learning, and Federated Learning for Healthcare. It discusses the future of medical robotics using Machine Learning and highlights the use of Federated Learning-based patient monitoring applications. This book also elaborates on the role that AI and Machine Learning play in drug discovery. Interested readers will include anyone working in or involved in smart healthcare research which includes, but is not limited to, healthcare specialists, computer science engineers, electronics engineers, systems engineers, and pharmaceutical practitioners.
  • Добавил: literator
  • Дата: 22-05-2025, 07:02
  • Комментариев: 0
Название: Mastering NGINX for Site Reliability and Performance Optimization: Master Web Server Configuration, Load Balancing, Traffic Optimization with NGINX for Scalable and High-Performance Systems
Автор: Richa Garg
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 269
Язык: английский
Формат: epub (true)
Размер: 137.9 MB

Unlock the power of NGINX to boost performance and scale effortlessly. NGINX is the backbone of the modern web—powering high-performance websites, APIs, and microservices at scale. Trusted by tech giants and startups alike, it’s a must-have tool for any developer, DevOps engineer, or sysadmin aiming for speed, scalability, and security. "Mastering NGINX for Site Reliability and Performance Optimization" is your ultimate guide to mastering NGINX, from basic setups to advanced configurations. You’ll gain hands-on experience configuring NGINX as a web server, deploying load balancers, and optimizing traffic with caching, compression, and rate limiting. Dive into advanced topics like health checks, canary deployments, and using the NGINX Plus API for dynamic reconfiguration and real-time metrics. With actionable examples, you'll master techniques for performance tuning, securing infrastructure, and fine-tuning NGINX for maximum efficiency in production.
  • Добавил: literator
  • Дата: 20-05-2025, 01:09
  • Комментариев: 0
Название: Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets
Автор: Ron Eddings, MJ Kaufmann
Издательство: O’Reilly Media, Inc.
Год: 2025
Страниц: 340
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administrators will explore key components, from networks and cloud systems to human factors. Authors Ron Eddings and MJ Kaufmann offer actionable solutions for newcomers and experts alike, using Machine Learning and AI techniques. ASM helps you routinely assess digital assets to gain complete insight into vulnerabilities, and potential threats. The process covers all security aspects, from daily operations and threat hunting to vulnerability management and governance. This book is for security professionals—CISOs, security engineers, SOC analysts, and AppSec teams who are constantly fighting to reduce risk, respond to threats, and improve security posture across an increasingly complex digital environment.
  • Добавил: literator
  • Дата: 19-05-2025, 05:31
  • Комментариев: 0
Название: Ultimate Blockchain Security Handbook: Advanced Cybersecurity Techniques and Strategies for Risk Management, Threat Modeling, Pen Testing, and Smart Contract Defense for Blockchain
Автор: Taha Sajid
Издательство: Orange Education Pvt Ltd, AVA
Год: October 2023
Страниц: 211
Язык: английский
Формат: True/Retail PDF, True/Retail EPUB
Размер: 18.7 MB

Blockchain Security is not an option, it's a necessity. The Ultimate Blockchain Security Handbook will help you identify and remediate your Blockchain solution bugs before others do. Covering the latest threats and vulnerabilities, as well as effective mitigation strategies, it takes you on a journey from the security foundations of blockchain technology to implementing advanced security solutions for blockchain applications. It helps you identify, assess, and mitigate risks using a variety of tools and techniques, including threat modeling, penetration testing, vulnerability scanning, attack analysis, and security audits. It covers formal verification methods for testing smart contract code, with an application of the K semantic framework. It then explores a range of blockchain security solutions, including zero-knowledge proof architecture, access control design, establishment of robust public key infrastructures, and the implementation of security logging and monitoring tools to track activities effectively. This book is tailored for blockchain developers, architects, security experts, software professionals, and researchers/cryptographers seeking in-depth knowledge of blockchain security.