LitMy.ru - литература в один клик

  • Добавил: umkaS
  • Дата: 10-11-2025, 17:08
  • Комментариев: 0
Название: Программные и аппаратные трояны – способы внедрения и методы противодействия: Первая техническая энциклопедия (в 2-х книгах)
Автор: Белоус А.И., Солодуха В.А., Шведов С.В. под редакцией А. И. Белоуса
Издательство: Техносфера
Год: 2019
Cтраниц: 688+630
Формат: pdf
Размер: 239 мб
Язык: русский

Впервые в мировой научно-технической литературе в объеме одного комплексного издания последовательно и детально исследован феномен программных и аппаратных троянов, которые фактически являются технологической платформой современного и перспективного информационно-технического оружия (кибероружия).
  • Добавил: literator
  • Дата: 31-10-2025, 22:08
  • Комментариев: 0
Название: IAM and PAM Cybersecurity: Securing Identities and Access Management in the Digitalization Era
Автор: Massimo Nardone
Издательство: Apress
Год: 2025
Страниц: 145
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In today's digital age, organizations face growing cyber threats targeting user identities and access credentials. Identity and Access Management (IAM) helps secure identities, manage privileges, and enforce security policies--making it essential for zero-trust security, compliance, and efficiency. Privileged Access Management (PAM), a specialized branch of IAM, focuses on protecting and monitoring privileged accounts such as administrators, root users, and service accounts. Because these accounts have elevated access, they are prime targets for cyberattacks. Together, IAM and PAM safeguard access to systems, applications, and data, playing a vital role in cloud security, IoT, and enterprise environments by preventing unauthorized access and mitigating insider threats.
  • Добавил: literator
  • Дата: 30-10-2025, 20:28
  • Комментариев: 0
Название: Microsoft Azure in Action (Final Release)
Автор: Lars Klint
Издательство: Manning Publications
Год: 2026
Страниц: 370
Язык: английский
Формат: pdf (true)
Размер: 29.7 MB

Unlock the full power of Microsoft Azure for creating, deploying, and managing applications. Through developer-friendly language and hands-on examples, Microsoft Azure in Action teaches you how to quickly master the core principles of cloud computing and start creating Azure-powered apps and architectures. Microsoft Azure in Action is your fast-track guide to building and managing applications on Microsoft’s industry-leading cloud platform. You’ll explore the foundational pillars of Azure—compute, networking, and storage—that power everything on the platform. Packed with hands-on examples, clear guidance, and a touch of wit, this book makes learning Azure both practical and genuinely enjoyable. For software developers. Assumes familiarity with a scripting language like PowerShell.
  • Добавил: umkaS
  • Дата: 30-10-2025, 07:36
  • Комментариев: 0
Название: Защита сетей. Подход на основе анализа данных
Автор: Коллинз М.
Издательство: ДМК Пресс
Год: 2020
Cтраниц: 308
Формат: pdf (ocr)
Размер: 12 мб
Язык: русский

Традиционных способов обнаружения вторжений и анализа системных журналов уже недостаточно для защиты сложных современных сетей. В данной книге специалист по проблемам безопасности Майкл Коллинз предлагает различные методы и инструменты для сбора и анализа данных о трафике. Вы поймете, как используется ваша сеть и что необходимо для обеспечения ее безопасности. Рассматриваются процессы сбора и организации данных, инструменты для их анализа, а также различные аналитические сценарии и методики.
  • Добавил: literator
  • Дата: 30-10-2025, 01:48
  • Комментариев: 0
Название: Learning Cloud Computing: Building Cloud Skills for Today’s IT Infrastructure (Early Release)
Автор: Semirah Dolan
Издательство: O’Reilly Media, Inc.
Год: 2025-10-28
Страниц: 108
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

To thrive in today's competitive tech landscape, cloud computing skills are no longer a luxury; they're a necessity. This book offers a clear, accessible guide to the fundamentals of cloud technology, helping readers navigate this rapidly evolving field. Perfect for engineers, developers, product managers, and IT leaders, Learning Cloud Computing teaches the essential skills needed to design, deploy, and optimize cloud-based applications while gaining a big-picture understanding of how the cloud has transformed the tech landscape. With real-world examples, practical exercises, and easy-to-understand explanations, author Semirah Dolan covers critical topics like cloud service models, containers, security best practices, deployment strategies, and cost optimization. Whether you're modernizing legacy systems, leading a cloud migration, or exploring cloud native architectures, this book equips you to approach cloud initiatives with confidence.
  • Добавил: literator
  • Дата: 30-10-2025, 00:50
  • Комментариев: 0
Название: Cybersecurity Audit Essentials: Tools, Techniques, and Best Practices
Автор: Armend Salihu
Издательство: Apress
Год: 2025
Страниц: 816
Язык: английский
Формат: pdf (true), epub
Размер: 32.2 MB

In a world where cyber threats are more pervasive and sophisticated than ever, this book serves as a trusted companion for professionals charged with protecting critical digital assets. It bridges the gap between theoretical understanding and real-world application, equipping readers with the tools, techniques, and insights to conduct effective cybersecurity audits confidently. The guide takes readers through every stage of the audit process—from planning and scoping to execution, reporting, and follow-up—offering actionable advice at each step. It unpacks the core principles of cybersecurity auditing, such as risk assessment, compliance frameworks, and leveraging advanced tools and technologies. Readers will gain the skills to identify vulnerabilities, evaluate the effectiveness of security measures, and ensure compliance with regulatory requirements. For IT auditors, cybersecurity auditors, cybersecurity professionals, and IT specialists who need a practical, hands-on guide to navigate the challenges of cybersecurity auditing in today’s complex digital landscape.
  • Добавил: literator
  • Дата: 28-10-2025, 17:03
  • Комментариев: 0
Название: Attack Vectors: The History of Cybersecurity
Автор: Morey Haber
Издательство: Apress
Год: 2025
Страниц: 402
Язык: английский
Формат: pdf (true)
Размер: 11.5 MB

From early worms to AI powered deepfakes, Attack Vectors chronicles the relentless battle between hackers and defenders. This deep dive into cybersecurity’s evolution unpacks the rise of malware from the Morris Worm to Stuxnet and the cyber syndicates that turned hacking into a billion-dollar underground industry. It explores devastating exploits like CodeRed and HeartBleed, revealing how vulnerabilities become weapons. Meet the visionaries who built the internet’s defenses and the adversaries who found ways to break them. Governments, corporations, and rogue actors all play a role in this ongoing digital war, where data is power, and deception is an art. As cyber-attacks grow more sophisticated, understanding the past is crucial to securing the future. Attack Vectors is essential reading for anyone navigating today’s high-stakes cyber landscape to learn lessons from the past and how solutions today address the most attack vectors predicted in the future. For new security management professionals, auditors, and information technology staff looking to understand the history of cyber-security.
  • Добавил: umkaS
  • Дата: 22-10-2025, 11:57
  • Комментариев: 0
Название: Сетевые технологии высокоскоростной передачи данных
Автор: Будылдина Н.В., Шувалов В.П.
Издательство: Горячая линия-Телеком
Год: 2018
Cтраниц: 342
Формат: pdf (ocr)
Размер: 11 мб
Язык: русский

В компактной форме изложены вопросы построения инфокоммуникационных сетей, обеспечивающих высокоскоростную передачу данных. Представлены разделы, которые необходимы для понимания того как можно обеспечить передачу не только с высокой скоростью, но и с другими показателями, характеризующими качество предоставляемой услуги.
  • Добавил: literator
  • Дата: 21-10-2025, 03:05
  • Комментариев: 0
Название: Blockchain Without Barriers: An Authentic Guide to Blockchain Interoperability
Автор: Poornachandra Sarang, Leena Nadkar
Издательство: Springer
Серия: SpringerBriefs in Computer Science
Год: 2025
Страниц: 178
Язык: английский
Формат: pdf (true), epub
Размер: 30.1 MB

Blockchain interoperability is revolutionizing how digital assets and data move across decentralized networks. This book provides a comprehensive exploration of the protocols and frameworks that enable seamless interaction between diverse blockchains. With a focus on leading solutions such as LayerZero ULN, Polkadot XCM, Cosmos IBC, and Chainlink CCIP, readers gain a deep understanding of the mechanisms driving cross-chain communication. Blockchain Without Barriers also deals with the vulnerabilities that have challenged the industry, examining incidents such as the Wormhole and Nomad exploits that resulted in significant financial losses. Addressing these challenges, the book offers a practical guide to simulating and enhancing interoperability technologies. Detailed code walkthroughs demonstrate how to replicate bridges, relayers, and event-driven contracts using Truffle, Ganache, and Solidity, empowering readers to experiment and innovate on their own desktops.
  • Добавил: literator
  • Дата: 17-10-2025, 08:17
  • Комментариев: 0
Название: Blue Team Handbook: Incident Response (Early Release)
Автор: Don Murdoch
Издательство: O’Reilly Media, Inc.
Год: 2025-10-16
Страниц: 191
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

As cyberthreats grow and infrastructure evolves, organizations must prioritize effective, dynamic, and adaptable incident response. Based on the original print bestseller, Blue Team Handbook: Incident Response is now available for the first time in a digital format. This trusted and widely used field guide for cybersecurity incident responders, SOC analysts, and defensive security professionals distills incident response essentials into a concise, field-ready format. Author Don Murdoch draws on decades of real-world experience in incident response and cybersecurity operations to provide actionable guidance and sample workflows you can immediately apply in your own work. Whether you're investigating an alert, analyzing suspicious traffic, or strengthening your organization's IR capability, you'll find this updated edition an essential resource for hands-on practitioners.