LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 30-08-2024, 05:21
  • Комментариев: 0
Название: Cybersecurity Tabletop Exercises: From Planning to Execution
Автор: Robert Lelewski, John Hollenberger
Издательство: No Starch Press
Год: 2025
Страниц: 200
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks. With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture. This book has several audiences in mind. The first is information security professionals and those in related roles who are tasked with creating and facilitating a tabletop exercise for their employer. These individuals might need help executing their organization’s first tabletop exercise, or they might want to improve their performance in an ongoing series of exercises.
  • Добавил: literator
  • Дата: 28-08-2024, 06:52
  • Комментариев: 0
Название: Become GCP Cloud Digital Leader Certified in 7 Days: Getting to Know Google Cloud
Автор: Abhinav Krishna Kaiser
Издательство: Apress
Год: 2024
Страниц: 361
Язык: английский
Формат: pdf
Размер: 14.7 MB

Unlock opportunities in the IT industry through the entry level Google Cloud Platform (GCP) and embark on a journey of Cloud Digital Leader certification. In this book, aspiring IT professionals, IT leaders, and enthusiasts will find a comprehensive resource that simplifies the basic technological elements of GCP and the spread of its products and services that are needed to thrive in the digital age. You’ll begin by reviewing the details of GCP’s role in digital transformation and how cloud technology is revolutionizing businesses around the globe. Next, the book covers the use of data in GCP and AI and machine learning implementations in GCP. Further, it discusses use cases involving data lakes and data warehouses. Following this, you’ll examine cloud infrastructure, including technologies around virtual machines, containerization, and serverless computing. The last section focuses on security, managing operations, and monitoring using GCP. You will also gain insight into Google’s framework for service reliability engineering (SRE). Become GCP Cloud Digital Leader Certified in 7 Days allows you to dive into the world of Google Cloud Platform with confidence, armed with the knowledge to navigate the dynamic landscape of IT and emerge as a digital leader. For those who are in leadership at IT organizations. The book is also for all IT professionals and students preparing for the Google Cloud Platform: Cloud Digital Leader certification.
  • Добавил: literator
  • Дата: 27-08-2024, 12:59
  • Комментариев: 0
Название: Redefining Security With Cyber AI
Автор: Marwan Omar, Hewa Majeed Zangana
Издательство: IGI Global
Год: 2024
Страниц: 287
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In the rapidly evolving digital landscape, the importance of cybersecurity has never been more critical. With the increasing sophistication of cyber threats, traditional security measures often fall short in providing adequate protection. Cyber Artificial Intelligence (AI) offers advanced capabilities to detect, prevent, and respond to attacks in real time. As cyber threats continue to grow in complexity and frequency, the integration of AI into cybersecurity frameworks is not just advantageous but essential for maintaining robust and resilient defenses. Redefining Security With Cyber AI delves into the profound transformation of security paradigms brought about by the advent of AI. This book explores the intricate dance between the ever-expanding frontiers of digital technology and the AI-driven mechanisms that aim to safeguard them. Covering topics such as artificial neural networks, intrusion detection, and large language models, this book is an excellent resource for cybersecurity professionals, AI and Machine Learning researchers, IT executives and managers, policy makers and regulators, postgraduate students and educators, academicians, and more.
  • Добавил: literator
  • Дата: 25-08-2024, 18:47
  • Комментариев: 0
Название: Home Networking Tricks and Tips - 5th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 38.8 MB

"Home Networking Tricks and Tips - 5th Edition 2024" - это совершенное цифровое издание для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить свои навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их в своем "умном доме". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий.
  • Добавил: literator
  • Дата: 25-08-2024, 04:26
  • Комментариев: 0
Название: Cyber Space and Outer Space Security
Автор: Karthikeyan Periyasami, Polinpapilinho F. Katina, Rajagopal Ramasamy
Издательство: River Publishers
Серия: River Publishers Series in Security and Digital Forensics
Год: 2024
Страниц: 293
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of Artificial Intelligence (AI) and data defense in aerospace cybersecurity. A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.
  • Добавил: literator
  • Дата: 25-08-2024, 03:39
  • Комментариев: 0
Название: Industrial Edge Computing: Architecture, Optimization and Applications
Автор: Xiaobo Zhou, Shuxin Ge, Jiancheng Chi, Tie Qiu
Издательство: Springer
Год: 2024
Страниц: 216
Язык: английский
Формат: pdf (true), epub
Размер: 42.3 MB

This book serves as a pivotal guide for professionals and researchers within the industrial computing domain, offering an extensive examination of edge computing in industrial environments. Tailored for individuals possessing a foundational understanding of industrial computing systems, it aims to augment their knowledge concerning the role and capabilities of edge computing in this dynamically evolving sector. In an era where real-time, reliable, and scalable computing solutions are of paramount importance, traditional cloud computing models grapple with challenges such as latency, bandwidth limitations, data sovereignty, and privacy concerns. This book positions edge computing as a crucial evolution in industrial data processing and analytics, specifically addressing these challenges. It introduces a distinctive three-layer industrial edge computing architecture that integrates device, edge, and application layers, explicitly designed to accommodate the intricacies of the Industrial Internet of Things (IIoT). Beyond elucidating the theoretical foundations of edge computing, the book delves into its practical applications, with a particular emphasize on edge-assisted model inference as a key scenario. It offers insightful case studies and discussions on the integration of edge computing with Artificial Intelligence (AI), illustrating how this collaboration is revolutionizing industrial systems. A comprehensive understanding of the material is facilitated by a background in Computer Science, industrial engineering, IoT, and cloud computing.
  • Добавил: literator
  • Дата: 23-08-2024, 03:44
  • Комментариев: 0
Название: Mastering Multi-Cloud Paradigm for Enterprises: Transform Enterprise IT with Multi-Cloud Strategies Using Azure, AWS, and GCP for Optimizing Resources, Enhancing Security and Disaster Recovery
Автор: Barjender Paul
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 776
Язык: английский
Формат: pdf, epub
Размер: 27.9 MB

Building Tomorrow's Enterprise: Embracing the Multi-Cloud Era with AWS, Azure, and GCP. This book is a comprehensive guide designed for IT professionals and enterprise architects, providing step-by-step instructions for creating and implementing tailored multi-cloud strategies. Covering key areas such as security, performance, cost management, and disaster recovery, it ensures robust and efficient cloud deployments. This book will help you learn to develop custom multi-cloud solutions that align with the organization's specific needs and goals. It includes in-depth discussions on cloud design patterns, architecture designs, and industry best practices. The book offers advanced networking strategies and DNS design insights to optimize system reliability, scalability, and performance. Practical tips help readers navigate the complexities of multi-cloud environments, ensuring seamless integration and management across different cloud platforms. Whether new to cloud concepts or an experienced practitioner looking to enhance your skills, this book equips you with the knowledge and tools needed to excel in your role. By following expert guidance and best practices, you can confidently design and implement multi-cloud strategies that foster innovation and operational excellence in your organization. This book is for IT professionals, cloud architects, enterprise architects, and cloud engineers with a basic understanding of cloud computing concepts.
  • Добавил: literator
  • Дата: 22-08-2024, 14:33
  • Комментариев: 0
Название: Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions
Автор: Ahmed A. Abd El-Latif, Lo'ai Tawalbeh, Manoranjan Mohanty, Brij B. Gupta, Konstantinos E. Psannis
Издательство: CRC Press
Год: 2025
Страниц: 293
Язык: английский
Формат: pdf (true)
Размер: 12.2 MB

In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous—it’s imperative. Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions serves as a crucial bridge, connecting the dots between the present knowledge base and the fast-paced developments in this dynamic field. Through a collection of meticulous research and expert insights, this book dissects various facets of digital forensics and cyber security, providing readers with a comprehensive look at current trends and future possibilities. Distinguished by its in-depth analysis and forward-looking perspective, this volume sets itself apart as an indispensable resource for those keen on navigating the complexities of securing the digital domain. The term “zero-day exploits” refers to a specific kind of cyberattack that makes use of a software vulnerability that is not known either to the developer of the product or to the vendors of antivirus software. This indicates that the vendor has zero days’ notice to repair the vulnerability, and that means that attackers can use it to get access to susceptible systems before the company has the opportunity to correct it. Because defenders have no means to learn about or fight against zero-day attacks until after they have been utilized, combating these types of cyberthreats is one of the most challenging aspects. As a result, zero-day attacks are extremely useful for stealing data, installing malware, or interrupting operations. This book aims to serve as a beacon for practitioners, researchers, and students who are navigating the intricate world of digital forensics and cyber security.
  • Добавил: literator
  • Дата: 21-08-2024, 19:30
  • Комментариев: 0
Название: Getting Started with Cryptocurrency: An introduction to digital assets and blockchain
Автор: Kate R Baucherel
Издательство: BCS, The Chartered Institute for IT
Год: 2024
Страниц: 156
Язык: английский
Формат: epub (true)
Размер: 15.6 MB

12% of people hold crypto assets, including your clients and suppliers. How can you manage the risks and reap the benefits of this new technology? Your clients, suppliers or employees may be among the one in eight adults worldwide who hold crypto assets. How can you ensure that crypto transactions are properly accounted for, legally and safely managed, and used to benefit your business? This book is a gateway to the language and applications of crypto and blockchain. It guides you through the opportunities for business improvement and the risks that need to be managed for corporations and private clients, including signposts to relevant legislation, regulation and security considerations. It helps you to make sense of the distinct properties of crypto assets and understand where they can be transformational and where they really aren’t needed, for more effective strategic decision making. Blockchain security relies upon cryptographic techniques, particularly the ability to produce unique hashes to summarise large amounts of data. Hashing is the process of assigning a numeric or alphanumeric string to a piece of data. The same technology lies behind end-to-end encrypted messaging systems, although there are many different encryption methods in use in blockchain applications to maximise security of the chains and the assets they hold. You can experiment with hashing using free online tools to generate SHA-256 (256-bit encryption) hashes for words and phrases, or even entire books, invoices, certificates and transaction records. Quantum computing may threaten current encryption methods as early as 2030, and work has been underway for more than a decade to develop quantum-resistant cryptographic algorithms. This means that data we encrypt now could be read in the future – so be careful about exactly what is recorded on-chain.
  • Добавил: literator
  • Дата: 20-08-2024, 04:48
  • Комментариев: 0
Название: Insecure Digital Frontiers: Navigating the Global Cybersecurity Landscape
Автор: Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2025
Страниц: 209
Язык: английский
Формат: pdf (true)
Размер: 16.9 MB

‘Insecure Digital Frontiers’ is an immersive exploration into the tumultuous realm of cybersecurity, where the ever-expanding digital frontiers are both the battleground and the prize. From the shadows of cybercriminal exploits to the sophisticated dance of advanced persistence threats, this book delves into the vulnerabilities that define our interconnected world. With a panoramic lens, it navigates through the challenges and opportunities that shape the global cybersecurity landscape, offering readers a comprehensive understanding of the insecurities that permeate our digital existence. ‘Insecure Digital Frontiers’ is not just a book; it is an exploration of the insecurities that define our digital age. It matters because it goes beyond the surface, unraveling the complexities of cyber threats while providing actionable insights for individuals, organizations, and policymakers. In a world where the digital frontier is both a promise and a peril, this book serves as a guide for navigating the insecurities that define our interconnected existence. Embark on this journey through the "Insecure Digital Frontiers" and discover the vulnerabilities that lurk in the shadows, the innovations that promise security, and the collective responsibility we share in securing our digital future.