LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 15-08-2025, 20:55
  • Комментариев: 0
Название: Ghidra for Security Professionals: A Guide to Reverse Engineering, Binary Analysis, and Exploit Development
Автор: Luke Kaur
Издательство: Independently published
Год: 2025
Страниц: 204
Язык: английский
Формат: pdf, epub (true), mobi
Размер: 10.1 MB

Discover the power of Ghidra, the open-source reverse engineering framework transforming how security professionals analyze binaries and uncover vulnerabilities. Ghidra for Security Professionals is a comprehensive guide designed for cybersecurity experts, penetration testers, and malware analysts looking to master the art of reverse engineering. This book takes you step-by-step through using Ghidra's robust features to deconstruct complex binaries, analyze malicious code, and identify exploitable vulnerabilities. In a world filled with reverse engineering tools, what sets Ghidra apart is its open-source philosophy and extensibility. It empowers users to adapt and extend its capabilities to meet specific needs. More importantly, Ghidra levels the playing field, making professional-grade analysis tools accessible to individuals and organizations alike. By learning Ghidra, you’re not just acquiring a skill—you’re joining a community of innovators who are shaping the future of cybersecurity.
  • Добавил: literator
  • Дата: 14-08-2025, 00:37
  • Комментариев: 0
Название: Cybersecurity with AWS: Fortifying Digital Frontiers
Автор: Syed Rehan
Издательство: Apress
Год: 2025
Страниц: 299
Язык: английский
Формат: pdf
Размер: 10.1 MB

Learn the most important topics in securing AWS environments through a strategic combination of fundamental principles, real-case studies, and hands-on practice to battle new generations of cyber-attacks. The book offers a definitive guide to AWS cybersecurity, ranging from identity and access management, Zero Trust architecture, and cloud threat intelligence through advanced detection methods, forensics, and incident response strategies. We start with a deep dive into AWS security fundamentals, such as the shared responsibility model, security pillars, reference architecture, and compliance frameworks like NIST, ISO/IEC 27001, PCI DSS, GDPR, and HIPAA. We then demystify cloud security by explaining threat modeling, risk analysis, network security, secure configurations, and automated security monitoring with AWS-native services such as AWS Security Hub, GuardDuty, WAF, and IAM. The book finishes with a forward-looking discussion of AI-powered threats such as deepfake attacks, AI-powered malware, and next-generation adversarial attacks and defense countermeasures founded on AI-powered detection and automation.
  • Добавил: literator
  • Дата: 13-08-2025, 15:38
  • Комментариев: 0
Название: Applications of Blockchain Technology
Автор: Arvind Mewada, Nagendra Singh, Mohd. Aquib Ansari, Amrendra Singh Yadav
Издательство: CRC Press
Год: 2026
Страниц: 280
Язык: английский
Формат: pdf (true), epub
Размер: 17.6 MB

This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps. It examines blockchain's role in enhancing transparency, security, and decentralisation across various sectors and in society. The book addresses both the advancements and challenges of blockchain, providing practical use cases to understand the opportunities, limitations, and innovative applications of blockchain, envisioning a future where this technology drives significant societal change. Blockchain is a distributed ledger technology that enables decentralised data storage across several computers (nodes). Blockchain comprises a block’s series, and each block plays the role of a public ledger, having a list of transactions, a timestamp, and a link to the block before it. Because of this structure, it is very difficult to change the data without also changing all of the blocks that come after it, which would require agreement from most of the network. Since a network of nodes uses a consensus method to validate and record transactions, the decentralised nature of blockchain eliminates the need for central authority. This decentralisation guarantees the security, integrity, and transparency of the data recorded on the blockchain when combined with cryptographic methods.
  • Добавил: literator
  • Дата: 13-08-2025, 13:04
  • Комментариев: 0
Название: Web Penetration Testing: Advanced Guide | Create 45 Security Assessments | Including OWASP Top 10
Автор: Nathan Beckford
Издательство: Independently published
Год: 2025
Страниц: 497
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Unlock the skills to test and secure modern web applications—step by step. In today's digital world, web applications are prime targets for cyberattacks. This practical guide empowers you to defend them. Designed for security professionals, developers, and ethical hackers, this book offers a complete roadmap to mastering web penetration testing with real-world techniques and tools. Through 45 guided security assessments, you'll learn how to ethically exploit and secure vulnerabilities across every layer of a web application. Each assessment is mapped to real threats and structured around the latest OWASP Top 10, covering issues like broken access control, injection flaws, and server-side request forgery (SSRF). This book is written for those who are ready to take their skills to the next level. Maybe you’re a developer who wants to secure your applications, a security analyst preparing for a certification, or an ethical hacker looking to sharpen your craft. Wherever you are in your journey, I’ve designed this guide to meet you there. It assumes you have a basic understanding of web technologies—HTML, jаvascript, HTTP, and the like—and some familiarity with cybersecurity concepts.
  • Добавил: umkaS
  • Дата: 11-08-2025, 21:00
  • Комментариев: 0
Название: Сетевые игры
Автор: Мазалов В. В., Чиркова Ю. В.
Издательство: Лань
Год: 2021
Cтраниц: 320
Формат: pdf (ocr)
Размер: 49 мб
Язык: русский

Книга посвящена теоретико-игровому анализу игр, определенных на информационных и коммуникационных сетях. Рассматриваются теоретико-игровые модели маршрутизации, распределения информационных ресурсов, управления заданиями при организации вычислений, социальные сети, конкуренция и кооперация в транспортных сетях, задачи ценообразования и размещения ресурсов на рынке транспортных услуг.
  • Добавил: umkaS
  • Дата: 11-08-2025, 17:18
  • Комментариев: 0
Название: Теоретическая криптография
Автор: Ростовцев А.Г., Маховенко Е.Б.
Издательство: СПб.: АНО НПО "Профессионал"
Год: 2005
Cтраниц: 480
Формат: djvu
Размер: 10 мб
Язык: русский

Издание включает в себя материалы книг "Алгебраические основы криптографии", "Введение в криптографию с открытым ключом", "Введение в теорию итерированных шифров", выпущенных в издательстве "Мир и Семья" в 2000-2003 гг. Книга состоит из трех частей. Первая часть содержит сведения из алгебры, теории чисел, алгебраической геометрии.
  • Добавил: literator
  • Дата: 10-08-2025, 20:29
  • Комментариев: 0
Название: Introduction to Wireless Networking and Its Impact on Applications, Second Edition
Автор: Peter Steenkiste
Издательство: Springer
Год: 2026
Страниц: 146
Язык: английский
Формат: pdf (true), epub
Размер: 25.3 MB

This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges. This Second Edition includes key updates on these topics, which have become increasingly important as internet users rely more and more on wireless access links for diverse tasks such as web browsing, video conferencing, interactive games, and data sharing. The author compares and contrasts wireless and wired networks, explaining that users expect high quality performance regardless of how they access the internet, even though wireless networks are much more difficult to build than wired networks. Structured according to the layers in the Internet protocol stack, the book discusses the challenges involved in building wireless networks and the obstacles that can affect their performance in real-world applications. The author also provides strategies for approaching these challenges and obstacles. This Second Edition incorporates new information on several topics, including WiFi and 5G cellular.
  • Добавил: literator
  • Дата: 10-08-2025, 05:09
  • Комментариев: 0
Название: Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies
Автор: Mehmet Emin Erendor
Издательство: CRC Press
Год: 2026
Страниц: 203
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics, and security. However, despite this series of cyberattacks, the North Atlantic Treaty Organization (NATO) did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, while there has been no common definition of "cyber terrorism" by the international community, some scholars regard "cyberattacks" as acts of war. There is a paucity of literature dealing with the application of international law on cyber threats. A new Strategic Concept was adopted in 2010. Its most important development was to identify the significance of cyber threats to all NATO member bodies. Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber-terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear.
  • Добавил: literator
  • Дата: 9-08-2025, 19:18
  • Комментариев: 0
Название: The Computer Security Workbook: A Course Companion Resource
Автор: Juan Tapiador
Издательство: Springer
Серия: Undergraduate Topics in Computer Science
Год: 2025
Страниц: 178
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Mastering computer security requires more than just technical knowledge of software, systems and networks—it demands analytical thinking, a problem-solving mindset, and creative reasoning. These skills are best cultivated through practical challenges and structured problem-solving. This book presents a collection of questions and problems on a wide range of topics typically taught in introductory computer security courses, including basic concepts and principles, authentication techniques, access control models and methods, network security, software vulnerabilities, and malware. This unique textbook/reference offers broad appeal: The exercises are intended to complement other learning materials and are tailored to different skill levels, allowing beginners to build a strong foundation while offering advanced challenges to more experienced learners.
  • Добавил: literator
  • Дата: 7-08-2025, 14:19
  • Комментариев: 0
Название: Ultimate Google Professional Cloud Architect Certification Guide: Build Real-World, Enterprise-Ready Solutions on Google Cloud Platform and Ace the Google Professional Cloud Architect Exam
Автор: Shounak Acharya
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 344
Язык: английский
Формат: epub (true)
Размер: 39.4 MB

Architect Google Cloud Solutions That Go Beyond Certification. In today’s cloud-first world, the Google Cloud Professional Cloud Architect certification stands as one of the most respected credentials in enterprise IT. Ultimate Google Professional Cloud Architect Certification Guide is your companion to achieving that goal. This book goes far beyond exam preparation. It is a hands-on, real-world companion that walks you through every architectural decision-making point you will face on Google Cloud Platform (GCP). You will begin with the building blocks, such as Compute Engine, Autoscaling, Load Balancing, and Storage. From there, you will navigate through advanced networking, managed services like App Engine, and orchestration, using Google Kubernetes Engine (GKE). As the chapters progress, you will unlock the power of serverless architectures with Cloud Functions and Cloud Run, explore asynchronous communication via Pub/Sub and Dataflow, and dive into Google Cloud’s relational, NoSQL, and caching databases. You will also master observability with Cloud Operations Suite and apply DevOps, CI/CD, and SRE principles in practical, deployment-ready scenarios.