LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 17-12-2025, 05:38
  • Комментариев: 0
Название: Lessons from the Frontlines: Insights from a Cybersecurity Career
Автор: Assaf Keren
Издательство: Wiley
Год: 2026
Страниц: 274
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Transform your approach to cybersecurity leadership with specific, actionable techniques from a 25+ year veteran of the industry. In Lessons from the Frontlines: Insights from a Cybersecurity Career, a 25+ year veteran of cybersecurity leadership, Assaf Keren, delivers an essential new approach to leading cybersecurity teams. Keren combines engaging, real-life stories drawn from decades spent in the industry – including his current role as Chief Security Officer at Qualtrics and former Chief Information Security Officer in PayPal – with hands-on, specific frameworks for implementing effective solutions in an environment that doesn’t tolerate error. Perfect for practicing and aspiring cybersecurity executives, Lessons from the Frontlines is a must-read strategy guide for all cybersecurity practitioners and professionals interested in rising to – or excelling in – cybersecurity leadership roles.
  • Добавил: literator
  • Дата: 17-12-2025, 04:16
  • Комментариев: 0
Название: Introduction to Cybersecurity: Concepts, Principles, Technologies and Practices
Автор: Ajay Singh
Издательство: Universities Press
Год: 2023
Страниц: 328
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

In today's digital world, cybersecurity is an essential and critical survival skill. This book aims to provide students with foundational knowledge across the broad range of topics that they need to navigate cybersecurity challenges at the individual and organizational level. It offers an in-depth examination of the various types of cybercrimes and cyberattacks and the management practices, strategies, tools and technologies that can be used to secure information. It also explores cyber laws and regulations and explains how the evolution of and advances in digital technologies have had a major influence on both cybercrime and cybersecurity. Hackers are constantly probing applications to find vulnerabilities that they can exploit. Vulnerabilities are also discovered by the software developers themselves, or users or researchers who notify/warn the concerned vendor company that a fix is needed. A software vulnerability that is publicly known to those who should be concerned with its mitigation including the vendor of the target software and for which no fix/patch has been released is called a zero-day vulnerability.
  • Добавил: umkaS
  • Дата: 16-12-2025, 13:06
  • Комментариев: 0
Название: Основы современной криптографии и стеганографии (2013)
Автор: Рябко Б.Я., Фионов А.Н.
Издательство: Издательство "Горячая линия-Телеком"
Год: 2013 - 2-е издание
Cтраниц: 232
Формат: pdf
Размер: 12 мб
Язык: русский

В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации.
  • Добавил: literator
  • Дата: 16-12-2025, 07:42
  • Комментариев: 0
Название: Become ISC2 Certified in Cybersecurity: Everything you need to get the certification (MEAP v4)
Автор: Paulo Carreira, Andreé Miranda Louraço
Издательство: Manning Publications
Год: 2025
Страниц: 296
Язык: английский
Формат: pdf (true), epub
Размер: 24.4 MB

Jump start your career in cybersecurity by acing the ISC2 Certified in Cybersecurity (CC) exam! ISC2 certifications like CISSP have always signaled job-ready skills to employers. The new Certified in Cybersecurity (CC) exam is your first step toward an exciting—and lucrative—career in cybersecurity. In Become ISC2 Certified in Cybersecurity, you’ll learn from expert tutors Paulo Carreira and Andreé Miranda how to pass on the very first try! Become ISC2 Certified in Cybersecurity is expertly written to match the tone, structure, and challenges you’ll face when you sit for the real ISC2 CC. It breaks down complex cybersecurity concepts into real-world examples that are easy to understand and to put into practice. You’ll learn how to handle everyday security issues, including responding to an insider threat, managing access after a staff member leaves, and identifying a misconfigured firewall rule. The book's diagrams and illustrations ensure you’re always engaged with what you’re learning. For both technical and non-technical professionals starting out or transitioning into cybersecurity.
  • Добавил: literator
  • Дата: 13-12-2025, 23:40
  • Комментариев: 0
Название: Zero Trust Security: A Hands-on Guide
Автор: Adam Tilmar Jakobsen
Издательство: Wiley
Год: 2026
Страниц: 224
Язык: английский
Формат: epub (true)
Размер: 12.0 MB

Principles, applications, and methodologies to help organizations transition from traditional security models to a Zero Trust approach. Zero Trust Security is a hands-on guide that bridges the gap between Zero Trust theory and real-world practice through a unique and practical approach. Following the journey of a fictional manufacturing company, readers learn how to go from a flat network into a robust Zero Trust architecture. Through step-by-step implementations, the book demonstrates the essential elements of modern security architecture. Each chapter provides both theoretical understanding and practical implementation guidance. The included Docker environments and configuration files enable readers to practice implementations in a safe environment, making complex security concepts tangible and actionable. For readers just beginning their Zero Trust journey or enhancing existing security controls, this guide offers actionable insights to build a more resilient security architecture.
  • Добавил: literator
  • Дата: 13-12-2025, 08:01
  • Комментариев: 0
Название: The Cybersecurity Game Master: From Role Playing Games to Tabletop Exercises that Engage and Inspire
Автор: Roberto Dillon
Издательство: CRC Press
Год: 2026
Страниц: 203
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.1 MB

In today’s digital landscape, no company is immune to cyberattacks, making preparedness essential for any organization, regardless of size. Enter the world of Tabletop Exercises (TTXs), a cost-effective and results-driven approach to test cyber crises proactively. However, workplace dynamics can hinder effective participation as the fear of proposing wrong decisions and the apprehension of appearing less competent in front of colleagues can still stifle creativity, even during a simple exercise. This book addresses these concerns by injecting a fresh perspective, seamlessly integrating elements from Role-Playing Games (RPGs) into the design and execution of TTX scenarios to make them more engaging and fun. The Cybersecurity Game Master invites readers not only to master the TTX mindset but also to embrace it as a gamified experience, fostering a dynamic learning environment without the fear of judgment. By infusing fun into the serious business of cybersecurity, this book redefines TTX design, allowing teams to enjoy the process of understanding their company, procedures, and future challenges in a stress-free manner.
  • Добавил: literator
  • Дата: 12-12-2025, 22:38
  • Комментариев: 0
Название: IoT Signal Detection
Автор: Rui Han, Jingjing Wang, Lin Bai, Jianwei Liu
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 208
Язык: английский
Формат: pdf (true), epub (true)
Размер: 16.3 MB

Comprehensive reference covering signal detection for random access in IoT systems from the beginner to expert level. With a carefully balanced blend of theoretical elements and applications, IoT Signal Detection is an easy-to-follow presentation on signal detection for IoT in terms of device activity detection, sparse signal detection, collided signal detection, round-trip delay estimation, and backscatter signal division, building progressively from basic concepts and important background material up to an advanced understanding of the subject. Various signal detection and estimation techniques are explained, e.g., variational inference algorithm and compressive sensing reconstruction algorithm, and a number of recent research outcomes are included to provide a review of the state of the art in the field. With seamless coverage of the subject presented in a linear and easy-to-understand way, IoT Signal Detection is an ideal reference for both graduate students and practicing engineers in wireless communications.
  • Добавил: literator
  • Дата: 11-12-2025, 14:35
  • Комментариев: 0
Название: Distributed and Parallel Computing
Автор: Sandhya Avasthi, Suman Lata Tripathi
Издательство: Wiley-Scrivener
Год: 2026
Страниц: 357
Язык: английский
Формат: pdf, epub (true)
Размер: 35.7 MB

Master the growing field of distributed and parallel computing with this essential guide, offering expert insights into the fundamentals and real-world applications for intelligent and collaborative systems. Distributed computing, or running programs across multiple computers over a network, is becoming a popular solution for addressing the demands for increased performance across industries, including scientific computing, oil exploration, biotechnology, and medicine. Distributed computing enables seamless communication and collaboration by allowing users from different locations to access and interact with their digital twin simultaneously. Distributed computing enhances the capabilities of digital twins by providing scalability, parallel processing, real-time data integration, collaboration support, resource optimization, fault tolerance, and security features. Distributed and Parallel Computing explores the fundamentals and innovations in intelligent and distributed computing systems and applications, including adaptivity and learning, agents and multi-agent systems, argumentation, case-based reasoning, and collaborative systems.
  • Добавил: literator
  • Дата: 10-12-2025, 06:09
  • Комментариев: 0
Название: IBN and Service Management for 5G and Beyond
Автор: Krzysztof Przystupa, Mykola Beshley
Издательство: Routledge
Год: 2025
Страниц: 317
Язык: английский
Формат: pdf (true), epub
Размер: 45.1 MB

This monograph focuses on the fundamental principles of intent‑based networking (IBN) technology operation and integration for managing 5G and beyond. IBN can not only largely automate processes but also improve connectivity and increase the efficiency of network design, deployment, and management. IBN and Service Management for 5G and Beyond presents new methods, algorithms, and models for applying IBN to solve complex problems such as resource allocation, quality of service/quality of experience (QoS/QoE), process automation, and network security. It explains how IBN works and why IBN is an evolution of software‑defined networking (SDN), and how it can be used for 5G and future networks. This monograph covers the fundamentals of IBN, detailing the main components, deployment methods, and case studies. It presents the challenges and benefits of deploying IBN in a 5G system, managing resources, segmenting the network, and improving QoE. Network automation and the prediction of QoS degradation using Artificial Intelligence (AI) and Machine Learning to avoid outages are discussed.
  • Добавил: literator
  • Дата: 10-12-2025, 04:37
  • Комментариев: 0
Название: Cybersecurity: A Practical Introduction
Автор: Nihad A. Hassan, Rami Hijazi
Издательство: CRC Press
Год: 2026
Страниц: 279
Язык: английский
Формат: pdf (true), epub
Размер: 26.7 MB

In today’s hyperconnected world, digital threats lurk in every corner of cyberspace. This comprehensive guide equips you with essential knowledge to identify, mitigate, and counter cyber threats, navigating the increasingly dangerous digital landscape. From cryptographic foundations to advanced persistent threats, you’ll master the core concepts that transform novices into digital defenders. Each chapter tackles critical security domains, including online tracking defenses, ransomware identification, social engineering countermeasures, and OSINT techniques used by both defenders and attackers. Whether you’re securing personal devices against tracking, protecting enterprise networks from nation-state actors, or building comprehensive defense strategies, this book is for working professionals, computing specialists, and IT enthusiasts, providing you with practical, actionable knowledge for today’s security challenges.