LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 2-10-2021, 17:27
  • Комментариев: 0
Securing Critical InfrastructuresНазвание: Securing Critical Infrastructures
Автор: Professor Mohamed K. Kamara Ph.D.
Издательство: Xlibris US
Год: 2020
Страниц: 385
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

This book explains the modern techniques required to protect a cyber security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques. The purpose and significance of this book is to take a fresh look at the techniques, policies and procedures, guidelines, and standards that are commonly required to protect data and information in our cyber world today. These techniques and procedures are necessary in every step of securing organizational assets because of their interdependencies.


  • Добавил: literator
  • Дата: 2-10-2021, 16:39
  • Комментариев: 0
Building Cloud and Virtualization InfrastructureНазвание: Building Cloud and Virtualization Infrastructure: A Hands-on Approach to Virtualization and Implementation of a Private Cloud Using Real-time Use-cases
Автор: Mrs.Lavanya S, Dr. Venkatachalam K, Dr. Saravanakumar
Издательство: BPB Publications
Год: 2021
Страниц: 750
Язык: английский
Формат: pdf, epub
Размер: 22.5 MB

The book ‘Building Cloud and Virtualization Infrastructure’ covers the designing of a private cloud using various components and tools on various platforms such as AWS and OpenNebula. This book includes network virtualization and integrated technologies such as the Internet of Things and how to create web servers/instances on Amazon Web Services and OpenNebula.


  • Добавил: literator
  • Дата: 2-10-2021, 15:35
  • Комментариев: 0
Mobile Edge ComputingНазвание: Mobile Edge Computing
Автор: Yan Zhang
Издательство: Springer
Год: 2022
Страниц: 123
Язык: английский
Формат: pdf (true), epub
Размер: 16.3 MB

It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks. The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Internet of Vehicles, and UAVs. In the last part, we present new opportunities when MEC meets blockchain, Artificial Intelligence, and distributed Machine Learning (e.g., Federated Learning). We also identify the emerging applications of MEC in pandemic, industrial Internet of Things and disaster management. The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of MEC.


  • Добавил: literator
  • Дата: 1-10-2021, 16:54
  • Комментариев: 0
Network Automation RoadmapНазвание: Network Automation Roadmap: From Assessing Organizational Readiness to Planning Adoption
Автор: Steve Petryschuk
Издательство: O’Reilly Media, Inc.
Год: 2021
Язык: английский
Формат: epub
Размер: 10.2 MB

With its vast array of open source resources, scripting, and coding options, network automation can be daunting for IT pros in organizations of all sizes. This report examines business and technology trends in network automation today and delves into practical considerations for teams in small organizations looking to implement or improve automation practices.


  • Добавил: literator
  • Дата: 1-10-2021, 11:51
  • Комментариев: 0
Securing IoT in Industry 4.0 Applications with BlockchainНазвание: Securing IoT in Industry 4.0 Applications with Blockchain
Автор: P. Kaliraj, T. Devi
Издательство: CRC Press
Год: 2022
Страниц: 351
Язык: английский
Формат: pdf (true)
Размер: 20.1 MB

The Industry 4.0 revolution is changing the world around us. Artificial intelligence and machine learning, automation and robotics, big data, Internet of Things, augmented reality, virtual reality, and creativity are the tools of Industry 4.0. Improved collaboration is seen between smart systems and humans, which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation.


  • Добавил: literator
  • Дата: 30-09-2021, 17:32
  • Комментариев: 0
Blockchain A to Z Explained: Become a Blockchain Pro with 400+ TermsНазвание: Blockchain A to Z Explained: Become a Blockchain Pro with 400+ Terms
Автор: Rajesh Dhuddu, Srinivas Mahankali
Издательство: BPB Publications
Год: 2022
Страниц: 512
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Blockchain has emerged as one of the most widely discussed technologies in the last few years among the students, practitioners, crypto enthusiasts and academicians alike. With Blockchain’s growing adoption, several new terms and lexicon are being added continuously to expand its universe comprising concepts, key contributors, latest developments, protocols, tools and lots more. We felt there was a need to introduce an all-encompassing ‘Blockchain Thesaurus’ that would enable practitioners and students to stay abreast of the ‘Who’, ‘Why’ and ‘What’ of the blockchain world as it stands today. With 400+ blockchain terms and growing, this book will address this requirement and equip the readers with all they want to know to become a blockchain pro.


  • Добавил: literator
  • Дата: 30-09-2021, 15:49
  • Комментариев: 0
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media ApplicationsНазвание: Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
Автор: Maniik R Grover
Издательство: BPB Publications
Год: 2021
Страниц: 999
Язык: английский
Формат: pdf, epub
Размер: 15.9 MB

Your All-in-One Guide to the Digital World. Technology touches our lives in many different ways. In this book, we will explore the common uses of technology in the world around you, demystify the concepts, and explain its usage. The book begins by making you comfortable with your Windows PC and Android Smartphone/Tablet. It discusses the Internet and common device connections. It also delves into popular productivity applications like emails, documents, spreadsheets, presentations, maps, photos, music, and videos. Usage of free apps from Google is demonstrated. The book also talks about social media and online tools which allow you to connect and communicate with people on the Internet, with examples from Facebook, Twitter, Instagram, and WhatsApp.


  • Добавил: literator
  • Дата: 29-09-2021, 19:39
  • Комментариев: 0
Название: Хакинг на примерах. Уязвимости, взлом, защита
Автор: Ярошенко А.А.
Издательство: Наука и техника
Год: 2021
Страниц: 320
Язык: русский
Формат: pdf
Размер: 29.1 MB

Из этой книги вы не узнаете, как взламывать банки — ничего противозаконного описано здесь не будет. Мы не хотим, чтобы у наших читателей или кого-либо ещё возникли какие-то проблемы из-за нашей книги. Будет рассказано: об основных принципах взлома сайтов (а чтобы теория не расходилась с практикой, будет рассмотрен реальный пример взлома); отдельная глава будет посвящена угону почтового ящика (мы покажем, как взламывается почтовый ящик — будут рассмотрены различные способы).
  • Добавил: umkaS
  • Дата: 29-09-2021, 08:35
  • Комментариев: 0
Название: Методы защиты информации. Защита от внешних вторжений
Автор: Никифоров С. Н.
Издательство: Лань
Год: 2020 - 3-е изд.
Cтраниц: 100
Формат: pdf (ocr)
Размер: 18 мб
Язык: русский

Предназначено для всех пользователей, стремящихся обеспечить защиту своей информации. Рассматриваются вопросы использования антивирусных программ Comodo Internet Security, Dr. Web CureIt, AVZ и др.
  • Добавил: literator
  • Дата: 28-09-2021, 18:30
  • Комментариев: 0
The Nmap cookbook: Beat the BeastНазвание: The Nmap cookbook: Beat the Beast
Автор: Nima Shahmoradi, Nasim Kangari
Издательство: Amazon.com Services LLC
Год: 2021
Страниц: 241
Язык: английский
Формат: epub
Размер: 10.3 MB

To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation. Nmap is the scanner that other scanners are measured against. it is an indispensable tool that all techies should know well. It is used by all ethical hackers, penetration testers, systems administrators, and anyone in fact who wants to discovery more about the security of a network and its hosts. This book is based on real experiences using Nmap in network security tests on a huge variety of networks. In the end, you will have the information you need to safely and effectively scan networks for vulnerabilities, services, and hosts. You will start out at the very basics and work your way up to writing your own basic Nmap Scripting Engine (NSE) scripts, and you will become an expert to using the most powerful and flexible network scanner available.