LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 7-12-2020, 22:07
  • Комментариев: 0
SCADA Security: Machine Learning Concepts for Intrusion Detection and PreventionsНазвание: SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention
Автор: Abdulmohsen Almalawi, Zahir Tari
Издательство: Wiley
Год: 2021
Страниц: 212
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems. Cyber-attacks on SCADA systems―the control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory management―can lead to costly financial consequences or even result in loss of life. Minimizing potential risks and responding to malicious actions requires innovative approaches for monitoring SCADA systems and protecting them from targeted attacks. SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention is designed to help security and networking professionals develop and deploy accurate and effective Intrusion Detection Systems (IDS) for SCADA systems that leverage autonomous machine learning.
  • Добавил: buratino
  • Дата: 7-12-2020, 16:15
  • Комментариев: 0
Название: Pro Google Cloud Automation
Автор: Sabharwal, Navin, Pandey, Piyush
Издательство: Apress
Год: 2021
Формат: true pdf/epub
Страниц: 318
Размер: 40 Mb
Язык: English

Discover the methodologies and best practices for getting started with Google cloud automation services including Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins to automate deployment of cloud infrastructure and applications.

The book begins with an introduction to Google cloud services and takes you through the various platforms available to do automation on the GCP platform. You will do hands-on exercises and see best practices for using Google Cloud Deployment Manager, Spinnaker, Tekton, and Jenkins. You’ll cover the automation aspects of the Google Cloud Platform holistically using native and upcoming open source technologies.
  • Добавил: alexcat
  • Дата: 6-12-2020, 21:46
  • Комментариев: 0

Название: Hands-On Ethical Hacking and Network Defense
Автор: Michael T. Simpson, Kent Backman, James E. Corley
Издательство: Course Technology, Cengage Learning
Год: 2013
Формат: PDF
Страниц: 464
Размер: 11,69 МБ
Язык: English

It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"--professional security testers--to put their networks to the test and discover vulnerabilities before attackers do.
  • Добавил: MakSim
  • Дата: 6-12-2020, 17:30
  • Комментариев: 0

Название: Методы и алгоритмы поиска информации в Интернете: монография
Автор: Симанков В.
Издательство: БИБЛИО-ГЛОБУС
ISBN: 978-5-9500501-8-3
Год: 2017
Формат: DjVu
Страниц: 332
Размер: 31 Мб
Язык: русский

В монографии рассмотрены вопросы поиска информации в сети Интернет. Проведён анализ существующих подходов к решению этих вопросов,
применяемых при этом методов и алгоритмов. Приведены универсальные и специализированные программные средства и системы, осуществляющие поиск
информации в глобальной сети, указаны их достоинства и недостатки. Классифицированы подходы, методы, алгоритмы и использующие их системы
поиска информации в сети, а также предложен оригинальный подход к поиску ответов на вопросы в Интернете. Монография предназначена для научных сотрудников и специалистов в области информационного поиска.
  • Добавил: buratino
  • Дата: 6-12-2020, 10:50
  • Комментариев: 0
Название: Securing Cloud Services: A pragmatic approach, 2nd edition
Автор: Lee Newcombe
Издательство: IT Governance Publishing
Год: 2020
Формат: true pdf/epub
Страниц: 375
Размер: 11.9 Mb
Язык: English

Securing Cloud Services – A pragmatic guide gives an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.
Manage the risks associated with Cloud computing – buy this book today!

  • Добавил: buratino
  • Дата: 6-12-2020, 01:26
  • Комментариев: 0
Название: Exam Ref AZ-303 Microsoft Azure Architect Technologies
Автор: Michael Pfeiffer, Derek Schauland, Nicole Stevens, Gurvinder Singh
Издательство: Pearson Education, Inc
Год: 2021
Формат: epub
Размер: 22.6 Mb
Язык: English

Prepare for Microsoft Exam AZ-303–and help demonstrate your real-world mastery of architecting high-value Microsoft Azure solutions for your organization or customers. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level.
  • Добавил: buratino
  • Дата: 5-12-2020, 14:17
  • Комментариев: 0
Название: AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam
Автор: Asif Abbasi
Издательство: Wiley & Sons, Inc
Год: 2021
Формат: True PDF
Страниц: 405
Размер: 12.2 Mb
Язык: English

Move your career forward with AWS certification! Prepare for the AWS Certified Data Analytics Specialty Exam with this thorough study guide
This comprehensive study guide will help assess your technical skills and prepare for the updated AWS Certified Data Analytics exam. Earning this AWS certification will confirm your expertise in designing and implementing AWS services to derive value from data. The AWS Certified Data Analytics Study Guide: Specialty (DAS-C01) Exam is designed for business analysts and IT professionals who perform complex Big Data analyses.
  • Добавил: buratino
  • Дата: 3-12-2020, 21:30
  • Комментариев: 0
Название: Practical Cisco Unified Communications Security
Автор: Brett Hall, Nik Smith
Издательство: Cisco Press
Год: 2021
Формат: epub
Страниц: 528
Размер: 39 Mb
Язык: English

Master the foundations of modern Cisco Unified Communications (UC) system security
This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives.
  • Добавил: literator
  • Дата: 3-12-2020, 17:34
  • Комментариев: 0
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd EditionНазвание: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition
Автор: Ross Anderson
Издательство: Wiley
Год: 2020
Страниц: 1235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly updated classic. In this newly revised Third Edition of Security Engineering: A Guide to Building Dependable Distributed Systems, celebrated security expert Ross Anderson updates his best-selling textbook to help you meet the challenges of the coming decade. Security Engineering became a classic because it covers not just the technical basics, such as cryptography, access controls and tamper-resistance, but also how they're used in real life. Real-world case studies – of the security of payment systems, military systems, the phone app ecosystems and now self-driving cars – demonstrate how to use security technology in practice, and what can go wrong.
  • Добавил: alexcat
  • Дата: 2-12-2020, 07:32
  • Комментариев: 0

Название: Advanced Technologies and Wireless Networks Beyond 4G
Автор: Nathan Blaunstein, Dr. Yehuda Ben-Shimol
Издательство: John Wiley & Sons
Год: 2021
Формат: PDF
Страниц: 252
Размер: 10.82 МБ
Язык: English

Wireless Networks Technologies offers an authoritative account of several current and modern wireless networks and the corresponding novel technologies and techniques. The text explores the main aspects of the "physical layer" of the technology. The authors—noted experts on the topic—examine the well-known networks (from 2-G to 3-G) in a historical perspective. They also illuminate the "physical layer" of networks while presenting polarization diversity analysis and positioning of any subscriber located in areas of service both for land-to-land and land-to-atmosphere communication links.