Добавить в закладки
Наш форум
Правила Litmy.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


Название: Wireless Mesh Networks
Автор: Alvin Albuero De Luna
Издательство: Arcler Press
Год: 2022
Страниц: 258
Язык: английский
Формат: pdf (true)
Размер: 19.6 MB

Wireless mesh networks (WMNs) will dominate in the coming decade as they are one of the primary technologies. They will assist in understanding the awaited dream of network connectivity anywhere, at any time, at a low cost. As a result, in the next-generation Internet, they will play a significant part. Their ability to self-organize greatly minimizes the complexity of network implementation and maintenance, necessitating a low initial investment. Simple mesh clients and mesh routers make up these networks, which make the backbone of WMNs. Mesh routers have limited mobility. They connect mesh and traditional clients to the network. The bridge functionalities and the gateway in mesh routers can be used to connect WMNs to other networks like the cellular, Internet, IEEE 802.16, IEEE 802.15, IEEE 802.11, sensor networks, etc. Mesh clients can be mobile or motionless, and they can establish a client mesh network with mesh routers and other mesh clients. Wireless personal area networks (WPANs), wireless metropolitan area networks (MAN), Ad hoc networks, and wireless local area networks (WLANs) are expected to benefit from WMNs, which are expected to overcome restrictions and considerably increase performance. These networks provide wireless services to various applications in metropolitan locations, local, campus, and personal.
Разместил: literator 24-09-2023, 02:27 | Комментарии: 0 | Подробнее
Название: CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, 2nd Edition (Early Release)
Автор: Jason Ball
Издательство: Cisco Press
Год: 2023
Страниц: 1310
Язык: английский
Формат: epub
Размер: 37.0 MB

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, Second Edition, helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Jason Ball shares preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills. The Implementing Cisco Collaboration Core Technologies (CLCOR 350-801) exam is the required “core” exam for the CCNP Collaboration and CCIE Collaboration certifications. If you pass the CLCOR 350-801 exam, you also obtain the Cisco Certified Specialist–Collaboration Core certification. This exam covers core Collaboration technologies, including infrastructure and design; protocols, codecs, and endpoints; Cisco IOS XE gateways and media resources; call control; QoS; and Collaboration applications.
Разместил: literator 24-09-2023, 01:37 | Комментарии: 0 | Подробнее
Название: Security Designs for the Cloud, IoT, and Social Networking
Автор: Adele Kuzmiakova
Издательство: Arcler Press
Год: 2022
Страниц: 264
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and security challenges in cloud computing. It highlights the appplication safety and service vulnerability in cloud network. It also gives an introduction to IoT security and its open challenges, IoT architecture security and the introduction into the social network and its security issues, as well as the cyberspace security in the digital age. Currently, the world is facing rapid technological advancement in every field. Unarguably, the most affected area is digital technology. The use of digital devices has increased to a much greater extent in the last decade. In this book three major aspects of digital technology data, social media, cloud computing, and Internet of Things (IoT) are discussed. This book thoroughly examines the issues and vulnerabilities of IoT services. Due to the low cost of cloud services, almost every organization is storing their data in the cloud. This causes a big chunk of users’ personal data to be saved in the cloud, which can be a target for hackers who are always trying to get access to cloud storage. This book thoroughly examines the issues and vulnerabilities of IoT services.
Разместил: literator 23-09-2023, 17:18 | Комментарии: 0 | Подробнее
Название: Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Автор: Bradley Fowler
Издательство: Apress
Год: 2023
Страниц: 158
Язык: английский
Формат: pdf
Размер: 20.7 MB

Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology’s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you’ll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization.
Разместил: literator 23-09-2023, 03:17 | Комментарии: 0 | Подробнее
Название: Информационная безопасность: защита и нападение, 3-е издание
Автор: А.А. Бирюков
Издательство: ДМК Пресс
Год: 2023
Страниц: 442
Язык: русский
Формат: pdf
Размер: 23.1 MB

Книги по информационной безопасности (ИБ) преимущественно делятся на две группы: в одних большей частью присутствует нормативная информация и мало сведений о технической реализации угроз и защите от них, в других описываются только технические аспекты (серии «...глазами хакера»). Данная книга выдерживает уже третье издание, предлагая читателю глубокое погружение в практические аспекты реализации конкретных атак и средств защиты. Представлены как актуальная техническая информация, так и советы по организации процесса обеспечения информационной безопасности с соответствующими примерами. В числе рассматриваемых тем: атаки на беспроводные устройства; безопасность облачных систем; выявление уязвимостей; средства обнаружения и предотвращения вторжений; борьба с утечками; обзор методов шифрования; описание пакета Kali Linux; и многое другое.
Разместил: literator 22-09-2023, 15:16 | Комментарии: 0 | Подробнее
Название: Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust (Final)
Автор: Ev Kontsevoy, Sakshyam Shah, Peter Conrad
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 163
Язык: английский
Формат: True EPUB (Retail Copy), PDF (conv), MOBI (conv)
Размер: 10.1 MB

Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider. How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity. This book is for anyone facing the challenges of defending an ever-growing infrastructure, whether on-premises, in the cloud, or both. The book is accessible to a reader with a modicum of technical skill and a passing familiarity with IT, networking, and the Linux command line. Whether you’re an executive, an IT policymaker, or a DevOps engineer, if you have responsibility for helping secure heterogeneous computing infrastructure, this book is for you.
Разместил: literator 21-09-2023, 22:06 | Комментарии: 0 | Подробнее
Название: Data Analytics for Internet of Things Infrastructure
Автор: Rohit Sharma, Gwanggil Jeon, Yan Zhang
Издательство: Springer
Серия: Internet of Things
Год: 2023
Страниц: 330
Язык: английский
Формат: pdf (true), epub
Размер: 50.0 MB

This book provides techniques for the deployment of semantic technologies in data analysis along with the latest applications across the field such as Internet of Things (IoT). The authors focus on the use of the IoT and big data in business intelligence, data management, Hadoop, Machine Learning, cloud, smart cities, etc. They discuss how the generation of Big Data by IoT has ruptured the existing data processing capacity of IoT and recommends the adoption of data analytics to strengthen solutions. The book addresses the challenges in designing the web based IoT system, provides a comparative analysis of different advanced approaches in industries, and contains an analysis of databases to provide expert systems. The book aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of IoT and Big Data analytics.
Разместил: literator 21-09-2023, 07:13 | Комментарии: 0 | Подробнее
Название: Intelligent Data Analytics IoT and Blockchain
Автор: Bashir Alam, Mansaf Alam
Издательство: CRC Press
Год: 2024
Страниц: 367
Язык: английский
Формат: pdf (true)
Размер: 73.6 MB

This book focuses on data analytics with Machine Learning (ML) using IoT and blockchain technology. Integrating these three fields by examining their interconnections, Intelligent Data Analytics, IoT, and Blockchain examines the opportunities and challenges of developing systems and applications exploiting these technologies. Written primarily for researchers who are working in this multi-disciplinary field, the book also benefits industry experts and technology executives who want to develop their organizations’ decision-making capabilities. The book presents novel ideas and insights on different aspects of data analytics, blockchain technology, and IoT. It views these technologies as interdisciplinary fields concerning processes and systems that extract knowledge and insights from data. Focusing on recent advances, the book offers a variety of solutions to real-life challenges with an emphasis on security.
Разместил: literator 20-09-2023, 01:37 | Комментарии: 0 | Подробнее
Название: Hack the Airwaves: Advanced BLE Exploitation Techniques
Автор: Josh Luberisse
Издательство: Fortis Novum Mundum
Год: 2023
Страниц: 172
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced knowledge of BLE's potential risks and defenses. Drawing from hands-on experiences, real-world case studies, and practical demonstrations, Josh offers readers a unique blend of theoretical insights and actionable techniques. From understanding the core protocols of BLE to crafting custom payloads and defending against sophisticated attacks, "Hack the Airwaves" covers the full spectrum of BLE security. This book, " Hack the Airwaves: Advanced BLE Exploitation Techniques", is intended as a resource for cybersecurity professionals who are committed to the responsible and ethical use of their skills. The techniques, tools, and practices discussed within these pages are intended for use in authorized settings, with explicit permission from the relevant authorities, and for the purpose of improving security and protecting systems, data, and users from malicious activity.
Разместил: literator 18-09-2023, 17:51 | Комментарии: 0 | Подробнее
Название: The Complete Internet Security Manual - 19th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 196
Язык: английский
Формат: pdf
Размер: 92.4 MB

Viruses, malware, ransomware, phishing, smishing, vishing, social engineering... the list of digital threats with peculiar names expands daily and hardly a moment goes by without some form of attack appearing in the news. We live in interesting times, where data is worth more than oil or gold and your personal information is greatly sought after by cybercriminals, scammers and hackers. How prepared are you for this new age of digital vandalism and theft? Is your Windows computer secure against the continual onslaught of the modern online world? Well help you secure your computer, network and devices against such threats and with easy to follow tutorials, help arm you against potential threats and attacks. For parents and guardians, we also cover looking out for your children when online, together with guides on how best to protect them and advice from industry experts. You'll soon be security savvy and prepared for whatever digital threat looms on the horizon.
Разместил: literator 17-09-2023, 05:50 | Комментарии: 0 | Подробнее



 Litmy.ru  ©2020-2023     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности