LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 18-06-2023, 05:10
  • Комментариев: 0
Artificial Intelligence and Cyber Security in Industry 4.0Название: Artificial Intelligence and Cyber Security in Industry 4.0
Автор: Velliangiri Sarveshwaran, Joy Iong-Zong Chen, Danilo Pelusi
Издательство: Springer
Год: 2023
Страниц: 374
Язык: английский
Формат: pdf (true), epub
Размер: 30.2 MB

This book provides theoretical background and state-of-the-art findings in Artificial Intelligence and cybersecurity for Industry 4.0 and helps in implementing AI-based cybersecurity applications. Machine Learning-based security approaches are vulnerable to poison datasets which can be caused by a legitimate defender's misclassification or attackers aiming to evade detection by contaminating the training data set. There also exist gaps between the test environment and the real world. Therefore, it is critical to check the potentials and limitations of AI-based security technologies in terms of metrics such as security, performance, cost, time, and consider how to incorporate them into the real world by addressing the gaps appropriately. This book focuses on state-of-the-art findings from both academia and industry in Big Data security relevant sciences, technologies, and applications.

  • Добавил: literator
  • Дата: 17-06-2023, 21:10
  • Комментариев: 0
CompTIA CySA+ Study Guide: Exam CS0-003, 3rd EditionНазвание: CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition
Автор: Mike Chapple, David Seidl
Издательство: Sybex
Год: 2023
Страниц: 576
Язык: английский
Формат: epub
Размер: 42.3 MB

Prepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003. CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitoring. In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You’ll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.

  • Добавил: literator
  • Дата: 17-06-2023, 05:32
  • Комментариев: 0
The Complete Internet Security Manual - 18th Edition 2023Название: The Complete Internet Security Manual - 18th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 196
Язык: английский
Формат: pdf
Размер: 121.8 MB

Viruses, malware, ransomware, phishing, smishing, vishing, social engineering... the list of digital threats with peculiar names expands daily and hardly a moment goes by without some form of attack appearing in the news. We live in interesting times, where data is worth more than oil or gold and your personal information is greatly sought after by cybercriminals, scammers and hackers. How prepared are you for this new age of digital vandalism and theft? Is your Windows computer secure against the continual onslaught of the modern online world? We'll help you secure your computer, network and devices against such threats and with easy to follow tutorials, help arm you against potential threats and attacks. For parents and guardians, we also cover looking out for your children when online, together with guides on how best to protect them and advice from industry experts. You'll soon be security savvy and prepared for whatever digital threat looms on the horizon.

  • Добавил: literator
  • Дата: 17-06-2023, 03:21
  • Комментариев: 0
IoT and Analytics in Renewable Energy Systems (Volume 1) Sustainable Smart Grids & Renewable Energy SystemsНазвание: IoT and Analytics in Renewable Energy Systems (Volume 1): Sustainable Smart Grids & Renewable Energy Systems
Автор: O.V. Gnana Swathika, K. Karthikeyan
Издательство: CRC Press
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true)
Размер: 21.4 MB

Smart grid technologies include sensing and measurement technologies, advanced components aided with communications and control methods along with improved interfaces and decision support systems. Smart grid techniques support the extensive inclusion of clean renewable generation in power systems. Smart grid use also promotes energy saving in power systems. Cyber security objectives for the smart grid are availability, integrity and confidentiality. Nowadays we get to see the rapid expansion of technologies with the influence of Internet of Things (IoT) and Smart Grid (SG). So, whatever IoT devices we are using with some sort of protocols and parameters, we should be able to manage and know the measures and estimation of power consumption, interoperability, price forecasting, etc.

  • Добавил: literator
  • Дата: 16-06-2023, 21:34
  • Комментариев: 0
IoT and Analytics in Renewable Energy Systems (Volume 2)Название: IoT and Analytics in Renewable Energy Systems (Volume 2): AI, ML and IoT Deployment in
Sustainable Smart Cities
Автор: O.V. Gnana Swathika, K. Karthikeyan
Издательство: CRC Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true)
Размер: 29.6 MB

Smart cities emanate from a smart renewable-energy-aided power grid. The smart grid technologies offer an array of benefits like reliability, availability, and resiliency. Smart grids phenomenally contribute to facilitating cities reaching those sustainability goals over time. Digital technologies, such as the Internet of Things (IoT), automation, Artificial Intelligence (AI) and Machine Learning (ML) significantly contribute to the two-way communication between utilities and customers in smart cities.

  • Добавил: literator
  • Дата: 16-06-2023, 20:08
  • Комментариев: 0
Azure Security (MEAP v10)Название: Azure Security (MEAP v10)
Автор: Bojan Magusic
Издательство: Manning Publications
Год: 2023
Страниц: 458
Язык: английский
Формат: pdf, epub
Размер: 22.4 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud.

  • Добавил: literator
  • Дата: 14-06-2023, 04:52
  • Комментариев: 0
Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive GuideНазвание: Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide
Автор: Alexander Kott
Издательство: Springer
Серия: Advances in Information Security
Год: 2023
Страниц: 468
Язык: английский
Формат: pdf (true), epub
Размер: 37.1 MB

This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. This book is based on the premise that the future of cyber-defense and cyber resilience will depend largely on autonomous, Artificially Intelligent (AI) agents. Such an agent will reside on a system that includes one or more computing devices and be responsible for defending the system from cyber compromises. If a compromise occurs, the agent will then be responsible for response and recovery of the system, usually autonomously. To refer to such a class of agents, we use the term Autonomous Intelligent Cyber-defense Agent (AICA). In this book, we explore how AICA will be designed and how it will operate.

  • Добавил: literator
  • Дата: 13-06-2023, 21:58
  • Комментариев: 0
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd EditionНазвание: Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd Edition
Автор: Ryan Leirvik
Издательство: Apress
Год: 2023
Страниц: 222
Язык: английский
Формат: pdf, epub
Размер: 12.8 MB

When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available―many with sound advice, management approaches, and technical solutions―but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization. This second edition provides tools and methods in a straight-forward, practical manner to guide the management of a cybersecurity program.

  • Добавил: literator
  • Дата: 13-06-2023, 17:53
  • Комментариев: 0
Advanced Wireless Communication and Sensor Networks: Applications and SimulationsНазвание: Advanced Wireless Communication and Sensor Networks: Applications and Simulations
Автор: Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victoria Barbosa
Издательство: CRC Press
Год: 2023
Страниц: 355
Язык: английский
Формат: pdf (true)
Размер: 35.7 MB

This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Wireless communication is one of the dominant communication systems in the current era. It has permeated into every sphere of our modern day-to-day activities and the industrial sector. There are certain benefits of using wireless communications. The notable merits include cost, mobility, ease of installation, reliability, and disaster recovery. Meanwhile, new paradigm shifts have also revolutionized wireless communication. Some adaptations such as Bluetooth, Wi-Fi 802.11, WiMax 802.16 need mention here. Brimming with a multitude of merits, these standards have improved wireless communications systems to a great extent.

  • Добавил: literator
  • Дата: 13-06-2023, 07:26
  • Комментариев: 0
Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processesНазвание: Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processes for an ethical hacker
Автор: Sharon Ferrone
Издательство: BPB Publications
Год: 2022
Страниц: 571
Язык: английский
Формат: pdf, epub
Размер: 33.97 MB

In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company's people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you'll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting. This book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them. It also includes obtaining open-source intelligence to develop a dangerous environment for your potential customer. You'll learn how to install and employ offensive tactics used by skilled hackers as you go. Before eventually launching assaults against systems in an industrial network, you'll learn about industrial equipment, port, and service discovery, pivoting, and much more.