LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 4-01-2023, 16:18
  • Комментариев: 0
PKI Implementation and InfrastructuresНазвание: PKI Implementation and Infrastructures
Автор: Julian Ashbourn
Издательство: CRC Press
Год: 2023
Страниц: 188
Язык: английский
Формат: pdf (true)
Размер: 10,2 MB

Концепция PKI (инфраструктура открытых ключей) существует уже несколько десятилетий, но это одна из областей ИТ, которая чрезвычайно долго не находила своего воплощения в жизнь. В основном это связано с тем, что внедрение PKI требует много времени и усилий. Поддержание PKI требует не меньше времени, а в реальном мире слияний и поглощений на фоне постоянно меняющихся технологий это еще сложнее. PKI (Public Key Infrastructure) — это набор средств (технических, материальных, и т. д.), распределённых служб и компонентов, в совокупности используемых для поддержки криптозадач на основе закрытого и открытого ключей. В основе PKI лежит использование криптографической системы с открытым ключом и несколько основных принципов. В этой книге рассматриваются все аспекты внедрения и поддержки PKI, которые, как представляется, упускаются в других книгах на эту тему. В ней отражен десятилетний опыт, накопленный не только в PKI, не только в ИТ, не только в электронике, но и в бизнесе, государственных учреждениях и научных кругах. В книге также рассматривается существование PKI наряду с другими технологиями, такими как биометрия, и на фоне постоянно меняющегося мира методологий разработки.
  • Добавил: vvkot
  • Дата: 4-01-2023, 12:59
  • Комментариев: 0

Название: Internet of Things: Security and Privacy in Cyberspace
Автор: Saxena Sandeep, Pradhan Ashok.
Издательство:Springer
Год:2022
Формат: PDF
Страниц: 293
Размер: 10,4 МБ
Язык: English

This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion detection and firewall mechanisms for IoT. The book also covers topics related to embedded security mechanisms and presents suitable malware detection techniques for IoT. The book also contains a unique presentation on heterogeneous device and data management in IoT applications and showcases the major communication-level attacks and defense mechanisms related to IoT.
  • Добавил: literator
  • Дата: 4-01-2023, 12:55
  • Комментариев: 0
An Insider's Guide to Cloud Computing (Rough Cuts)Название: An Insider's Guide to Cloud Computing (Rough Cuts)
Автор: David Linthicum
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2023
Страниц: 216
Язык: английский
Формат: epub
Размер: 10.08 MB

Many cloud computing initiatives flat-out fail; others limp along, functioning tolerably without ever delivering what they promised. An Insider’s Guide to Cloud Computing reveals why, and shows how to do better. Cloud pioneer and long-time CTO David Linthicum explodes the industry’s secrets, and presents practical ways to optimize cloud for value and performance. Linthicum takes a hard look at aggressively marketed technologies such as cloud-based AI, containers, no-code, serverless computing, and multicloud. He illuminates what works, what absolutely does not work, and how to manage the difficult cost-complexity tradeoffs presented by many offerings. You’ll learn why some workloads and datasets still don’t belong on the cloud, and even discover "game changer" technology that has actually been undersold.
  • Добавил: literator
  • Дата: 4-01-2023, 02:10
  • Комментариев: 0
Blockchain in Supply Chain Digital TransformationНазвание: Blockchain in Supply Chain Digital Transformation
Автор: Trevor Clohessy
Издательство: CRC Press
Год: 2023
Страниц: 227
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Blockchain and distributed ledger technology (DLT) have been identified as emerging technologies that can enhance global supply chain management (SCM) processes. Given the embryonic nature of the technology, use cases pertaining to how it can be adopted and deployed in supply chain contexts are scarce. This book shares blockchain supply chain use cases across a range of industries including smart cities, food imports, product traceability, decentralised finance, procurement, energy management, consensus mechanism security, and Industry 4.0. While extant research has focused on how traditional technologies such as cloud computing, Radio Frequency Identification (RFID), Internet of Things (IoT), tracking technologies, and so on have impacted SCM business practices, new technological developments are emerging such as blockchain and distributed ledger technologies (DLT) that are enabling new and innovative SCM business practices. Given its scope, it is primarily intended for academics, students, researchers, and practitioners who want to learn more about how blockchain can digitally transform global supply chains.
  • Добавил: literator
  • Дата: 31-12-2022, 08:02
  • Комментариев: 0
Wireshark for Network Forensics: An Essential Guide for IT and Cloud ProfessionalsНазвание: Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
Автор: Nagendra Kumar Nainar, Ashish Panda
Издательство: Apress
Год: 2023
Страниц: 283
Язык: английский
Формат: pdf, epub
Размер: 47.5 MB

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.
  • Добавил: literator
  • Дата: 28-12-2022, 19:09
  • Комментариев: 0
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, 2nd EditionНазвание: Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, 2nd Edition
Автор: George Varghese, Jun Xu
Издательство: Morgan Kaufmann, Elsevier
Год: 2022
Страниц: 596
Язык: английский
Формат: pdf (true), epub (true)
Размер: 33.7 MB

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks. In designing a network device, there are dozens of decisions that affect the speed with which it will perform – sometimes for better, but sometimes for worse. The book provides a complete and coherent methodology for maximizing speed while meeting network design goals. The book is uniquely focused on the seamless integration of data structures, algorithms, operating systems and hardware/software co-designs for high-performance routers/switches and network end systems. Thoroughly updated based on courses taught by the authors over the past decade, the book lays out the bottlenecks most often encountered at four disparate levels of implementation: protocol, OS, hardware and architecture.
  • Добавил: literator
  • Дата: 27-12-2022, 21:58
  • Комментариев: 0
Blockchain for Teens: With Case Studies and Examples of Blockchain Across Various IndustriesНазвание: Blockchain for Teens: With Case Studies and Examples of Blockchain Across Various Industries
Автор: Brian Wu, Bridget Wu
Издательство: Apress
Год: 2023
Страниц: 444
Язык: английский
Формат: pdf, epub
Размер: 26.1 MB

Similar to the Internet in the 1990s, Blockchain promises to revolutionize the world by reforming current business models. This book is a beginner-friendly guide for teens looking to build a basic foundation in Blockchain technologies. You'll start with an introduction to Blockchain, learn about the main features, and understand decentralization. Additionally, you'll get to know the current monetary system, major concepts in cryptography, and an overview of cryptocurrency. The book then explores various topics in Bitcoin, including its history, the consensus mechanism and the mining process. You'll also be introduced to non-fungible tokens (NFT)s, one of Blockchain’s most well-known technologies, and delve into its different aspects, including the top NFT marketplaces. There is also a chapter about the Metaverse, another groundbreaking technology that will influence society throughout the next decade. You'll see how Crypto and NFTs enhance the Metaverse, and the relationship between Blockchain and the Metaverse.
  • Добавил: literator
  • Дата: 27-12-2022, 19:14
  • Комментариев: 0
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional ClassroomНазвание: Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
Автор: Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
Издательство: CRC Press
Год: 2023
Страниц: 229
Язык: английский
Формат: pdf (true)
Размер: 12.9 MB

Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical jargon and industry stovepipes and give you, the classroom teacher, a unified understanding of what must be taught. That advice is based on a single authoritative definition of the field. In 2017, the three societies that write the standards for computing, software engineering, and information systems came together to define a single model of the field of cybersecurity. It is based on eight building blocks. That definition is presented here. However, we also understand that secondary school teachers are not experts in arcane subjects like software, component, human, or societal security. Therefore, this book explains cybersecurity through a simple story rather than diving into execution details.
  • Добавил: literator
  • Дата: 27-12-2022, 12:48
  • Комментариев: 0
Cybersecurity All-In-One for DummiesНазвание: Cybersecurity All-In-One for Dummies
Автор: Joseph Steinberg, Kevin Beaver
Издательство: For Dummies
Год: 2023
Страниц: 723
Язык: английский
Формат: pdf (true)
Размер: 15.6 MB

Over 700 pages of insight into all things cybersecurity. Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems―and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.
  • Добавил: literator
  • Дата: 27-12-2022, 12:15
  • Комментариев: 0
Blockchain for Real World ApplicationsНазвание: Blockchain for Real World Applications
Автор: Rishabh Garg
Издательство: Wiley
Год: 2023
Страниц: 415
Язык: английский
Формат: pdf (true)
Размер: 14.2 MB

Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics. Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of which are distributed and stored across a network of participating computer systems. With the advent of cryptocurrencies and NFTs, which are entirely predicated on blockchain technology, and the integration of blockchain architecture into online and high-security networked spaces more broadly, there has never been a greater need for software, network, and financial professionals to be familiar with this technology. Blockchain for Real World Applications provides a practical discussion of this subject and the key characteristics of blockchain architecture. It describes how blockchain technology gains its essential irreversibility and persistency and discusses how this technology can be applied to the information and security needs of different kinds of businesses. It offers a comprehensive overview of the ever-growing blockchain ecosystem and its burgeoning role in a connected world.