LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 7-02-2022, 16:02
  • Комментариев: 0
Dynamically Enabled Cyber DefenseНазвание: Dynamically Enabled Cyber Defense
Автор: Lin Yang, Quan Yu
Издательство: World Scientific Publishing
Год: 2021
Страниц: 389
Язык: английский
Формат: pdf (true)
Размер: 18.6 MB

The book puts forward dynamically enabled cyber defense technology as a solution to the system homogenization problem. Based on the hierarchy of the protected information system entity, the book elaborates on current mainstream dynamic defense technologies from four aspects: the internal hardware platform, software service, information data and external network communication. It also ascertains their possible evolution routes, clarifies their relationship with existing security products, and makes macro analyses and discussions on security gain and overall system efficiency of these technologies.
  • Добавил: literator
  • Дата: 7-02-2022, 04:20
  • Комментариев: 0
Access Control Models and Architectures For IoT and Cyber Physical SystemsНазвание: Access Control Models and Architectures For IoT and Cyber Physical Systems
Автор: Maanak Gupta, Smriti Bhatt
Издательство: Springer
Год: 2022
Страниц: 182
Язык: английский
Формат: pdf (true), epub
Размер: 29.6 MB

This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS. The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms.
  • Добавил: literator
  • Дата: 6-02-2022, 05:51
  • Комментариев: 0
Federated Learning for IoT ApplicationsНазвание: Federated Learning for IoT Applications
Автор: Satya Prakash Yadav, Bhoopesh Singh Bhati, Dharmendra Prasad Mahato
Издательство: Springer
Год: 2022
Страниц: 269
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book presents how federated learning helps to understand and learn from user activity in Internet of Things (IoT) applications while protecting user privacy. The authors first show how federated learning provides a unique way to build personalized models using data without intruding on users’ privacy. The authors then provide a comprehensive survey of state-of-the-art research on federated learning, giving the reader a general overview of the field. The book also investigates how a personalized federated learning framework is needed in cloud-edge architecture as well as in wireless-edge architecture for intelligent IoT applications. To cope with the heterogeneity issues in IoT environments, the book investigates emerging personalized federated learning methods that are able to mitigate the negative effects caused by heterogeneities in different aspects. The book provides case studies of IoT based human activity recognition to demonstrate the effectiveness of personalized federated learning for intelligent IoT applications, as well as multiple controller design and system analysis tools including model predictive control, linear matrix inequalities, optimal control, etc.
  • Добавил: literator
  • Дата: 4-02-2022, 16:03
  • Комментариев: 0
Cyber Security and Digital Forensics: Challenges and Future TrendsНазвание: Cyber Security and Digital Forensics: Challenges and Future Trends
Автор: Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar
Издательство: Wiley-Scrivener
Серия: Advances in Cyber Security
Год: 2022
Страниц: 415
Язык: английский
Формат: pdf (true), epub
Размер: 21.9 MB

Cyber security and digital forensics are an important topic nowadays, which provides many challenging issues in relation to security, identity, intrusion detection, advanced threat detection, privacy preservation etc. The goal of this edited book is to outline the cyber security and digital forensic challenges and future trends. The book focuses on how to secure computers from hackers and how to deal with obtaining, storing, evaluating, analysing and presenting electronic evidences. Current threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing, and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The main focus of this book is to provide the reader with a broad coverage of the topics that includes different concepts, models, and terminology along with examples and illustrations to show substantial technical field details.
  • Добавил: literator
  • Дата: 4-02-2022, 02:20
  • Комментариев: 0
AI and IoT for Sustainable Development in Emerging CountriesНазвание: AI and IoT for Sustainable Development in Emerging Countries
Автор: Zakaria Boulouard, Mariya Ouaissa
Издательство: Springer
Год: 2022
Страниц: 638
Язык: английский
Формат: pdf (true)
Размер: 14.8 MB

This book comprises a number of state-of-the-art contributions from both scientists and practitioners working in a large pool of fields where AI and IoT can open up new horizons. Artificial intelligence and Internet of Things have introduced themselves today as must-have technologies in almost every sector. Ranging from agriculture to industry and health care, the scope of applications of AI and IoT is as wide as the horizon. Nowadays, these technologies are extensively used in developed countries, but they are still at an early stage in emerging countries.
  • Добавил: literator
  • Дата: 2-02-2022, 04:16
  • Комментариев: 0
Dynamic Resource Management in Service-Oriented Core NetworksНазвание: Dynamic Resource Management in Service-Oriented Core Networks
Автор: Weihua Zhuang, Kaige Qu
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 182
Язык: английский
Формат: pdf (true), epub
Размер: 34.1 MB

The service-oriented fifth-generation (5G) and beyond core networks are featured by customized network services with differentiated quality-of-service (QoS) requirements, which can be provisioned through network slicing enabled by the software-defined networking (SDN) and network function virtualization (NFV) paradigms. Multiple network services are embedded in a common physical infrastructure, generating service-customized network slices (also referred to as virtual networks). Each network slice supports a composite service via virtual network function (VNF) chaining, with dedicated packet processing functionality at each VNF. For a network slice with a target traffic load, the end-to-end (E2E) service delivery is enabled by VNF placement at NFV nodes (e.g., data centers and commodity servers) and traffic routing among corresponding NFV nodes, with static resource allocations. When data traffic actually enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion.
  • Добавил: literator
  • Дата: 1-02-2022, 19:39
  • Комментариев: 0
The Security HippieНазвание: The Security Hippie
Автор: Barak Engel
Издательство: CRC Press
Год: 2022
Страниц: 197
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak’s related takes and thought processes.
  • Добавил: literator
  • Дата: 1-02-2022, 19:12
  • Комментариев: 0
Cybersecurity: Ethics, Legal, Risks, and PoliciesНазвание: Cybersecurity: Ethics, Legal, Risks, and Policies
Автор: Ishaani Priyadarshini (PhD), Chase Cotton (PhD, CISSP)
Издательство: Apple Academic Press, CRC Press
Год: 2022
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 10.07 MB

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.
  • Добавил: literator
  • Дата: 1-02-2022, 17:55
  • Комментариев: 0
The Role of IoT and Blockchain: Techniques and ApplicationsНазвание: The Role of IoT and Blockchain: Techniques and Applications
Автор: Sanjay K. Kuanar (PhD), Brojo Kishore Mishra (PhD), Sheng-Lung Peng (PhD)
Издательство: Apple Academic Press, CRC Press
Год: 2022
Страниц: 501
Язык: английский
Формат: pdf (true)
Размер: 25.5 MB

This volume provides informative chapters on the emerging issues, challenges, and new methods and state-of-the-art technologies on the Internet of Things and blockchain technology. It presents case studies and solutions that can be applied in the current business scenario, resolving challenges and providing solutions by integrating IoT with blockchain technology. The book addresses the growing attention that blockchain technology is receiving from industry and research because of its ability to provide “magical solutions” to problems associated with classical centralized architecture. The chapters discuss how the Internet of Things (IoT) represents a revolution of the Internet that can connect nearly all environment devices over the Internet to share data to create novel services and applications for improving quality of life. Although the centralized IoT system provides countless benefits, it raises several challenges. The volume presents IoT techniques and methodologies, blockchain techniques and methodologies, and case studies and applications for data mining algorithms, heart rate monitoring, climate prediction, disease prediction, security issues, automotive supply chains, voting prediction, forecasting particulate matter pollution, customer relationship management, and more.
  • Добавил: literator
  • Дата: 31-01-2022, 08:00
  • Комментариев: 0
Machine Learning for Cyber Agents: Attack and DefenceНазвание: Machine Learning for Cyber Agents: Attack and Defence
Автор: Stanislav Abaimov, Maurizio Martellini
Издательство: Springer
Год: 2022
Страниц: 235
Язык: английский
Формат: pdf (true), epub
Размер: 11.5 MB

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences.