Назад Вперед

Anyone can be a Hacker

Автор: literator от Вчера, 07:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Anyone can be a Hacker
Автор: Qualifera Qualifera
Издательство: qualifera.com
Год: 2024
Язык: английский
Формат: epub
Размер: 10.1 MB

This book will teach you how to set up a hacking environment and walk through eight different cyberattacks step by step which you may execute on your own. Start your cyber security journey with the best guide. The book contains a comprehensive introduction to the procedures needed to finish an ethical hack or penetration test, which doesn't require any prior hacking knowledge. After completing a penetration test, you will understand how to use and analyse the output of contemporary hacking tools correctly. The book covers a wide range of attacks. The book takes you step-by-step through all of the tools and procedures in an organised, systematic way so you can see how the output from each tool may be used to its greatest potential in the penetration tester's later stages. You will be able to observe how the many tools and phases link to one another with clarity thanks to this method. This book will help you advance your hacking abilities and is a great starting point for anyone interested in learning about ethical hacking.
 

Home Networking Tricks and Tips - 6th Edition 2024

Автор: literator от 22-12-2024, 05:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Home Networking Tricks and Tips - 6th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 38.7 MB

"Советы и рекомендации по созданию домашних сетей - 6th Edition 2024" - это совершенное цифровое издание для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить свои навыки пользователя домашних сетей или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, которые используют профессионалы? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их в своем "умном доме". Мы поддержим и обучим вас навыкам, которыми мы овладевали десятилетиями, с учетом ваших пожеланий.
 

Pen Testing from Contract to Report

Автор: literator от 20-12-2024, 05:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Pen Testing from Contract to Report
Автор: Alfred Basta, Nadine Basta, Waqar Anwar
Издательство: Wiley
Год: 2024
Страниц: 675
Язык: английский
Формат: pdf (true)
Размер: 31.7 MB

Protect your system or web application with this accessible guide. Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications. Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions. Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.
 

Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities

Автор: literator от 19-12-2024, 20:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
Автор: Smita Sharma, Manikandan Thirumalaisamy, Balamurugan Balusamy, Naveen Chilamkurti
Издательство: CRC Press
Год: 2025
Страниц: 208
Язык: английский
Формат: pdf (true), epub
Размер: 20.4 MB

This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges. It discusses the potential of AI for threat detection, risk assessment, and incident response, as well as the use of IoT sensors for real-time monitoring and data analysis in the context of smart cities. It includes case studies from around the world to provide practical insights into the use of AI and IoT technologies for enhancing cybersecurity in different contexts and highlight the potential benefits of these technologies for improving the resilience and security of smart cities. Postgraduate students and researchers in the departments of Computer Science, working in the areas of IoT and Smart Cities will find this book useful.
 

Cybersecurity and Data Science Innovations for Sustainable Development of HEICC

Автор: literator от 19-12-2024, 05:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities
Автор: Thangavel Murugan, W. Jai Singh
Издательство: CRC Press
Год: 2025
Страниц: 496
Язык: английский
Формат: pdf (true), epub
Размер: 35.0 MB

Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, Data Science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities. It delves into cybersecurity advancements and examines how innovations in cybersecurity are shaping the landscape of healthcare, education, industry, and urban environments. Data Science advancements take center stage, showcasing the transformative power of data analytics in improving outcomes across HEICC sectors. Whether it’s optimizing resource allocation in healthcare, protecting patient privacy, personalizing learning experiences in education, enhancing efficiency in industry, or fostering sustainable development in cities and communities, Data Science offers unprecedented opportunities for innovation and progress. This book serves as a comprehensive guide for researchers, practitioners, policymakers, and stakeholders navigating the complex landscape of cybersecurity and Data Science in the pursuit of sustainable development across HEICC domains.
 

Securing the Digital World: A Comprehensive Guide to Multimedia Security

Автор: magnum от 17-12-2024, 23:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Securing the Digital World: A Comprehensive Guide to Multimedia SecurityНазвание: Securing the Digital World: A Comprehensive Guide to Multimedia Security
Автор: Subhrajyoti Deb, Aditya Kumar Sahu
Издательство: CRC Press
Год выхода: 2025
Страниц: 166
Формат: True PDF
Размер: 10,5 MB
Язык: английский

Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative. This book provides comprehensive research on multimedia information security and bridges the gap between theoretical bases and practical applications.
 

Security and Privacy for 6G Massive IoT

Автор: literator от 16-12-2024, 21:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy for 6G Massive IoT
Автор: Georgios Mantas, Firooz Saghezchi, Jonathan Rodriguez, Victor Sucasas
Издательство: Wiley
Год: 2025
Страниц: 285
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Anticipate the security and privacy threats of the future with this groundbreaking text. The development of the next generation of mobile networks (6G), which is expected to be widely deployed by 2030, promises to revolutionize the Internet of Things (IoT), interconnecting a massive number of IoT devices (massive IoT) on a scale never before envisioned. These devices will enable the operation of a wide spectrum of massive IoT applications such as immersive smart cities, autonomous supply chain, flexible manufacturing and more. However, the vast number of interconnected IoT devices in the emerging massive IoT applications will make them vulnerable to an unprecedented variety of security and privacy threats, which must be anticipated in order to harness the transformative potential of these technologies. Security and Privacy for 6G Massive IoT is ideal for research engineers working in the area of IoT security and designers working on new 6G security products, among many others.
 

Online Security Tricks and Tips - 20th Edition 2024

Автор: literator от 16-12-2024, 04:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Online Security Tricks and Tips - 20th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 108
Язык: английский
Формат: pdf
Размер: 50.4 MB

"Online Security Tricks and Tips" - это новое цифровое издание для тех пользователей, которые мечтают поднять свои навыки на новый уровень. Вы хотите улучшить свои пользовательские навыки? Вы хотите получить инсайдерские знания? Вы хотите учиться непосредственно у экспертов в этой области? На страницах этого нового руководства по безопасности в Интернете вы узнаете все, что вам нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как использовать свои устройства и получать от них максимальную отдачу. Мы можем сделать это, передавая свои навыки, выработанные десятилетиями, и предоставляя индивидуальную поддержку каждому из наших клиентов.
 

Cybersecurity: Technology and Governance

Автор: literator от 15-12-2024, 19:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity: Technology and Governance
Автор: Audun Jøsang
Издательство: Springer
Год: 2025
Страниц: 447
Язык: английский
Формат: pdf (true)
Размер: 15.5 MB

This book gives a complete introduction to cybersecurity and its many subdomains. It’s unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website. Cybersecurity is a very broad field of study. The introduction that this book provides is broader than it is deep. Each chapter could easily have been expanded to become a separate book in its own right. The book is precisely intended to give the reader a broad introduction to the entire field of cybersecurity. The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed. The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance.
 

SDN and NFV: A New Dimension to Virtualization

Автор: literator от 13-12-2024, 01:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: SDN and NFV: A New Dimension to Virtualization
Автор: Brij B Gupta, Amrita Dahiya, Elhadj Benkhelifa
Издательство: World Scientific Publishing
Год: 2024
Страниц: 292
Язык: английский
Формат: pdf (true)
Размер: 15.3 MB

Software-defined network (SDN) and network function virtualization (NFV) are two technology trends that have revolutionized network management, particularly in highly distributed networks that are used in public, private, or hybrid cloud services. SDN and NFV technologies, when combined, simplify the deployment of network resources, lower capital and operating expenses, and offer greater network flexibility. The increasing usage of NFV is one of the primary factors that make SDN adoption attractive. The integration of these two technologies; SDN and NFV, offer a complementary service, with NFV delivering many of the real services controlled in an SDN. While SDN is focused on the control plane, NFV optimizes the actual network services that manage the data flows. Devices such as routers, firewalls, and VPN terminators are replaced with virtual devices that run on commodity hardware in NFV physical networking. This resembles the 'as-a-service' typical model of cloud services in many aspects. These virtual devices can be accessed on-demand by communication, network, or data center providers.
 
Назад Вперед