Назад Вперед

Blockchain for Information Security and Privacy

Автор: literator от Сегодня, 15:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Blockchain for Information Security and PrivacyНазвание: Blockchain for Information Security and Privacy
Автор: Udai Pratap Rao, Piyush Kumar Shukla, Chandan Trivedi
Издательство: CRC Press
Год: 2022
Страниц: 441
Язык: английский
Формат: pdf (true)
Размер: 52.8 MB

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains.


 

Edge Computing: Fundamentals, Advances and Applications

Автор: literator от Сегодня, 15:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Edge Computing: Fundamentals, Advances and ApplicationsНазвание: Edge Computing: Fundamentals, Advances and Applications
Автор: K. Anitha Kumari, G. Sudha Sadasivam, D. Dharani
Издательство: CRC Press
Год: 2022
Страниц: 181
Язык: английский
Формат: pdf (true)
Размер: 16.9 MB

This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate the readers to setup edge-based environment and work with edge analytics. It covers important topics including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication.


 

Online Terrorist Propaganda, Recruitment, and Radicalization

Автор: TRex от Сегодня, 07:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Online Terrorist Propaganda, Recruitment, and Radicalization
Автор: John R. Vacca
Издательство: CRC Press
Год: 2019
Формат: PDF
Страниц: 532
Размер: 16,2 Mb
Язык: English

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online 'footprints' to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.
 

Recent Trends in Blockchain for Information Systems Security and Privacy

Автор: literator от Вчера, 16:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Recent Trends in Blockchain for Information Systems Security and PrivacyНазвание: Recent Trends in Blockchain for Information Systems Security and Privacy
Автор: Ajith Abraham, Amit Kumar Tyagi
Издательство: CRC Press
Год: 2022
Страниц: 362
Язык: английский
Формат: pdf (true)
Размер: 23.3 MB

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry.


 

CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition

Автор: literator от Вчера, 14:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd EditionНазвание: CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition
Автор: Mike Chapple, David Seidl
Издательство: Sybex
Год: 2022
Страниц: 579
Язык: английский
Формат: pdf (true), epub
Размер: 57.2 MB

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing. In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field. You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems.


 

CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide (Final)

Автор: literator от Вчера, 14:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide (Final)Название: CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide
Автор: Jason Ball, Thomas Arneson
Издательство: Cisco Press
Год: 2022
Страниц: 592
Язык: английский
Формат: epub
Размер: 10.1 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.
 

Where Attackers Infiltrate Your Network and How to Beat Them

Автор: harun54 от Вчера, 09:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Where Attackers Infiltrate Your Network and How to Beat Them
Автор: David Wolpoff, Keegan Henckel-Miller
Издательство: Randori
Год: 2021
Формат: PDF
Размер: 12 Мб
Язык: английский / English

As someone regularly hired to hack Fortune 500 companies, I’ve gone up against many different types of organizations — some are adept at stopping me and making my life harder, others leave the door wide open. What I’ve found is that the most challenging organizations to break into are the ones anticipating my every move. They have experience protecting what matters most. I wrote this book to take you through the attacker’s kill chain step-by-step, as seen and performed by an actual attacker. The goal isn’t to scare you into buying a new security product — there is plenty of that already. I want organizations to understand the attacker’s perspective — a hacker’s logic used to break into organizations. Because once you see your environment the way a hacker does, your security strategy will change. You’ll prioritize like an attacker does, and figure out how to protect what matters most.
 

Информационная безопасность и защита информации (2014)

Автор: umkaS от 15-10-2021, 12:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Информационная безопасность и защита информации
Автор: Прохорова О.В.
Издательство: СГАСУ
Год: 2014
Cтраниц: 112
Формат: pdf
Размер: 25 мб
Язык: русский

Учебник по курсу «Информационная безопасность и защита информации» для студентов 2 курса специальности 230400.62 «Информационные системы и технологии». В учебнике рассматриваются основы информационной безопасности и защиты информации, а именно: разграничение доступа к ресурсам, вопросы идентификации и аутентификации субъектов, методы и средства криптографической защиты, вопросы контроля целостности информации, способы хранения и распределения ключевой информации, организация защиты информации от разрушающих программных воздействий, электронно-цифровая подпись и многое другое.
 

Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, 2nd Edition

Автор: TRex от 14-10-2021, 06:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
Автор: Paul C. van Oorschot
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 464
Размер: 10 Mb
Язык: English

Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years.
 

Data Communications and Networking with TCP/IP Protocol Suite, 6th Edition

Автор: literator от 13-10-2021, 14:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Data Communications and Networking with TCP/IP Protocol Suite, 6th EditionНазвание: Data Communications and Networking with TCP/IP Protocol Suite, 6th Edition
Автор: Behrouz A. Forouzan
Издательство: McGraw-Hill Education
Год: 2021
Страниц: 864
Язык: английский
Формат: epub
Размер: 30.5 MB

Data Communications and Networking, 6th Edition, teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the TCP/IP protocol suite is built on the services provided by the layer below. This edition has undergone a major restructuring to reduce the number of chapters and focus on the organization of TCP/IP protocol suite. It concludes with three chapters that explore multimedia, network management, and cryptography/network security. Technologies related to data communications and networking are among the fastest growing in our culture today, and there is no better guide to this rapidly expanding field than Data Communications and Networking.


 
Назад Вперед