Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Автор: literator от 9-01-2022, 17:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkНазвание: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
Автор: Cynthia Brumfield and Brian Haugli
Издательство: Wiley
Год: 2022
Страниц: 224
Язык: английский
Формат: epub
Размер: 10.2 MB

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.
 

Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication

Автор: literator от 9-01-2022, 06:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis CommunicationНазвание: Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
Автор: Holger Kaschner
Издательство: Springer
Год: 2021
Страниц: 230
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Cyber attacks and IT outages threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. With its practical structure, it is ideally suited to day-to-day business for crisis team members, communicators, security, IT and data protection experts. With numerous illustrations and checklists. A cyber crisis is therefore a crisis in which IT systems and the data processed on them play a central role. This involves the classic protection goals of information security: confidentiality, integrity, and availability of the data as well as authenticity of the communication participants and contents of the communication (technically as well as organizationally). We are therefore dealing with a cyber crisis whenever a breach of the protection goals (can) result in real dangers to the life and limb of people or to the strategic goals, reputation, or survivability of our organization.
 

Deep Learning Approaches to Cloud Security

Автор: TRex от 8-01-2022, 09:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Deep Learning Approaches to Cloud Security
Автор: Pramod Singh Rathore, Vishal Dutt, Rashmi Agrawal, Satya Murthy Sasubilli and Srinivasa Rao Swarna
Издательство: Wiley
Год: 2022
Формат: PDF
Страниц: 301
Размер: 30 Mb
Язык: English

Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts.
 

Social Networks: Modelling and Analysis

Автор: literator от 8-01-2022, 05:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Social Networks: Modelling and AnalysisНазвание: Social Networks: Modelling and Analysis
Автор: Niyati Aggrawal, Adarsh Anand
Издательство: CRC Press
Год: 2022
Страниц: 254
Язык: английский
Формат: pdf (true)
Размер: 12.8 MB

The goal of this book is to provide a reference for applications of mathematical modeling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making. Social Networks: Modeling and Analysis provide the essential knowledge of network analysis applicable to real-world data, with examples from today's most popular social networks such as Facebook, Twitter, Instagram, YouTube, etc. Chapter 1 discusses the basic concepts and terminologies related to network analysis applicable to real-world data, with examples from today's most popular social networks. Chapter 2 discusses the need for scientific analysis wherein the representation of a network as a graph (various kind of graphs). Chapter 10 gives an overview of the information diffusion process on social networking platforms and various mathematical modelling frameworks. Chapter 11 gives a brief overview about security and privacy issues on social networks, and Chapter 12 provides an overview of the various social networking tools such as Gephi, UCINET, NetworkX, Pajek and many more.
 

Введение в облачные решения Microsoft

Автор: SCART56 от 7-01-2022, 11:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Введение в облачные решения Microsoft
Автор: Савельев А.О.
Издательство: M.: НОИ Интуит
Год: 2016
Страниц: 231
Формат: pdf
Размер: 16,5 Мб
Язык: русский

Тема облачных вычислений является на данный момент одной из самых обсуждаемых. Ряд экспертов говорит о замещении "облаками" старых решений. В данном курсе мы рассмотрим суть облачных вычислений, их возможности, а также технологии новой облачной платформы Microsoft.
 

Information Security Handbook

Автор: TRex от 7-01-2022, 09:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Information Security Handbook
Автор: Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and Joгo Manuel R.S. Tavares
Издательство: CRC Press
Год: 2022
Формат: PDF
Страниц: 271
Размер: 17 Mb
Язык: English

This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains.
 

Industry 4.0 Solutions for Building Design and Construction: A Paradigm of New Opportunities

Автор: TRex от 6-01-2022, 09:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Industry 4.0 Solutions for Building Design and Construction: A Paradigm of New Opportunities
Автор: Farzad Pour Rahimian, Jack Steven Goulding, Sepehr Abrishami, Saleh Seyedzadeh, Faris Elghaish
Издательство: Routledge
Год: 2022
Формат: PDF
Страниц: 421
Размер: 49 Mb
Язык: English

This book provides in-depth results and case studies in innovation from actual work undertaken in collaboration with industry partners in Architecture, Engineering and Construction (AEC). Scientific advances and innovative technologies in the sector are key to shaping the changes emerging as a result of Industry 4.0. Mainstream Building Information Management is seen as a vehicle for addressing issues such as industry fragmentation, value-driven solutions, decision making, client engagement, and design/process flow. However, Advanced Simulation, Computer Vision, Internet of Things (IoT), Blockchain, Machine Learning, Deep Learning, and Linked Data all provide immense opportunities for dealing with these challenges and can provide evidenced-based innovative solutions not seen before.
 

Digital Finance: Security Tokens and Unlocking the Real Potential of Blockchain

Автор: TRex от 6-01-2022, 07:56, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Digital Finance: Security Tokens and Unlocking the Real Potential of Blockchain
Автор: Baxter Hines
Издательство: Wiley
Год: 2021
Формат: PDF
Страниц: 211
Размер: 10 Mb
Язык: English

Explores how the financial industry will be affected by developments in blockchain and cryptocurrencies at the dawn of a new digital age in finance 
Our financial system is in the midst of a digital revolution. Blockchain, viewed by many experts as “the most important invention since the Internet,” has changed the way we exchange value and information. Although most people are aware of Bitcoin and other cryptocurrencies, few understand how security tokens—digitized forms of traditional ownership certificates—can drive blockchain to reach its fullest potential by offering investors features and innovations that are simply not possible with paper certificates.
 

Алгоритмы ''распределенных согласований'' для оценки вычислительной стойкости криптоалгоритмов

Автор: kotmatros255 от 5-01-2022, 18:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Алгоритмы ''распределенных согласований'' для оценки вычислительной стойкости криптоалгоритмов
Автор: Бабенко Л.К., Курилкина А.М.
Издательство: URSS
Год: 2008
ISBN: 978-5-382-00779-3
Формат: pdf
Страниц: 114
Размер: 14,7 Мб
Язык: русский

В настоящей книге рассматриваются вопросы оценки стойкости криптографической защиты информации для симметричных алгоритмов, имеющих каскадную структуру, а также для асимметричных, основанных на дискретном логарифмировании. Значительное внимание уделено построению параллельных реализаций этих алгоритмов.
 

Техника сетевых атак. Приемы противодействия

Автор: kotmatros255 от 5-01-2022, 17:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Техника сетевых атак. Приемы противодействияНазвание: Техника сетевых атак. Приемы противодействия
Автор: К. Касперски
Издательство: СОЛОН-Р
Год: 2001
Формат: fb2, mobi, epub
ISBN: 5-93455-078-0
Размер: 12,2 мб
Страниц: 468
Язык: русский

Книга в доступной форме рассказывает о проблемах безопасности сетевых сообщений. Излагаемый материал рассчитан в том числе и на неподготовленного читателя; значительную часть книги занимает описание базовых принципов функционирования сети, основных команд протоколов, архитектур операционных систем и т.д.