The Modern Security Operations Center (Final)

Автор: literator от 16-07-2024, 05:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Modern Security Operations Center: The People, Process, and Technology for Operating SOC Services (Final)
Автор: Joseph Muniz
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2021
Страниц: 751
Язык: английский
Формат: True/Retail PDF
Размер: 21.6 MB

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services. This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. I believe anybody with an interest in cybersecurity will benefit from this book. I explain concepts using different viewpoints ranging from what leadership expects to those behind the keyboard care about. Topics include building a SOC, risk management, vulnerability management, incident management, analysis of malware, compliance, digital forensics, situational and security awareness, and research and development. All of these topics correspond to services that are provided by mature SOCs around the world. Anybody who is interested in learning how to build these services into their security practice will benefit from this book.
 

Fluidware: Novel Approaches for Large-Scale IoT Systems

Автор: literator от 14-07-2024, 13:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fluidware: Novel Approaches for Large-Scale IoT Systems
Автор: Franco Zambonelli, Giancarlo Fortino, Barbara Re, Mirko Viroli
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 208
Язык: английский
Формат: pdf (true), epub
Размер: 17.5 MB

This book provides an overview of the many approaches that can adopted for programming and deploying highly-adaptive and large-scale IoT systems, with a specific focus on the key results achieved within the Fluidware research project. The authors start by presenting Fluidware, which develops a novel programming model for IoT services and applications, along with the associated and robust large-scale IoT services and applications. Starting from previous findings in the areas of field-based coordination, collective adaptive systems, stream computing and aggregate computing, the authors address the complexity of building modern, large-scale IoT systems, by a full-fledged engineering approach revolving around a new notion of distributed programming. The authors show how the key innovative idea of Fluidware is to abstract collectives of devices of the IoT fabric as sources, digesters, and targets of distributed "flows" of contextualized events, carrying information about data produced and actuating commands. The book is divided into three parts: (i) the first part is a general introduction to the Fluidware ideas and to the key problems associated with programming IoT systems, (ii) the second part presents the key results achieved within the Fluidware project; (iii) the third part identified open challenges and research directions. However, IoT applications and services can be hard to program and deploy. Indeed, services and applications for the IoT may involve composing and coordinating myriads of heterogeneous devices, typically dispersed over an environment. In the above context, the IoT research community worldwide started putting notable investigation efforts toward the identification of novel programming approaches for IoT applications that could make it possible to deal with the above sources of complexity automatically and rather enable programmers to easily program and deploy flexible and adaptive applications, enabling to express in full the potentials of the IoT fabric.
 

Encountering Mobile Data Dynamics in Heterogeneous Wireless Networks

Автор: literator от 14-07-2024, 07:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Encountering Mobile Data Dynamics in Heterogeneous Wireless Networks
Автор: Jie Wang, Wenye Wang, Xiaogang Wang
Издательство: Springer
Год: 2024
Страниц: 187
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book offers a systematic view of data services in heterogeneous wireless networks, from the perspectives of cause, governing rules, and impact of data’s mobility on such networks. Specifically, it covers application requirements break-down, network modeling, performance analysis and evaluation by examining mobile data dynamics that are particularly important to data service provisioning. Additionally, application prospects such as information dissemination, fog computing, Internet-of-Things and dynamic spectrum access are discussed on the basis of these dynamics. Theoretic analysis, example illustrations, and algorithms are also presented to provide a concise coverage of this important area of networking. Mobile data dynamics refers to the stochastic processes of information, geographical coverage and spectrum, which accompanies the movements of data across wireless networks. Owing to the challenge raised by a high level of network heterogeneity, and the innate requirement on scalability, knowledge on the evolution of mobile data dynamics is essential to the design and deployment of emerging data services and applications, such as Internet-of-Things, data/task offloading and edge-based machine learning/inference. This book is designed for researchers and advanced-level students in the field of wireless networking and edge computing, who seek to understand the models and evolutions of mobile data dynamics for future edge applications. Practitioners, who specialize in the design, operation and maintenance of edge computing systems will also want to purchase this book as a reference.
 

Cellular Communication Networks and Standards: The Evolution from 1G to 6G

Автор: literator от 14-07-2024, 00:22, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cellular Communication Networks and Standards: The Evolution from 1G to 6G
Автор: Wei Jiang, Bin Han
Издательство: Springer
Год: 2024
Страниц: 268
Язык: английский
Формат: pdf (true), epub
Размер: 42.3 MB

This textbook provides a comprehensive review of the evolution of mobile communications and networking from the birth of cellular networks to the forthcoming sixth-generation mobile communications, which is envisioned to be commercially deployed first in 2030. New students who are coming to wireless communications/electrical engineering/computer networking/telecommunications and network engineering can benefit from this book by quickly grasping the whole history of cellular networks, understanding its trends. This tutorial styled textbook provides a comprehensive overview, but also provides details of the system design aspects of the various cellular generations up to 6G and how they build on each other. The book also gives the student an overview of different cellular generations’ motivations, core technologies, architecture, key performance indicators, killer applications, market drivers, and the general/main features of each. The authors capture the big picture and fundamental drivers of wireless communication technologies, and then motivate students to understand the importance of learning related subjects such as electromagnetics theory, antenna design, analog and digital circuits, signal processing, Internet protocols, Artificial Intelligence, etc. The book features homework questions and case studies throughout.
 

Location, Localization, and Localizability: Location-awareness Technology for Wireless Networks 2nd Edition

Автор: literator от 13-07-2024, 07:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Location, Localization, and Localizability: Location-awareness Technology for Wireless Networks 2nd Edition
Автор: Yunhao Liu, Zheng Yang
Издательство: Springer
Год: 2024
Страниц: 214
Язык: английский
Формат: pdf (true), epub
Размер: 36.9 MB

Time flies since the debut of this book. In the past ten years, localization technology has evolved from small saplings into towering trees. Robots and drones with autonomous positioning and navigation capabilities, once considered unreachable fantasies, have gradually become a reality. However, while we are being amazed at the groundbreaking changes brought about by technology, as researchers, we still need to remain acutely attentive to the current limitations of localization. Some significant challenges still impede the widespread deployment. For example, traditional Wi-Fi fingerprint-based wireless localization, due to various challenges in fingerprint database collection and maintenance, has remained stay in the laboratory, and even when using smartphones for localization in malls, we still cannot achieve the outdoor GPS-like experience. The list goes on and on. Against this backdrop, the reissue of this book aims to more comprehensively reflect the latest developments in localization technology. We have added introductions to emerging technologies such as passive high-precision localization based on wireless signal CSl and autonomous localization for smart devices. Additionally, we have integrated and further streamlined technical chapters that now appear outdated adapting to the pace of the times. This book aims to provide a comprehensive and in-depth view of location-awareness technology in today’s popular wireless networks. However, the obvious diversity of networks, from short-range Bluetooth to long-range telecommunication networks, makes it very challenging to organize materials. Although general principles exist, the implementation differs from network to network and application to application.
 

Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting

Автор: literator от 12-07-2024, 04:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
Автор: Rafay Baloch
Издательство: CRC Press
Год: 2024
Страниц: 578
Язык: английский
Формат: pdf (true)
Размер: 50.1 MB

In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. This book, penned by an expert in the field, ventures beyond traditional approaches, offering a unique blend of real-world penetration testing insights and comprehensive research. It's designed to bridge the critical knowledge gaps in cybersecurity, equipping readers with both theoretical understanding and practical skills. What sets this book apart is its focus on real-life challenges encountered in the field, moving beyond simulated scenarios to provide insights into real-world scenarios. The core of Web Hacking Arsenal is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the book's relevance over time, empowering readers to stay ahead in the ever-changing cybersecurity landscape. This book is more than a guide; it's a foundational tool that empowers readers at any stage of their journey. Whether you're just starting or looking to elevate your existing skills, this book lays a solid groundwork. Then it builds upon it, leaving you not only with substantial knowledge but also with a skillset primed for advancement. It's an essential read for anyone looking to make their mark in the ever-evolving world of web application security.
 

Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research

Автор: literator от 9-07-2024, 22:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Big Data and Edge Intelligence for Enhanced Cyber Defense: Principles and Research
Автор: Ranjit Panigrahi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi, Hareesha K.S.
Издательство: CRC Press
Серия: Edge AI in Future Computing
Год: 2024
Страниц: 200
Язык: английский
Формат: pdf (true)
Размер: 15.1 MB

An unfortunate outcome of the growth of the internet and mobile technologies has been the challenge of countering cybercrime. This book introduces and explains the latest trends and techniques of Edge Artificial Intelligence (EdgeAI) intended to help cyber security experts design robust Cyber Defense Systems (CDS), including host based and network-based intrusion detection system and digital forensic intelligence. Big Data and Edge Intelligence for Enhanced Cyber Defense discusses the direct confluence of EdgeAI with Big Data, as well as demonstrating detailed reviews of recent cyber threats and their countermeasures. It provides computational intelligence techniques and automated reasoning models capable of fast training and timely data processing of cyber security Big Data, in addition to other basic information related to network security. In addition, it provides a brief overview of modern cyber security threats and outlines the advantages of using EdgeAI to counter these threats, as well as exploring various Cyber Defense Mechanisms (CDM) based on detection type and approaches. Specific challenging areas pertaining to cyber defense through Edge AI such as improving Digital forensic intelligence, proactive and adaptive defense of network infrastructure and bio-inspired cyber defense mechanisms are also discussed. This book is intended as a reference for academics and students in the field of network and cybersecurity, particularly on the topics of intrusion detection systems, smart grid, Edge AI and bio-inspired cyber defense principles. The front-line Edge AI techniques discussed will also be of use to cybersecurity engineers in their work enhancing cyber defense systems.
 

Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems 2nd Edition

Автор: literator от 9-07-2024, 11:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems 2nd Edition
Автор: Abdul Salam
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 403
Язык: английский
Формат: pdf (true)
Размер: 15.8 MB

This updated book presents research on how Internet of Things plays a part in shaping the future of our communities. The author shows how the research and education ecosystem promoting impactful solutions-oriented science can help citizenry, government, industry, and other stakeholders to work collaboratively in order to make informed, socially-responsible, science-based decisions. The author also provides updated data on how communities can address complex, interconnected socio-environmental challenges. This book addresses the key inter-related challenges in areas such as the environment, climate change, mining, energy, agro-economic, water, and forestry that are limiting the development of a sustainable and resilient society -- each of these challenges are tied back to IoT based solutions.
 

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

Автор: literator от 9-07-2024, 09:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Hack Is Back: Techniques to Beat Hackers at Their Own Games
Автор: Jesse Varsalone, Christopher Haller
Издательство: CRC Press
Год: 2025
Страниц: 324
Язык: английский
Формат: pdf (true)
Размер: 35.1 MB

Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and provide examples of some of the nefarious techniques used by hackers and cover how attackers apply these methods in a practical manner. The Hack Is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks in computer systems and within networks. This book will benefit the offensive-minded hacker (red-teamers) as well as those who focus on defense (blue-teamers). This book provides real-world examples, hands-on exercises, and insider insights into the world of hacking. This book will give readers the tools they need to become effective hackers while also providing information on how to detect hackers by examining system behavior and artifacts. By following the detailed and practical steps within these chapters, readers can gain invaluable experience that will make them better attackers and defenders. The authors, who have worked in the field, competed with and coached cyber teams, acted as mentors, have a number of certifications, and have tremendous passions for the field of cyber, will demonstrate various offensive and defensive techniques throughout the book.
 

Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies

Автор: literator от 8-07-2024, 01:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT
Автор: Oluyemi James Odeyinka
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 354
Язык: английский
Формат: pdf, epub
Размер: 13.2 MB

Securing the Future of IoT with Advanced Edge Computing Solutions. Embark on a journey into the cutting-edge world of secure edge computing. In this meticulously crafted handbook, delve deep into the intricacies of this transformative technology that is reshaping the landscape of computing. From its fundamental principles to advanced applications, this book leaves no stone unturned in demystifying the complexities of secure edge computing. Explore the architecture that underpins this paradigm shift, unraveling how it seamlessly integrates cloud resources with local devices to enhance efficiency and reliability. Dive into the nuances of security in edge computing, understanding the unique challenges posed by distributed networks and diverse endpoints. Learn essential strategies for safeguarding data integrity, confidentiality, and availability in this dynamic environment, ensuring robust protection against emerging threats. Discover real-world case studies and best practices from industry experts, gaining invaluable insights into deploying and managing secure edge computing solutions across various domains. With clear explanations, practical examples, and actionable advice, Secure Edge Computing For IoT empowers you to harness the full potential of this transformative technology while fortifying your digital infrastructure against evolving security risks. Prepare to embark on a journey of innovation and resilience at the edge of tomorrow’s computing landscape.