Modeling and Analyzing Security Protocols with Tamarin

Автор: literator от 30-07-2025, 07:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide
Автор: David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse
Издательство: Springer
Серия: Information Security and Cryptography
Год: 2025
Страниц: 320
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples witnessing attacks. Tamarin is a robust and powerful analysis tool: it has been under development for over a decade and has reached a state of maturity where it can be applied to model and analyze a wide range of real-world cryptographic protocols. It is now one of the leading tools in this domain, with a wide and active user community spanning both academia and industry. The objective of this book is to help both researchers and practitioners to gain a general understanding of how Formal Methods tools like Tamarin can be used to analyze and improve the quality of real-world protocols. Moreover, we specifically showcase the Tamarin prover and provide guidance on its usage. In this sense, this book provides a user’s manual for Tamarin. But it goes far beyond that, highlighting Tamarin’s underlying theory and its use in modeling and applications.
 

Cloud Application Security Essentials with Azure

Автор: literator от 29-07-2025, 19:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cloud Application Security Essentials with Azure: Azure application security, confidential computing, app identity, authentication, and authorization
Автор: Rouskov Y R
Издательство: BPB Publications
Год: 2025
Страниц: 387
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Modern application development is deeply intertwined with cloud computing, making robust application security an absolute imperative for every professional. As applications increasingly leverage cloud components and services like Azure, understanding the security implications for both your app architecture and its underlying platform is critical to prevent breaches and ensure system integrity. This book starts by defining modern app security, outlining crucial security assertions and security metrics for cloud environments. It then dives into different clouds, including private vs. public cloud models and their impact on app security requirements, highlighting Azure examples and confidential computing. You will explore fundamental blockchain concepts and their relevance, then master app identity, app keys, and delegation concepts. This book aims to define metrics to help evaluate the application security level and establish security as a feature of the application. This book is ideal for application developers, owners, consumers, store owners, and cloud architects who want to learn about application security in cloud environments.
 

Computational Intelligence Techniques for 5G Enabled IoT Networks

Автор: literator от 28-07-2025, 09:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Computational Intelligence Techniques for 5G Enabled IoT Networks
Автор: Mohit Kumar, Sukhpal Singh Gill, Vijay Kumar, Prabal Verma
Издательство: Springer
Год: 2025
Страниц: 263
Язык: английский
Формат: pdf (true)
Размер: 26.4 MB

This book explores emerging interdisciplinary themes and applications reflecting advancements in Computational Intelligence (CI) for IoT and 5G networks. It is divided into four sections. Section 1 introduces Computational Intelligence and Sustainability Solutions for Next-Gen IoT Networks. Section 2 covers Optimization and Resilience Strategies for 5G-Enabled IoT Networks. Section 3 delves Intelligent Resource Allocation and Service Optimization in 5G IoT Networks. Section 4 presents Case studies on Applied Computational Intelligence and 5G IoT Innovations for Industry 4.0. This comprehensive work is essential for researchers and professionals interested in leveraging CI, IoT, and 5G technologies across diverse applications.
 

Home Networking User Manual - 7th Edition 2025

Автор: magnum от 27-07-2025, 08:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Home Networking User Manual - 7th Edition 2025Название: Home Networking User Manual - 7th Edition 2025
Автор: Papercut Limited
Издательство: Papercut Limited
Год выхода: 2025
Страниц: 158
Формат: True PDF
Размер: 68,5 MB
Язык: английский

Возможность передачи больших объемов данных на компьютеры, смарт-телевизоры и игровые консоли привела к определенной нагрузке на домашнюю сеть. В большинстве случаев это работает без проблем и помех, но иногда роутер отключается от Интернета или Wi-Fi полностью выходит из строя. Когда это произойдет, понимание того, как работает Wi-Fi, поможет вам избежать головной боли. Эта книга поможет вам разобраться в методах, связанных с сетевыми операциями. Какое оборудование необходимо, что оно делает и как максимально эффективно использовать каждую часть сетевой головоломки. В нем также описывается, как лучше настроить, усовершенствовать и защитить вашу домашнюю сеть. Как защитить себя в Интернете, как избежать вирусов, бэкдоров и вредоносных программ, как шифровать данные, как восстанавливаться после цифровых атак, как пользоваться Интернетом и виртуальными частными сетями, сетевыми командами Windows, как владеть дисководом - эта книга полна подробных советов и рекомендациях. Если вы хотите узнать больше об Интернете и цифровой безопасности, эта книга для вас.
 

Home Networking For Beginners - 10th Edition 2025

Автор: literator от 27-07-2025, 03:56, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Home Networking For Beginners - 10th Edition 2025
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2025
Страниц: 102
Язык: английский
Формат: pdf
Размер: 47.4 MB

"Домашние сети для начинающих - 10-е издание, 2025 г." - это первый и единственный выбор для начинающих, чтобы узнать все, что им нужно знать о создании домашнего сетевого центра и безопасном использовании Интернета. Написанное простым английским языком, это руководство содержит множество полезных советов и пошаговых иллюстрированных инструкций. Это совершенно новое руководство пользователя расскажет вам все, что нужно знать о домашних сетях, интеллектуальных устройствах, VPN, сетевой безопасности и др. С этим неофициальным руководством у вас не останется вопросов без ответов, поскольку вы будете учиться, изучать и совершенствовать свои навыки работы с сетью.
 

WhatsApp User Manual - 6th Edition 2025

Автор: magnum от 26-07-2025, 23:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

WhatsApp User Manual - 6th Edition 2025Название: WhatsApp User Manual - 6th Edition 2025
Издательство: Papercut
Год: 2025
Страниц: 118
Формат: True PDF
Размер: 43,3 MB
Язык: английский

Unlock the full potential of WhatsApp. This hugely popular social media app is seemingly easy to use, practical, quick and secure. Though how much do you really know about WhatsApp and the features it has to offer? It’s completely free of charge and available for nearly every mobile; there are desktop versions for the PC and Mac too. With it you’re able to send images, videos, have free voice and video chats and even create groups with scores of friends and family members but that’s just the start. WhatsApp is the future of communication available here and now, so if you want to get to grips with this great app read on and we will show you how to master it and discover more than you ever imagined. 100% Independent.
 

CEH Certified Ethical Hacker Cert Guide Premium Edition and Practice Test, 5th Edition

Автор: literator от 26-07-2025, 20:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CEH Certified Ethical Hacker Cert Guide Premium Edition and Practice Test, 5th Edition
Автор: Omar Santos, Michael Gregg
Издательство: Pearson Education
Год: 2026
Страниц: 917
Язык: английский
Формат: epub
Размер: 28.9 MB

Your comprehensive guide to mastering ethical hacking and preparing for the CEH v15 exam. Bestselling authors and security experts Michael Gregg and Omar Santos bring you the most up-to-date and practical preparation guide for the CEH v15 exam. Whether youre preparing to become a Certified Ethical Hacker or looking to deepen your knowledge of cybersecurity threats and defenses, this all-in-one guide delivers the essential content and hands-on practice you need to succeed. This newly updated edition reflects the latest EC-Council exam objectives and the evolving threat landscape, including cloud, IoT, AI-driven attacks, and modern hacking techniques. This book is not designed to be a general security book or one that teaches network defenses. This book looks specifically at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Overall, this book is written with one goal in mind: to help you pass the exam.
 

Innovations in Applied Artificial Intelligence

Автор: krutisvet от 26-07-2025, 08:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Innovations in Applied Artificial Intelligence
Серия: Lecture Notes in Artificial Intelligence, 3029
Автор: Bob Orchard, Chunsheng Yang, Ali Moonis
Издательство: Springer
Год: 2004
Формат: pdf
Страниц: 1293
Размер: 31,0 Мб
Язык: английский

“Intelligent systems must perform in order to be in demand. ” Intelligent systems technology is being applied steadily in solving many day-to-day problems. Each year the list of real-world deployed applications that inconspicuously host the results of research in the area grows considerably. These applications are having a significant impact in industrial operations, in financial circles, in transportation, in education, in medicine, in consumer products, in games and elsewhere. A set of selected papers presented at the seventeenth in the series of conferences on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems (IEA/AIE 2004), sponsored by the International Society of Applied Intelligence, is offered in this manuscript. These papers highlight novel applications of the technology and show how new research could lead to new and innovative applications. We hope that you find these papers to be educational, useful in your own research, and stimulating. In addition, we have introduced some special sessions to emphasize a few areas of artificial intelligence (AI) that are either relatively new, have received considerable attention recently or perhaps have not yet been represented well. To this end, we have included special sessions on e-learning, bioinformatics, and human-robot interaction (HRI) to complement the usual offerings in areas such as data mining, machine learning, intelligent systems, neural networks, genetic algorithms, autonomous agents, natural language processing, intelligent user interfaces, evolutionary computing, fuzzy logic, computer vision and image processing, reasoning, heuristic search, security, Internet applications, constraint satisfaction problems, design, and expert systems.
 

Cyber Threat Hunters Handbook

Автор: literator от 26-07-2025, 08:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Threat Hunters Handbook: Applying advanced analytics, automation, and collaborative intelligence for digital defense
Автор: David F. Pereira Quiceno
Издательство: BPB Publications
Год: 2025
Страниц: 430
Язык: английский
Формат: epub (true)
Размер: 25.0 MB

Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilities at scale. This book offers a hands-on, practical approach to threat hunting and covers key topics such as network traffic analysis, operating system compromise detection, malware analysis, APTs, cyber threat intelligence, AI-driven detection techniques, and open-source tools. Each chapter builds the capabilities, from understanding the fundamentals to applying advanced techniques in real-world scenarios. It also covers integrating strategies for dealing with security incidents, outlining crucial methods for effective hunting in various settings, and emphasizing the power of sharing insights. This book is designed for cybersecurity analysts, incident responders, and Security Operations Center (SOC) professionals seeking to advance their proactive defense skills.
 

Networks, Crowds, and Markets: Reasoning about a Highly Connected World

Автор: krutisvet от 26-07-2025, 08:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Networks, Crowds, and Markets: Reasoning about a Highly Connected World
Автор: David Easley, Jon Kleinberg
Издательство: Cambridge University Press
Год: 2010
Формат: pdf
Страниц: 745
Размер: 11,2 Мб
Язык: английский

Over the past decade there has been a growing public fascination with the complex connectedness of modern society. This connectedness is found in many incarnations: in the rapid growth of the Internet, in the ease with which global communication takes place, and in the ability of news and information as well as epidemics and financial crises to spread with surprising speed and intensity. These are phenomena that involve networks, incentives, and the aggregate behavior of groups of people; they are based on the links that connect us and the ways in which our decisions can have subtle consequences for others. This introductory undergraduate textbook takes an interdisciplinary look at economics, sociology, computing and information science, and applied mathematics to understand networks and behavior. It describes the emerging field of study that is growing at the interface of these areas, addressing fundamental questions about how the social, economic, and technological worlds are connected.