Securing the Digital Frontier: Advanced Frameworks for Social Media and IoT Threats

Автор: literator от 19-09-2025, 02:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Securing the Digital Frontier: Advanced Frameworks for Social Media and IoT Threats
Автор: Akashdeep Bhardwaj
Издательство: BPB Publications
Год: 2026
Страниц: 400
Язык: английский
Формат: epub (true)
Размер: 14.8 MB

The explosive growth of interconnected devices and digital platforms has led to cybersecurity becoming a cornerstone of modern technological infrastructure. In an era of AI-driven misinformation and smart IoT vulnerabilities, innovative defense mechanisms are more critical than ever. This book offers a structured and insightful journey through the evolving landscape of cybersecurity, focusing on the pressing challenges posed by social media and IoT ecosystems. Readers explore ML frameworks designed to detect fake news and distorted social media campaigns, followed by methods to identify fake Instagram profiles and prevent impersonation. The discussion advances into technical territory with a threat surface analysis of smart IoT cameras, offering metrics to address their unique vulnerabilities. This book is designed for advanced cybersecurity professionals, IoT developers, academic researchers, graduate students, and policymakers. It is ideal for those looking to deepen their understanding of emerging cyber threats and learn practical, research-backed methods to secure digital and IoT ecosystems.
 

Pythonic AI. Руководство по созданию приложений ИИ на Python

Автор: Chipa от 18-09-2025, 11:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Pythonic AI. Руководство по созданию приложений ИИ на Python
Автор: Ариндам Банерджи
Издательство: Э
Год: 2025
Формат: PDF
Страниц: 530
Размер: 13 Mb
Язык: Русский

Идеально подходит тем, кто хочет освоить ключевые инструменты и методологии, включая CNN для компьютерного зрения и NLP-модели с TensorFlow 2. Предлагаются полезные проекты и продвинутые концепции, такие как механизмы внимания, трансформеры и GAN. Автор делится опытом создания сложных моделей и разработки современных приложений ИИ, делая акцент на практическое освоение технологий.

 

Искусственный интеллект для периферийных устройств: осваиваем встраиваемые системы для машинного обучения

Автор: Chipa от 17-09-2025, 17:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Искусственный интеллект для периферийных устройств: осваиваем встраиваемые системы для машинного обучения
Автор: Планкетт Дженни, Ситунаяке Дэниел
Издательство: бхв
Год: 2025
Формат: PDF
Страниц: 514
Размер: 70 Mb
Язык: Русский

В книге исследованы возможности использования искусственного интеллекта при работе с периферийными устройствами, датчиками и Интернетом вещей. Рассмотрены алгоритмы, применяемые при реализации периферийного ИИ, паттерны проектирования программных и аппаратных компонентов Интернета вещей, рассчитанных на последующее машинное обучение. Продемонстрировано, как подбирать и фильтровать данные, развертывать, развивать и поддерживать сети умных устройств.

 

Practical Purple Teaming: The Art of Collaborative Defense

Автор: literator от 17-09-2025, 16:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Practical Purple Teaming: The Art of Collaborative Defense
Автор: Alfie Champion
Издательство: No Starch Press
Год: 2026
Страниц: 352
Язык: английский
Формат: epub
Размер: 23.1 MB

Real-world threats demand real-world teamwork. If you’re tired of red team reports gathering dust—or defensive teams being left in the dark—this book is for you. Practical Purple Teaming gives you a hands-on blueprint for running collaborative security exercises that improve detection, build trust, and expose real gaps before attackers do. You’ll learn how to emulate adversaries using tools like Atomic Red Team, MITRE Caldera, and Mythic, and you’ll guide defenders toward actionable insights using real logs, alerts, and frameworks like MITRE ATT&CK, the Cyber Kill Chain, and the Pyramid of Pain. Yet as the field of cybersecurity has matured, new testing methodologies increasingly blur the line between attack and defense. Many offensive engagements now strike a balance between executing realistic attacks (the red focus) and aiding defenders, potentially to the detriment of attack realism (the blue focus). We term such blended exercises purple teaming. There is no one-size-fits-all approach to purple teaming. In this book, you’ll learn how to pick the right tool for the job. Whether you’re red, blue, or somewhere in between, this book will help you test smarter, detect faster, and collaborate better. If you’ve ever finished a red team engagement and wondered what actually changed, this is your playbook.
 

Zero-Trust Learning: Applications in Modern Network Security

Автор: literator от 16-09-2025, 21:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Zero-Trust Learning: Applications in Modern Network Security
Автор: Chetna Kaushal, Amandeep Kaur, Mohit Angurala, Aryan Chaudhary
Издательство: Apple Academic Press/CRC Press
Год: 2026
Страниц: 491
Язык: английский
Формат: pdf (true), epub
Размер: 29.9 MB

In this internet age of security challenges and threats from cybercrime, enhanced security measures are necessary. The zero trust model—the IT security model that requires strict identity verification for every person and device trying to access resources on a private network—helps to meet these everincreasing and evolving security challenges. This new volume offers a comprehensive overview of the zero trust security model and its application in the field of cybersecurity, covering the principles, technologies, and best practices for implementing a zero trust approach, equipping readers with the knowledge and tools to secure their digital environments effectively. This book stands out by providing a holistic view of the zero trust security model, combining practical guidance for professionals with educational insights for both professionals and students and offering real-world examples and case studies that bridge the gap between learning and implementation. Zero-trust security offers transformative advantages, revolutionizing our approach to threat protection, vulnerability reduction, and challenge response.
 

Когнитивная Сверхдержава

Автор: Natali26 от 16-09-2025, 10:21, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Когнитивная Сверхдержава
Автор: Руслан Нерсесян
Издательство: Автор
Год: 2025
Формат: pdf
Страниц: 121
Размер: 10.4 Мб
Язык: русский

Книга «Когнитивная Сверхдержава» представляет собой фундаментальный труд, посвященный формированию новой парадигмы национальной безопасности в эпоху цифровой трансформации. На основе научных работ Руслана Нерсесяна в книге разработана целостная концепция Доктрины когнитивной безопасности, включающая теоретико-методологические основы, систему измеримых показателей и практические механизмы реализации. В работе представлена инновационная методология оценки состояния национальной безопасности через систему индексов, определены стратегические цели развития и предложены конкретные пути достижения статуса когнитивной сверхдержавы. Особое внимание уделяется вопросам технологического суверенитета, развития нейроквантовых технологий и формирования новой архитектуры международной безопасности.


 

Improving the Energy Efficiency of Mobile Networks: Strategies for 5G and 6G Technologies

Автор: literator от 16-09-2025, 03:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Improving the Energy Efficiency of Mobile Networks: Strategies for 5G and 6G Technologies
Автор: Josip Lorincz, Zvonimir Klarin
Издательство: CRC Press
Год: 2025
Страниц: 145
Язык: английский
Формат: pdf (true), epub
Размер: 15.4 MB

This book provides an analysis of the problem of high energy consumption of mobile networks and describes methods for improving the energy efficiency of mobile networks. It explores new technologies and strategies that will enable mobile networks to operate with less energy and become more sustainable while not compromising service quality. Improving the Energy Efficiency of Mobile Networks: Strategies for 5G and 6G Technologies is designed to help readers understand how to optimize energy consumption in mobile networks. It explores technical solutions for reducing the energy consumption with a focus on innovative solutions such as network energy consumption optimization using Artificial Intelligence (AI) in the management of network resources, energy harvesting (EH), software-defined networking, renewable energy sources, and implementation of advanced techniques and protocols for improving the energy efficiency of mobile networks. The book analyzes how the integration of different advanced technologies, network function virtualization, and non-orthogonal multiple access techniques, along with the implementation of AI, renewable energy sources, and EH, can contribute to the optimizing energy use of mobile networks, without compromising network performance.
 

This Is for Everyone: The Unfinished Story of the World Wide Web

Автор: literator от 15-09-2025, 21:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: This Is for Everyone: The Unfinished Story of the World Wide Web/This Is for Everyone: The Captivating Memoir from the Inventor of the World Wide Web, UK Edition
Автор: Tim Berners-Lee
Издательство: Macmillan/Farrar, Straus and Giroux
Год: 2025
Страниц: 400
Язык: английский
Формат: epub (true)
Размер: 14.4 MB

The inventor of the World Wide Web explores his vision’s promise—and how it can be redeemed for the future. Perhaps the most influential inventor of the modern world, Sir Tim Berners-Lee is a different kind of technologist. Born in the same year as Bill Gates and Steve Jobs, he famously distributed his invention, the World Wide Web, for no commercial reward. Its widespread adoption changed everything—transforming humanity into the first digital species. Through the web, we live, work, dream, quarrel, and connect. In this intimate memoir, Berners-Lee tells the story of his iconic invention, exploring how it launched a new era of creativity and collaboration while unleashing powerful forces that imperil truth and privacy and polarize public debate. As the rapid development of Artificial Intelligence brings new risks and possibilities, Berners-Lee also offers a crucial guide to the decisions ahead—and shows how our digital lives can be reengineered for the sake of human flourishing rather than profit or for power.
 

Введение в компьютерные сети. Маршрутизаторы Eltex

Автор: Chipa от 15-09-2025, 11:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Введение в компьютерные сети. Маршрутизаторы Eltex
Автор: Денис Корчагин
Издательство: stepik
Год: 2025
Формат: PDF
Страниц: много
Размер: 124 Mb
Язык: Русский

Курс рассчитан на новичков, которые только начинают свое знакомство с компьютерными сетями или с оборудованием Eltex. Неважно, есть ли у вас знания в сетевых технологиях или вы только делаете первые шаги, — мы начинаем с азов, а затем переходим к более сложным темам.
 

Ultimate Microsoft XDR for Full Spectrum Cyber Defence

Автор: literator от 14-09-2025, 18:16, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ultimate Microsoft XDR for Full Spectrum Cyber Defence: Design, Deploy, and Operate Microsoft XDR for Unified Threat Detection, Hunting, and Automated Response across Identities, Endpoints, and Cloud
Автор: Ian David Hanley
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 353
Язык: английский
Формат: epub (true)
Размер: 23.9 MB

Unify Your Cyber Defense, Hunt Smarter and Respond Faster with Microsoft XDR! Extended Detection and Response (XDR) is essential for unifying security signals, accelerating investigations, and stopping attacks, before they spread. This book, Ultimate Microsoft XDR for Full Spectrum Cyber Defence shows you how to harness Microsoft’s powerful XDR stack to protect identities, endpoints, cloud workloads, and collaboration platforms. You will progress from mastering the core Defender products and Entra ID security features to unlocking Microsoft Sentinel’s SIEM and SOAR capabilities. Along the way, you will also build high-fidelity detections with KQL, automate responses with playbooks, and apply Zero Trust principles to secure modern, hybrid environments. Each chapter combines real-world scenarios with step-by-step guidance, so that you can confidently operationalize Microsoft XDR in your own organization. Hence, whether you are a security analyst, architect, SOC leader, or MSSP team, this guide equips you to design, deploy, and scale a unified detection and response strategy—reducing complexity, improving visibility, and neutralizing threats at machine speed. This book is tailored for SOC analysts/engineers, architects, Azure and MS 365 admins, and MSSP teams to design and run scalable Microsoft XDR defenses.