Computer Networking (2024)

Автор: literator от 17-09-2024, 03:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Computer Networking
Автор: Zeeshan Qaiser
Издательство: Toronto Academic Press
Год: 2024
Страниц: 258
Язык: английский
Формат: pdf (true)
Размер: 40.6 MB

This text explores the fundamentals of networking technology and its applications in modern computing. The book covers topics such as network architectures, protocols, security, and wireless networking. It is designed to provide readers with a comprehensive understanding of how computer networks function and how they can be configured and managed effectively. Computer networking refers to the practice of connecting multiple devices, such as computers, servers, and mobile devices, to communicate and share resources. It enables the sharing of information, data, and resources between devices, regardless of their physical location. Chapter 1 provides an introduction to computer networking, explaining the fundamental concepts and terminology used in the field. The chapter also covers the history of computer networking, including its evolution over time. Chapter 2 focuses on network protocols and standards, providing an in-depth understanding of the various communication protocols used in computer networking. The chapter discusses the OSI model, TCP/IP protocol suite, and other commonly used network protocols. Chapter 3 delves into network devices and hardware, providing an overview of the various components that make up a computer network. The chapter covers switches, routers, firewalls, and other network devices, as well as their features and functions.Finally, Chapter 8 explores the future of computer networking, discussing emerging technologies, such as the internet of things (IoT) and software-defined networking (SDN), that are likely to shape the future of the field.
 

Quality Assessment and Security in Industrial Internet of Things

Автор: literator от 16-09-2024, 19:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Quality Assessment and Security in Industrial Internet of Things
Автор: Sudan Jha, Sarbagya Ratna Shakya, ­Sultan ­Ahmad, Zhaoxian Zhou
Издательство: CRC Press
Год: 2025
Страниц: 222
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

This book highlights authentication and trust evaluation models in the Industrial Internet of Things. It further discusses data breaches and security issues in various Artificial Intelligence-enabled systems and uses Blockchain to resolve the challenges faced by the Industrial Internet of Things. The text showcases performance quality assessment for the Industrial Internet of Things’ applications. Our book starts with a fundamental understanding of IoT systems and their significance in revolutionizing industries such as manufacturing, healthcare, energy, transportation, and beyond. We unravel the complexities surrounding the quality assessment of smart devices, emphasizing the crucial role of parameters like Quality of Service (QoS) in ensuring optimal performance and reliability. Readers will gain valuable insights into assessing, evaluating, and enhancing the quality of smart devices, thereby contributing to the advancement of IIoT ecosystems. One of the central themes of our book is the critical importance of cybersecurity in IIoT environments. The Industrial Internet of Things (IIoT) has brought about a new era of industrialization that has made manufacturing more efficient, productive, and cost-effective. However, with the growing popularity of IIoT, security concerns have also grown, making the need for secure IIoT systems more critical than ever before. Cyber-attacks, data breaches, device vulnerabilities, and insider threats are just a few security challenges that IIoT systems face. This highlights the urgent need to develop effective security mechanisms to protect IIoT systems against various threats.
 

Ultimate ITIL® 4 Foundation Certification Guide: Master the Best Practices for IT Service Management (ITSM) and get Certified in the ITIL® 4 Foundatio

Автор: magnum от 15-09-2024, 23:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Ultimate ITIL® 4 Foundation Certification Guide: Master the Best Practices for IT Service Management (ITSM) and get Certified in the ITIL® 4 FoundatioНазвание: Ultimate ITIL® 4 Foundation Certification Guide: Master the Best Practices for IT Service Management (ITSM) and get Certified in the ITIL® 4 Foundation Framework
Автор: Sankarsan Biswas
Издательство: Orange Education Pvt Ltd, AVA
Год выхода: 2024
Страниц: 558
Формат: EPUB
Размер: 63,4 MB
Язык: английский

Turbo Charge Your IT career with ITSM Knowledge

The book offers a detailed exploration of the ITIL framework, covering all its aspects, from the basic principles to advanced concepts. This thorough coverage is essential for a deep understanding of ITIL and its application in IT service management. The book is designed to be user-friendly, with clear language, helpful diagrams, and a layout that facilitates easy understanding and retention of information.
 

CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition

Автор: literator от 8-09-2024, 13:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition
Автор: Mark Ciampa
Издательство: Cengage Learning
Год: 2025
Страниц: 610
Язык: английский
Формат: pdf (true)
Размер: 12.3 MB

Reflecting the latest developments and emerging trends from the field, Ciampa's CompTIA Security+ Guide to Network Security Fundamentals, 8th Edition, helps you prepare for professional certification and career success. The text fully maps to the new CompTIA Security+ SY0-701 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the 8th edition includes expanded coverage of information security management, Artificial Intelligence, compliance, cryptography and cloud and virtualization security. Practical, Hands-On Projects, case activities and online virtual labs help you put what you learn into real-world practice. The CompTIA Security+ certification is a vendor-neutral credential that requires passing the current certification exam SY0-701. A successful candidate has the knowledge and skills required to identify attacks, threats, and vulnerabilities; design a strong security architecture; implement security controls; be knowledgeable of security operations and incident response; and be well versed in governance, risk, and compliance requirements. This book is designed to meet the needs of students and professionals who want to master basic information security. A fundamental knowledge of computers and networks is all that is required to use this book.
 

Беспроводные локальные компьютерные сети

Автор: Igor1977 от 6-09-2024, 08:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Беспроводные локальные компьютерные сети
Автор: Чернега В., Платтнер Б.
Издательство: Киев: Изд-во Кондор
Год: 2013
Формат: pdf
Страниц: 232
Размер: 11 mb
Язык: русский

Учебное пособие предназначено для студентов технических университетов, обучающихся по направлению "Компьютерные науки". В нем изложены основные теоретические положения архитектуры и технологии современных беспроводных локальных компьютерных сетей 802.11, а также способы их защиты от несанкционированного доступа. Учебное пособие также может быть использовано студентами, которые обучаются по направлениям "Компьютерная инженерия" и "Системная инженерия".
 

The Language of Cyber Attacks: A Rhetoric of Deception

Автор: literator от 5-09-2024, 22:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Language of Cyber Attacks: A Rhetoric of Deception
Автор: Aaron Mauro
Издательство: Bloomsbury Academic
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true), azw3, epub, mobi
Размер: 10.1 MB

Many cyberattacks begin with a lure: a seemingly innocent message designed to establish trust with a target to obtain sensitive information or compromise a computer system. The perils of clicking an unknown link or divulging sensitive information via email are well-known, so why do we continue to fall prey to these malicious messages?This groundbreaking book examines the rhetoric of deception through the lure, asking where its all-too-human allure comes from and suggesting ways in which we can protect ourselves online. Examining practices and tools such as phishing, ransomware and clickbait, this book uses case studies of notorious cyberattacks by both cyber criminals and nation-states on organizations such Facebook, Google, and the US Department of Defence, and in-depth, computational analyses of the messages themselves to unpack the rhetoric of cyberattacks. In doing so, it helps us to understand the small but crucial moments of indecision that pervade one of the most common forms of written communication.
 

Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments

Автор: literator от 5-09-2024, 02:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments
Автор: Sunil Kumar Chawla, Neha Sharma, Ahmed A. Elngar, Prasenjit Chatterjee, P. Naga Srinivasu
Издательство: CRC Press
Год: 2025
Страниц: 247
Язык: английский
Формат: pdf (true), epub
Размер: 17.1 MB

The industrial landscape is changing rapidly, and so is global society. This change is driven by the growing adoption of the Industrial Internet of Things (IIoT) and Artificial Intelligence (AI) technologies. IIoT and AI are transforming the way industrial engineering is done, enabling new levels of automation, productivity, and efficiency. However, as IIoT and AI become more pervasive in the industrial world, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems. Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments provides a comprehensive guide to IIoT security, covering topics such as network architecture, risk management, data security, and compliance. It addresses the unique security challenges that the cloud and edge environments pose, providing practical guidance for securing IIoT networks in these contexts. It includes numerous real-world case studies and examples, providing readers with practical insights into how IIoT security and AI-enabled industrial engineering are being implemented in various industries. Best practices are emphasized for the readers to ensure the reliability, safety, and security of their systems while also learning the latest developments in IIoT security for AI-enabled industrial engineering systems in this rapidly evolving field. By offering step-by-step guidance for the implantation process along with best practices, this book becomes a valuable resource for practitioners and engineers in the areas of industrial engineering, IT, computer engineering, and anyone looking to secure their IIoT network against cyber threats.
 

A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

Автор: literator от 3-09-2024, 14:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
Автор: Jason Edwards
Издательство: Wiley
Год: 2025
Страниц: 448
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Learn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. The cybersecurity landscape is increasingly complex, characterized by various sophisticated threats that target every aspect of the digital environment. From advanced persistent threats to ransomware, phishing, and zero-day exploits, the variety and sophistication of these cyber threats pose a constant challenge to organizations. This complexity is further amplified by the rapid pace of technological advancements and the expanding digital footprint of businesses, making securing digital assets an ever-evolving battle. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.
 

Security and Privacy in Web 3.0

Автор: literator от 2-09-2024, 11:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy in Web 3.0
Автор: Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu
Издательство: Springer
Год: 2024
Страниц: 164
Язык: английский
Формат: pdf (true), epub
Размер: 16.4 MB

Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is designed to address issues encountered in the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. This book explores the challenges and solutions related to ensuring security and privacy in the context of the evolving Web 3.0 architecture. Web 3.0 represents the next generation of the web, characterized by decentralized networks, blockchain technology, and enhanced user control over data. As Web 3.0 evolves, the focus on addressing security and privacy concerns becomes increasingly crucial. This book provides a comprehensive understanding of the security and privacy issues specific to Web 3.0 and offers practical defense frameworks and methods to mitigate these challenges. This book is dedicated to the specific aspects of security and privacy in Web 3.0, from introducing the architecture and addressing the inherent issues to presenting innovative methods for privacy-preserving computing, user behavior identification, and abnormal transaction detection. It is of particular interest to researchers in the field of Web 3.0, blockchain, and network security, as it summarizes the security and privacy concerns in Web 3.0 and brings a number of innovative technologies and practical solutions to protect sensitive data and maintain user privacy in Web 3.0 environments, equipping researchers with the knowledge necessary to design secure and privacy-aware applications and systems in Web 3.0.
 

Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT

Автор: literator от 30-08-2024, 22:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT
Автор: Venugopal K R, Roopa M S, Santosh Pattar
Издательство: CRC Press
Год: 2025
Страниц: 330
Язык: английский
Формат: pdf (true)
Размер: 18.2 MB

A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems. It discusses the benefits of integrating social networking concepts into the Internet of Things to find the preferable, reliable, scalable, and near-optimal detection of things or services. It explores the concepts of the Social Internet of Things in different domains of IoT, such as the Internet of Vehicles and the Industrial Internet of Things. This book works to recognize and respond to user queries and improve service provisioning, find the optimal solution for the link selection in the SIoT structure, develop large-scale platforms, and provide a smart mechanism for trust evaluation.