Этичный хакер

Автор: tatanavip от 29-05-2024, 12:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Этичный хакер
Автор: Никита Шахулов
Издательство: Издательские решения
Год: 2022
Формат: pdf, fb2, rtf
Размер: 10 Мб
Качество: Хорошее
Язык: Русский

Этичный хакер (пентестер) — это специалист в сфере кибербезопасности, который профессионально занимается выискиванием «дыр» в коде и помогает устранить утечки данных. Название специальности происходит от англоязычного термина pentest (penetration test), то есть «тест на проникновение». Имеется в виду проникновение в систему через скрытые уязвимости.
 

Performance Analysis of Cooperative Networking with Multi Channels

Автор: literator от 27-05-2024, 04:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Performance Analysis of Cooperative Networking with Multi Channels
Автор: Praveen Kumar Devulapalli, Sushanth Babu Maganti, Pardhasaradhi Pokkunuri
Издательство: CRC Press
Год: 2025
Страниц: 123
Язык: английский
Формат: pdf (true)
Размер: 11.7 MB

This book covers wireless cooperative communication and advanced communication techniques for research scholars and post-graduate students. First, in Chapter 1, we discuss cooperative communication by highlighting wireless channel impairments and addressing cooperative architecture gains. We offer a systematic guide to understanding fundamental principles and implementing valuable taxonomies. The literature review supports the need for a thorough investigation into existing cooperative protocols, and the proposal for a design for developing a cooperative communication model is presented in Chapter 2. Furthermore, the central hypothesis presented in the literature review indicates that meaningful results may be obtained by efficiently selecting relays with correct channel estimation. The rest of this book, which is characterized by its focus on how and when to select relays, will seek to address the lack of studies on successful relay selection in the form of a cooperative communication model under such channel conditions. In Chapter 3, two sophisticated routing algorithms based on MACC and distance parameters are implemented to maximize the benefits of CR in a multi-​radio-​multi-​channel large-​scale wireless network. The combined throughput and transmission time of the proposed algorithms are similar to the IACR algorithm.
 

Логические нейронные сети

Автор: SCART56 от 26-05-2024, 18:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Логические нейронные сети
Автор: Барский А.Б.
Издательство: М.: НОУ "Интуит"
Год: 2016
Страниц: 492
Формат: PDF
Размер: 58 Мб
Язык: русский


На основе положений математической логики событий исследуется возможность построения логических нейронных сетей, выполняющих операции вывода в составе систем искусственного интеллекта, имитирующих механизмы работы мозга. Такие операции лежат в основе систем распознавания, управления и принятия решений.
 

Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI

Автор: literator от 26-05-2024, 04:52, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI
Автор: Toni Janevski
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true), epub
Размер: 26.7 MB

All-in-one resource on the development of Internet and telecoms worldwide, based on the technological frameworks as defined by the ITU. Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI is a highly comprehensive resource that provides full coverage of existing and future fixed and mobile broadband networks, internet, and telecom and OTT services. This book explains how to perform technical, business, and regulatory analysis for future 5G-Advanced, 6G, WiFi, and optical access. This book also covers optical transport, submarine cable, future satellite broadband, cloud computing, massive and critical IoT and frameworks and use of AI / ML in telecommunications. The main “form” of AI at the present time is Machine Learning (ML). ITU has defined architecture for ML in future networks including 5G/IMT‐2020 and beyond. What is ML? According to the ITU’s definition: Machine Learning refers to processes that enable computational systems to understand data and gain knowledge from it without necessarily being explicitly programmed. However, ML is based on mathematics and it is commonly implemented via software tools which are programmed (either by humans or by software tools developed by humans).
 

Home Networking Tricks and Tips - 4th Edition 2024

Автор: literator от 25-05-2024, 13:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Home Networking Tricks and Tips - 4th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 37.8 MB

"Советы и рекомендации по созданию домашних сетей" - это совершенная цифровая публикация для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их из всего "умного дома". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий.
 

CompTIA Network+ Study Guide: Exam N10-009 (6th Edition)

Автор: literator от 23-05-2024, 21:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CompTIA Network+ Study Guide: Exam N10-009 (6th Edition)
Автор: Todd Lammle, Jon Buhagiar
Издательство: Sybex
Год: 2024
Страниц: 1024
Язык: английский
Формат: epub
Размер: 16.6 MB

Prepare for the Network+ certification and a new career in network installation and administration. In the newly revised Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009, bestselling authors and network experts Todd Lammle and Jon Buhagiar deliver thorough and accurate coverage of how to install, configure, and troubleshoot today's networking hardware peripherals and protocols. This book shows you how to succeed on the in-demand CompTIA Network+ certification exam, impress interviewers in the networking industry, and excel in your first role as a network administrator, support technician, or related position. The accomplished authors draw on their combined 30+ years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam: N10-009: Networking concepts, implementation, operations, security, and troubleshooting. Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam: N10-009, the Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009 is a must-have resource for network admins seeking to enhance their skillset with foundational skills endorsed by industry pros and thought leaders from around the world.
 

Нейронные сети для обработки информации

Автор: umkaS от 23-05-2024, 08:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Нейронные сети для обработки информации
Автор: Осовский С.
Издательство: М.: Финансы и статистика
Год: 2002
Cтраниц: 345
Формат: pdf
Размер: 12 мб
Язык: русский

Представлены важнейшие разделы теории искусственных нейронных сетей. Основное внимание уделяется алгоритмам обучения и их применению для обработки измерительной информации. Дается детальный обзор и описание важнейших методов обучения сетей различной структуры, иллюстрируемые численными экспериментами с практически подтвержденными результатами.
 

Нечеткая логика и искусственные нейронные сети

Автор: umkaS от 23-05-2024, 07:21, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Нечеткая логика и искусственные нейронные сети - Круглов В.В., Дли М.И., Голунов Р.Ю.
Автор: Круглов В.В., Дли М.И., Голунов Р.Ю.
Издательство: М.: ФИЗМАТЛИТ
Год: 2001
Cтраниц: 221
Формат: pdf
Размер: 12 мб
Язык: русский

В книге рассмотрены теоретические аспекты подобных сетей,именно, аппарат нечеткой логики,основы теории искусственных нейронных сетей и собственно гибридных сетей применительно к задачам управлениям и принятия решения в условиях неопределенности.
 

Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)

Автор: literator от 22-05-2024, 10:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)
Автор: Omar Santos
Издательство: Pearson IT Certification
Год: 2024
Страниц: 657
Язык: английский
Формат: epub
Размер: 32.2 MB

Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and plans-and the differences among them. You will also learn how threat actors are launching attacks against their victims-compromising confidentiality, integrity, and availability of systems and networks. Santos starts by providing an overview of cybersecurity policy and governance, and how to create cybersecurity policies and develop a cybersecurity framework. He then provides details about governance, risk management, asset management, and data loss prevention. This book begins with a foundational overview of cybersecurity policy and governance to set the stage for the need for balance between policy and practicality in cybersecurity programs. It then goes into detail on cybersecurity policy organization, format, and styles, providing insights into crafting effective and adaptable policies. As the book progresses, it covers topics such as cloud security, governance and risk management, and asset management and data loss prevention, which are just some of the multifaceted challenges organizations face in securing their assets. Cloud security is paramount in today’s environments because of the need to protect data, applications, and infrastructures operated over the cloud. As businesses and organizations increasingly use cloud services, the complexity and volume of cyber threats escalate. Cloud security is important to ensure compliance with rigorous regulatory requirements and industry standards. It plays a crucial role in enabling the safe adoption of cloud technologies, enabling innovation and agility.
 

Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response

Автор: literator от 22-05-2024, 09:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response planning
Автор: Richard Bingley
Издательство: IT Governance Publishing Ltd
Год: 2024
Страниц: 315
Язык: английский
Формат: pdf (true), epub (true)
Размер: 10.4 MB

In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.