AWS Certified Developer Associate Practice Tests [2020]: 390 AWS Practice Exam Questions with Answers & detailed Explanations

Автор: buratino от 14-06-2020, 09:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Certified Developer Associate Practice Tests [2020]: 390 AWS Practice Exam Questions with Answers & detailed Explanations
Автор: Neal Davis
Издательство: Digital Cloud Training
Год: 2020
Формат: epub/pdf(conv.)
Размер: 10.1 Mb
Язык: English

Preparing for the AWS Certified Developer Associate exam? Assess your exam readiness with these AWS Practice Tests to maximize your chance of passing your AWS certification exam first time.
Fully updated to reflect the latest DVA-C01 exam, these Practice Tests will prepare you thoroughly for the real exam so that you get to ace your exam with confidence. Presented with and without answers so you can study or simulate an exam.
 

Modeling and Design of Secure Internet of Things

Автор: buratino от 14-06-2020, 08:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Modeling and Design of Secure Internet of Things
Автор: Charles A. Kamhoua (Editor), Laurent L. Njilla (Editor), Alexander Kott (Editor), Sachin Shetty (Editor)
Издательство: Wiley-IEEE Press
Год: 2020
Формат: True PDF
Страниц: 677
Размер: 16.3 Mb
Язык: English

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things
Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential.
 

Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations, 2nd Edition

Автор: buratino от 13-06-2020, 16:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations, Second Edition
Автор: Morey J. Haber
Издательство: Apress
Год: 2020
Формат: true pdf/epub
Страниц: 403
Размер: 14.2 Mb
Язык: English

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges.
 

Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)

Автор: buratino от 13-06-2020, 07:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Автор: Cisco Networking Academy
Издательство: Cisco Press
Год: 2020
Формат: epub
Страниц: 750
Размер: 55.9 Mb
Язык: English

Enterprise Networking, Security, and Automation (CCNA v7) Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the Enterprise Networking, Security, and Automation course and organize your time.
 

Hacking with Kali Linux for Beginners by Ayoub Braiki

Автор: buratino от 12-06-2020, 09:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: hacking with kali linux for beginners: A Beginner’s Guide to Learning All the Basic of Kali Linux and Cybersecurity and Getting Started with Networking, Scripting, and Security in Kali
Автор: Ayoub Braiki
Издательство: Amazon
Год: 2020
Формат: epub/pdf(conv.)
Размер: 10.8 Mb
Язык: English

What You Will Learn
• Master regular Linux orders and systems administration procedures
• Build your own Kali web server and figure out how to be mysterious
• Carry out infiltration testing utilizing Python...
 

Blockchain-Based Smart Grids

Автор: buratino от 11-06-2020, 23:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Blockchain-Based Smart Grids
Автор: Miadreza Shafie-khah (Editor)
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 221
Размер: 11.6 Mb
Язык: English

Blockchain-Based Smart Grids presents emerging applications of blockchain in electrical system and looks to future developments in the use of blockchain technology in the energy market. Rapid growth of renewable energy resources in power systems and significant developments in the telecommunication systems has resulted in new market designs being employed to cover unpredictable and distributed generation of electricity. This book considers the marriage of blockchain and grid modernization, and discusses the transaction shifts in smart grids, from centralized to peer-to-peer structures.
 

Основы информационной безопасности (2006)

Автор: umkaS от 11-06-2020, 09:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Основы информационной безопасности
Автор: Белов Е.Б., Лось В.П. и др.
Издательство: М.: Горячая линия – Телеком
Год: 2006
Cтраниц: 544
Формат: pdf
Размер: 19 мб
Язык: русский

Изложены вопросы теории и практики обеспечения информационной безопасности личности, общества и государства. Большое внимание уделено проблеме безопасности автоматизированных систем, включая вопросы определения модели нарушителя и требований к защите информации. Анализируются современные способы и средства защиты информации и архитектура систем защиты информации.
 

Security, Privacy and Trust in the IoT Environment

Автор: buratino от 11-06-2020, 05:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security, Privacy and Trust in the IoT Environment
Автор: Zaigham Mahmood
Издательство: Springer
Год: 2019
Формат: True PDF
Страниц: 311
Размер: 10 Mb
Язык: English

The Internet of Things (IoT) is a network of devices and smart things that provides a pervasive environment in which people can interact with both the cyber and physical worlds. As the number and variety of connected objects continue to grow and the devices themselves become smarter, users’ expectations in terms of adaptive and self-governing digital environments are also on the rise. Although, this connectivity and the resultant smarter living is highly attractive to general public and profitable for the industry, there are also inherent concerns. The most challenging of these refer to the privacy and security of data, user trust of the digital systems, and relevant authentication mechanisms.
 

Digital Witness

Автор: harun54 от 10-06-2020, 18:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Digital Witness
Автор: Sam Dubberley, Alexa Koenig
Издательство: Oxford University Press
Год: 2020
Формат: PDF
Размер: 54 Мб
Язык: английский / English

From videos of rights violations, to satellite images of environmental degradation, to eyewitness accounts disseminated on social media, human rights practitioners have access to more data today than ever before. To say that mobile technologies, social media, and increased connectivity are having a significant impact on human rights practice would be an understatement. Modern technology - and the enhanced access it provides to information about abuse - has the potential to revolutionise human rights reporting and documentation, as well as the pursuit of legal accountability.
 

Digital Afterlife: Death Matters in a Digital Age

Автор: harun54 от 10-06-2020, 17:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Digital Afterlife: Death Matters in a Digital Age
Автор: Maggi Savin-Baden and Victoria Mason-Robbie
Издательство: Chapman and Hall/CRC
Год: 2020
Формат: PDF
Размер: 10 Мб
Язык: английский / English

Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in Digital Afterlife and the wide-ranging issues that relate to this. Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology, and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital.