Web and Network Data Science: Modeling Techniques in Predictive Analytics

Автор: admin от 2-06-2020, 20:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web and Network Data Science: Modeling Techniques in Predictive Analytics
Автор: Thomas W. Miller
Издательство: Pearson
Год: 2014
Формат: EPUB
Размер: 39 Мб
Язык: английский / English

Master modern web and network data modeling: both theory and applications. In Web and Network Data Science, a top faculty member of Northwestern University’s prestigious analytics program presents the first fully-integrated treatment of both the business and academic elements of web and network modeling for predictive analytics.
 

Statistical Analysis of Network Data with R, Second Edition

Автор: literator от 2-06-2020, 15:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Statistical Analysis of Network Data with R, Second EditionНазвание: Statistical Analysis of Network Data with R, Second Edition
Автор: Eric D. Kolaczyk, Gabor Csardi
Издательство: Springer
Серия: Use R!
Год: 2020
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

The new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks.
 

Security from Zero

Автор: buratino от 2-06-2020, 00:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security from ZeroНазвание: Security from Zero: A Practical Guide to Security for Busy People (Revision 7)
Автор: Eric Higgins
Издательство: Fullstack.io
Год: 2020-04-17
Формат: true pdf/epub/mobi
Страниц: 131
Размер: 10 Mb
Язык: English

Security from Zero is the busy person's guide to running a security program.
 

Metasploit: The Penetration Tester's Guide

Автор: harun54 от 1-06-2020, 08:39, Коментариев: 1

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Metasploit: The Penetration Tester's Guide
Автор: David Kennedy, Jim O'gorman, Devon Kearns, Mati Aharoni
Издательство: No Starch Press
Год: 2011
Формат: PDF
Страниц: 328
Для сайта: litgu.ru
Размер: 4.1 Mb
Язык: English

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
 

A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more

Автор: TRex от 1-06-2020, 03:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
Автор: Richard Medlin
Издательство: Information Warfare Center
Год: 2020
Формат: PDF
Страниц: 202
Размер: 22,6 Mb
Язык: English

Have you ever found yourself questioning whether your network is in good hands? Did you do everything you could to defend against exploits on your network? Is your employer safe because you have one of the best Security Information Event Management (SIEM) setups you can use monitoring the network for you? Or, maybe you’re new to Information Security and you want to learn how to employ a robust Intrusion Detection System (IDS) but you don’t know where to start. If you have ever asked yourself any of these questions
 

Big Data and Networks Technologies

Автор: buratino от 31-05-2020, 00:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Big Data and Networks Technologies (Lecture Notes in Networks and Systems 81)
Автор: Farhaoui, Yousef (Editor)
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 380
Размер: 21 Mb
Язык: English

This book reviews the state of the art in big data analysis and networks technologies. It addresses a range of issues that pertain to: signal processing, probability models, machine learning, data mining, databases, data engineering, pattern recognition, visualization, predictive analytics, data warehousing, data compression, computer programming, smart cities, networks technologies, etc.
 

Cyber Threat Intelligence for the Internet of Things

Автор: literator от 30-05-2020, 13:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cyber Threat Intelligence for the Internet of ThingsНазвание: Cyber Threat Intelligence for the Internet of Things
Автор: Elias Bou-Harb, Nataliia Neshenko
Издательство: Springer
Год: 2020
Страниц: 99
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security.
 

Advanced Optical and Wireless Communications Systems

Автор: buratino от 29-05-2020, 12:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Advanced Optical and Wireless Communications Systems
Автор: Ivan B. Djordjevic
Издательство: Springer
Год: 2018
Формат: PDF
Размер: 26 Мб
Язык: английский / English

This textbook introduces the advanced topics of: (i) wireless communications, (ii) free-space optical (FSO) communications, (iii) indoor optical wireless (IR) communications, and (iv) fiber-optics communications and presents these different types of communication systems in a unified fashion for better practical use.
 

Hardware Architectures for Deep Learning (Materials, Circuits and Devices)

Автор: TRex от 29-05-2020, 09:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hardware Architectures for Deep Learning (Materials, Circuits and Devices)
Автор: Masoud Daneshtalab, Mehdi Modarressi
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: PDF
Страниц: 328
Размер: 17 Mb
Язык: English

This book presents and discusses innovative ideas in the design, modelling, implementation, and optimization of hardware platforms for neural networks.
 

Networked Control Systems: Cloud Control and Secure Control

Автор: buratino от 29-05-2020, 01:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Networked Control Systems: Cloud Control and Secure Control
Автор: Magdi S. Mahmoud, Yuanqing Xia
Издательство: Butterworth-Heinemann
Год: 2019
Формат: True PDF
Страниц: 486
Размер: 15.9 Mb
Язык: English

Networked Control Systems: Cloud Control and Secure Control explores new technological developments in networked control systems (NCS), including new techniques, such as event-triggered, secure and cloud control. It provides the fundamentals and underlying issues of networked control systems under normal operating environments and under cyberphysical attack.