Applications of Blockchain Technology

Автор: literator от 13-08-2025, 15:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Applications of Blockchain Technology
Автор: Arvind Mewada, Nagendra Singh, Mohd. Aquib Ansari, Amrendra Singh Yadav
Издательство: CRC Press
Год: 2026
Страниц: 280
Язык: английский
Формат: pdf (true), epub
Размер: 17.6 MB

This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps. It examines blockchain's role in enhancing transparency, security, and decentralisation across various sectors and in society. The book addresses both the advancements and challenges of blockchain, providing practical use cases to understand the opportunities, limitations, and innovative applications of blockchain, envisioning a future where this technology drives significant societal change. Blockchain is a distributed ledger technology that enables decentralised data storage across several computers (nodes). Blockchain comprises a block’s series, and each block plays the role of a public ledger, having a list of transactions, a timestamp, and a link to the block before it. Because of this structure, it is very difficult to change the data without also changing all of the blocks that come after it, which would require agreement from most of the network. Since a network of nodes uses a consensus method to validate and record transactions, the decentralised nature of blockchain eliminates the need for central authority. This decentralisation guarantees the security, integrity, and transparency of the data recorded on the blockchain when combined with cryptographic methods.
 

Web Penetration Testing: Advanced Guide | Create 45 Security Assessments | Including OWASP Top 10

Автор: literator от 13-08-2025, 13:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Web Penetration Testing: Advanced Guide | Create 45 Security Assessments | Including OWASP Top 10
Автор: Nathan Beckford
Издательство: Independently published
Год: 2025
Страниц: 497
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Unlock the skills to test and secure modern web applications—step by step. In today's digital world, web applications are prime targets for cyberattacks. This practical guide empowers you to defend them. Designed for security professionals, developers, and ethical hackers, this book offers a complete roadmap to mastering web penetration testing with real-world techniques and tools. Through 45 guided security assessments, you'll learn how to ethically exploit and secure vulnerabilities across every layer of a web application. Each assessment is mapped to real threats and structured around the latest OWASP Top 10, covering issues like broken access control, injection flaws, and server-side request forgery (SSRF). This book is written for those who are ready to take their skills to the next level. Maybe you’re a developer who wants to secure your applications, a security analyst preparing for a certification, or an ethical hacker looking to sharpen your craft. Wherever you are in your journey, I’ve designed this guide to meet you there. It assumes you have a basic understanding of web technologies—HTML, jаvascript, HTTP, and the like—and some familiarity with cybersecurity concepts.
 

Подробный гайд по Suno

Автор: Chipa от 13-08-2025, 10:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Подробный гайд по Suno
Автор: Никита Глухов
Издательство: Интернет-издание
Год: 2025
Формат: PDF
Страниц: 37
Размер: 11 Mb
Язык: Русский

Чем поможет гайд? Вдохновляйтесь примерами и находите свои способы использовать Suno — для творчества, работы или просто радости.


 

Подробный гайд по нейросетям. Создавай ролики на миллионы

Автор: Chipa от 13-08-2025, 09:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Подробный гайд по нейросетям. Создавай ролики на миллионы
Автор: Никита Глухов
Издательство: Интернет-издание
Год: 2025
Формат: PDF
Страниц: 29
Размер: 37 Mb
Язык: Русский

Что разбираем в руководстве: Генерация музыки, редактирование. Создание изображений, портретов, фото. Редактирование. Генерация видео из изображения и текста, создание "говорящих" видео

 

Теоретическая криптография

Автор: umkaS от 11-08-2025, 17:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Теоретическая криптография
Автор: Ростовцев А.Г., Маховенко Е.Б.
Издательство: СПб.: АНО НПО "Профессионал"
Год: 2005
Cтраниц: 480
Формат: djvu
Размер: 10 мб
Язык: русский

Издание включает в себя материалы книг "Алгебраические основы криптографии", "Введение в криптографию с открытым ключом", "Введение в теорию итерированных шифров", выпущенных в издательстве "Мир и Семья" в 2000-2003 гг. Книга состоит из трех частей. Первая часть содержит сведения из алгебры, теории чисел, алгебраической геометрии.
 

Introduction to Wireless Networking and Its Impact on Applications, Second Edition

Автор: literator от 10-08-2025, 20:29, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Introduction to Wireless Networking and Its Impact on Applications, Second Edition
Автор: Peter Steenkiste
Издательство: Springer
Год: 2026
Страниц: 146
Язык: английский
Формат: pdf (true), epub
Размер: 25.3 MB

This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges. This Second Edition includes key updates on these topics, which have become increasingly important as internet users rely more and more on wireless access links for diverse tasks such as web browsing, video conferencing, interactive games, and data sharing. The author compares and contrasts wireless and wired networks, explaining that users expect high quality performance regardless of how they access the internet, even though wireless networks are much more difficult to build than wired networks. Structured according to the layers in the Internet protocol stack, the book discusses the challenges involved in building wireless networks and the obstacles that can affect their performance in real-world applications. The author also provides strategies for approaching these challenges and obstacles. This Second Edition incorporates new information on several topics, including WiFi and 5G cellular.
 

Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies

Автор: literator от 10-08-2025, 05:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Analysis of Threat Perceptions: NATO and Türkiye’s Cyber Terrorism Policies
Автор: Mehmet Emin Erendor
Издательство: CRC Press
Год: 2026
Страниц: 203
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country’s economy, politics, and security. However, despite this series of cyberattacks, the North Atlantic Treaty Organization (NATO) did not apply Article 5 of the North Atlantic Treaty due to lack of consensus on applying Article 5 in the Estonian case. Although various approaches have been developed by scholars, there is no common application of international law in the United Nations Charter regarding cyber threats or attacks. Moreover, while there has been no common definition of "cyber terrorism" by the international community, some scholars regard "cyberattacks" as acts of war. There is a paucity of literature dealing with the application of international law on cyber threats. A new Strategic Concept was adopted in 2010. Its most important development was to identify the significance of cyber threats to all NATO member bodies. Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber-terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear.
 

The Computer Security Workbook: A Course Companion Resource

Автор: literator от 9-08-2025, 19:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Computer Security Workbook: A Course Companion Resource
Автор: Juan Tapiador
Издательство: Springer
Серия: Undergraduate Topics in Computer Science
Год: 2025
Страниц: 178
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Mastering computer security requires more than just technical knowledge of software, systems and networks—it demands analytical thinking, a problem-solving mindset, and creative reasoning. These skills are best cultivated through practical challenges and structured problem-solving. This book presents a collection of questions and problems on a wide range of topics typically taught in introductory computer security courses, including basic concepts and principles, authentication techniques, access control models and methods, network security, software vulnerabilities, and malware. This unique textbook/reference offers broad appeal: The exercises are intended to complement other learning materials and are tailored to different skill levels, allowing beginners to build a strong foundation while offering advanced challenges to more experienced learners.
 

ChatGPT, сделай мне сайт

Автор: Chipa от 7-08-2025, 14:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: ChatGPT, сделай мне сайт
Автор: Макфедрис П.
Издательство: Питер
Год: 2025
Формат: PDF/epub
Страниц: 352
Размер: 32 Mb
Язык: Русский

«ChatGPT, сделай мне сайт» — это практическое руководство, с которым вы освоите создание сайтов на ИИ, даже если никогда не занимались веб-разработкой. Вы начнете с основ работы с ChatGPT и уже к концу второй главы сверстаете свой первый сайт. Затем автор покажет, как наполнять страницы текстами, изображениями и формами для сбора данных, а также как редактировать HTML и CSS, чтобы придать сайту индивидуальность. Освоив эти навыки, вы сможете легко создавать фотогалереи, портфолио, каталоги и другие веб-проекты с помощью ИИ.


 

Ultimate Google Professional Cloud Architect Certification Guide

Автор: literator от 7-08-2025, 14:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ultimate Google Professional Cloud Architect Certification Guide: Build Real-World, Enterprise-Ready Solutions on Google Cloud Platform and Ace the Google Professional Cloud Architect Exam
Автор: Shounak Acharya
Издательство: Orange Education Pvt Ltd, AVA
Год: 2025
Страниц: 344
Язык: английский
Формат: epub (true)
Размер: 39.4 MB

Architect Google Cloud Solutions That Go Beyond Certification. In today’s cloud-first world, the Google Cloud Professional Cloud Architect certification stands as one of the most respected credentials in enterprise IT. Ultimate Google Professional Cloud Architect Certification Guide is your companion to achieving that goal. This book goes far beyond exam preparation. It is a hands-on, real-world companion that walks you through every architectural decision-making point you will face on Google Cloud Platform (GCP). You will begin with the building blocks, such as Compute Engine, Autoscaling, Load Balancing, and Storage. From there, you will navigate through advanced networking, managed services like App Engine, and orchestration, using Google Kubernetes Engine (GKE). As the chapters progress, you will unlock the power of serverless architectures with Cloud Functions and Cloud Run, explore asynchronous communication via Pub/Sub and Dataflow, and dive into Google Cloud’s relational, NoSQL, and caching databases. You will also master observability with Cloud Operations Suite and apply DevOps, CI/CD, and SRE principles in practical, deployment-ready scenarios.