Методы и средства защиты компьютерной информации (Ячиков И.М. и др.)

Автор: gusnat от 22-10-2019, 05:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Методы и средства защиты компьютерной информации (Ячиков И.М. и др.)
Название: Методы и средства защиты компьютерной информации: Учебное пособие
Автор: Ячиков И.М., Кочержинская Ю.В., Гладышева М.М.
Издательство: Магнитогорск: ГОУ ВПО «МГТУ»
Год: 2007
Страниц: 138
Формат: djvu
Размер: 12,9 Мб
Язык: Русский

Компьютерные системы и телекоммуникации предопределяют надежность и мощность систем обороны и безопасности страны. Компьютеры обслуживают банковские системы, контролируют работу атомных реакторов, распределяют энергию, следят за расписанием поездов, управляют самолетами и космическими кораблями.
 

Hacking with Kali Linux: A Beginner's Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Security Systems and Tools for Computer

Автор: literator от 22-10-2019, 03:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking with Kali Linux: A Beginner's Guide to Ethical Hacking with Kali & Cybersecurity, Includes Linux Command Line, Penetration Testing, Security Systems and Tools for Computer
Автор: Stephen Fletcher
Издательство: Amazon Digital Services LLC
Год: 2019
Страниц: 133
Язык: английский
Формат: epub, pdf (conv)
Размер: 10.1 MB

Feel that informatics is indispensable in today’s world? Ever wondered how a Hacker thinks? Or do you want to introduce yourself to the world of hacking? The truth is... Hacking may seem simple. The hacker just has to guess someone’s password. He logs into their email. Then he can go whatever he wants. In reality, is much more complicated than that. Hacking with Kali Linux is going to teach you how hackers’ reasons. Besides understanding the reasons that make a hacker want to target your computer, you will also get to know how they can do it and even how you can safeguard your systems, equipment, and network against hacking attacks.
 

Cyber Security: The Lifeline of Information and Communication Technology

Автор: literator от 21-10-2019, 16:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Security: The Lifeline of Information and Communication Technology
Автор: Ramjee Prasad, Vandana Rohokale
Издательство: Springer
Год: 2019 (2020 edition)
Страниц: 295
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cyber security is becoming very hot topic with the huge growth and population of information and communication technology (ICT) and the mobile devices associated with our everyday life. Mobile communication generations from 1G to 4G have changed our lives in many ways. It has brought easiness and comfort in our everyday activities. We are on the verge of welcoming fifth generation of mobile communication that is 5G which is visualized to be converged version of all existing, wired, wireless and next-generation networks. With this luxury, threats are also growing exponentially.
 

Hacking for Beginners: Learn Practical Hacking Skills! All About Computer Hacking, Ethical Hacking, Black Hat, Penetration Testing, and Much More!

Автор: literator от 21-10-2019, 02:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking for Beginners: Learn Practical Hacking Skills! All About Computer Hacking, Ethical Hacking, Black Hat, Penetration Testing, and Much More!
Автор: Cooper Alvin
Издательство: Amazon Digital Services LLC
Год: 2017
Страниц: 63
Язык: английский
Формат: epub, azw3, pdf (conv)
Размер: 10.1 MB

Learn practical hacking skills! Forget about complicated textbooks and guides. Listen to this book and you will be on your way to your first hack! Hacking is a word that one often finds in the tabloids, newspapers, the Internet, and countless other places. There is a lot of news about hackers doing this or that on a daily basis. The severity of these activities can range from accessing a simple household computer system to stealing confidential data from secure government facilities. This book will serve as a guiding tool for you to understand the basics of the subject and slowly build up a base of the knowledge that you need to gain.
 

The IoT Architect's Guide to Attainable Security and Privacy

Автор: literator от 19-10-2019, 16:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The IoT Architect's Guide to Attainable Security and Privacy
Автор: Damilare D. Fagbemi, David M Wheeler
Издательство: Auerbach Publications/CRC Press
Год: 2019
Страниц: 330
Язык: английский
Формат: True PDF
Размер: 12.9 MB

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.
 

Data Breaches: Crisis and Opportunity

Автор: buratino от 19-10-2019, 14:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Data Breaches: Crisis and Opportunity
Автор: Sherri Davidoff
Издательство: Addison-Wesley Professional
Год: 2019
Формат: epub/pdf(conv.)
Страниц: 464
Размер: 11.9 Mb
Язык: English

Protect Your Organization Against Massive Data Breaches and Their Consequences
Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control.
 

Botnets: Architectures, Countermeasures, and Challenges

Автор: buratino от 19-10-2019, 11:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Botnets: Architectures, Countermeasures, and Challenges (Series in Security, Privacy and Trust)
Автор: Georgios Kambourakis (Editor), Marios Anagnostopoulos (Editor), Weizhi Meng (Editor), Peng Zhou (Editor)
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 438
Размер: 10.3 Mb
Язык: English

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.
 

Fog Computing in the Internet of Things: Intelligence at the Edge

Автор: admin от 18-10-2019, 12:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fog Computing in the Internet of Things: Intelligence at the Edge
Автор: Pasi Liljeberg and J?rgo-S?ren Preden
Издательство: Springer
Год: 2017
Формат: AZW3, EPUB, PDF
Размер: 11 Мб
Язык: английский / English

This book describes state-of-the-art approaches to Fog Computing, including the background of innovations achieved in recent years. Coverage includes various aspects of fog computing architectures for Internet of Things, driving reasons, variations and case studies.
 

Fog-Enabled Intelligent IoT Systems

Автор: literator от 17-10-2019, 16:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fog-Enabled Intelligent IoT Systems
Автор: Yang Yang, Xiliang Luo
Издательство: Springer
Год: 2019 (2020 Edition)
Страниц: 230
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book first provides a comprehensive review of state-of-the-art IoT technologies and applications in different industrial sectors and public services. The authors give in-depth analyses of fog computing architecture and key technologies that fulfill the challenging requirements of enabling computing services anywhere along the cloud-to-thing continuum. Further, in order to make IoT systems more intelligent and more efficient, a fog-enabled service architecture is proposed to address the latency requirements, bandwidth limitations, and computing power issues in realistic cross-domain application scenarios with limited priori domain knowledge, i.e. physical laws, system statuses, operation principles and execution rules.
 

Искусственные нейронные сети. Теория и практика

Автор: umkaS от 16-10-2019, 18:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Искусственные нейронные сети. Теория и практика
Автор: Круглов В.В., Борисов В.В.
Издательство: Горячая линия-Телеком
Год: 2002
Cтраниц: 383
Формат: pdf
Размер: 22 мб
Язык: русский

Книга посвящена одному из современных направлений в области информатики и вычислительной техники — нейрокомпьютерным технологиям.