Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science

Автор: buratino от 25-09-2019, 22:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science
Автор: Wayne Patterson, Cynthia E. Winston-Proctor
Издательство: CRC Press
Год: 2019
Формат: true pdf/rtf
Страниц: 290
Размер: 12.8 Mb
Язык: English

Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation.
Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds.
 

Cybersecurity and Privacy in Cyber Physical Systems

Автор: buratino от 25-09-2019, 21:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity and Privacy in Cyber Physical Systems
Автор: Yassine Maleh (Editor), Shojafar Mohammad (Editor), Darwish Ashraf (Editor), Haqiq Abdelkrim (Editor)
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 454
Размер: 20.5 Mb
Язык: English

Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It
Presents high-quality contributions addressing related theoretical and practical aspects
Improves the reader’s awareness of cybersecurity and privacy in CPSs
Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies...
 

Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы

Автор: Biber от 25-09-2019, 13:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы
Автор: А.А. Болотов, С.Б. Гашков
Жанр: Криптография
Издательство: КомКнига
Год: 2006
Страниц: 328
Язык: Русский
Формат: djvu
Размер: 14,61 Mb

Настоящая книга посвящена перспективному направлению в области защиты информации, математическую основу которого составляет теория эллиптических кривых.
 

Optical Wireless Communications: System and Channel Modelling with MATLAB®, Second Edition

Автор: buratino от 25-09-2019, 12:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Optical Wireless Communications: System and Channel Modelling with MATLAB®, 2nd Edition
Автор: Z. Ghassemlooy, W. Popoola, S. Rajbhandari
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 540
Размер: 35.7 Mb
Язык: English

The 2nd Edition of Optical Wireless Communications: System and Channel Modelling with MATLAB® with additional new materials, is a self-contained volume that provides a concise and comprehensive coverage of the theory and technology of optical wireless communication systems (OWC). The delivery method makes the book appropriate for students studying at undergraduate and graduate levels as well as researchers and professional engineers working in the field of OWC.
 

Emerging Security Algorithms and Techniques

Автор: buratino от 25-09-2019, 11:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Emerging Security Algorithms and Techniques
Автор: Khaleel Ahmad (Editor), M. N. Doja (Editor), Nur Izura Udzir (Editor), Manu Pratap Singh (Editor)
Издательство: Chapman and Hall/CRC
Год: 2019
Формат: True PDF
Страниц: 330
Размер: 10.5 Mb
Язык: English

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
 

Protecting Information Assets and IT Infrastructure in the Cloud

Автор: buratino от 25-09-2019, 10:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Protecting Information Assets and IT Infrastructure in the Cloud
Автор: Ravi Das, de Guise, Preston
Издательство: Auerbach Publications
Год: 2019
Формат: True PDF
Страниц: 318
Размер: 4.8 Mb
Язык: English

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
 

Zen of Cloud: Learning Cloud Computing by Examples, Second Edition

Автор: buratino от 25-09-2019, 10:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Zen of Cloud: Learning Cloud Computing by Examples, 2nd Edition
Автор: Haishi Bai
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 316
Размер: 10.2 Mb
Язык: English

This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.
 

AWS Certified SysOps Administrator Associate (SOA-C01) Cert Guide (Rough Cuts)

Автор: literator от 24-09-2019, 13:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Certified SysOps Administrator Associate (SOA-C01) Cert Guide (Rough Cuts)
Автор: Anthony Sequeira
Издательство: Pearson IT Certification
Год: 2019
Страниц: 127
Язык: английский
Формат: pdf
Размер: 10.1 MB

The AWS Certified Sysops Administrator Associate certification demonstrates your expertise in deploying, managing, securing, optimizing, and automating solutions on the world's leading cloud platform, Amazon Web Services. AWS Certified Sysops Administrator Associate Cert Guide is the comprehensive self-study resource for Amazon's valuable new exam.
 

Искусство быть невидимым. Как сохранить приватность в эпоху Big Data

Автор: SCART56 от 22-09-2019, 04:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Искусство быть невидимым. Как сохранить приватность в эпоху Big Data
Автор(ы): Кевин Митник
Издательство: Эксмо
Год: 2019
Страниц: 464
Формат: PDF
Размер: 11 Мб
Язык: русский

Думаете, ваши данные в Интернете хорошо защищены? Так глубоко вы никогда не заблуждались! Кевин Митник — самый разыскиваемый хакер планеты в прошлом, а ныне один из ведущих специалистов по кибербезопасности — знает, насколько опасна неосведомленность в вопросах защиты данных в Сети.
 

Ethical Hacking: A Comprehensive Beginner’s Guide to Learn and Master Ethical Hacking

Автор: literator от 21-09-2019, 14:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ethical Hacking: A Comprehensive Beginner’s Guide to Learn and Master Ethical Hacking
Автор: Hein Smith, Hilary Morrison
Издательство: Amazon Digital Services LLC
Год: 2018
Страниц: 63
Язык: английский
Формат: epub (true), azw3, pdf (conv)
Размер: 10.1 MB

If you wish to enter the world of ethical hacking, this book is for you. Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking will walk you through the processes, skills, and tools you need to succeed. If you want to master ethical hacking, then this is the book you have been looking for.