Principles of Cybersecurity

Автор: literator от 27-10-2024, 11:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Principles of Cybersecurity
Автор: Joy Crelin
Издательство: Salem Press/Grey House Publishing, Inc.
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This volume introduces students to the technologies and controls that protect our hardware, software, and data from cyberthreats. With everything from schools to financial accounts to vital infrastructure under threat from various bad actors, technological advances require constant new approaches to keep our businesses running, our sensitive information out of the hands of cybercriminals, and our data safe. The recent shift to remote work has increased vulnerability to cyber disruptions. Although newer tools like Artificial Intelligence (AI) can help with predicting cyberattacks before they occur—something traditional security professionals find challenging—these methods can also be used by hackers to learn about and exploit weaknesses in a system. Students and researchers wishing to gain a solid background in cybersecurity and related fields will find this volume an invaluable resource to developing a deeper and meaningful understanding of this important and evolving topic. Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, cloud services, and other computer and internet-connected technologies from a wide range of cyberattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism. This volume will be an important resource for students at the high school and undergraduate levels, especially those considering careers in cybersecurity.
 

Fusion and Integration of Clouds, Edges, and Devices

Автор: literator от 27-10-2024, 01:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fusion and Integration of Clouds, Edges, and Devices
Автор: Junlong Zhou, Kun Cao, Jin Sun, Keqin Li
Издательство: CRC Press
Год: 2025
Страниц: 228
Язык: английский
Формат: pdf (true), epub
Размер: 31.8 MB

This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions. It aims to present state-of-the-art models and optimization methods for fusing and integrating clouds, edges, and devices. Cloud-edge-end computing provides users with low-latency, high-reliability, and cost-effective services through the fusion and integration of clouds, edges, and devices. As a result, it is now widely used in various application scenarios. The book introduces the background and fundamental concepts of clouds, edges, and devices, and details the evolution, concepts, enabling technologies, architectures, and implementations of cloud-edge-end computing. It also examines different types of cloud-edge-end orchestrated systems and applications and discusses advanced performance modeling approaches, as well as the latest research on offloading and scheduling policies. It also covers resource management methods for optimizing application performance on cloud-edge-end orchestrated systems. The intended readers of this book are researchers, undergraduate and graduate students, and engineers interested in cloud computing, edge computing, and the Internet of Things (IoT). The knowledge of this book will enrich our readers to be at the forefront of cloud-edge-end computing.
 

Information Security Incident and Data Breach Management: A Step-by-Step Approach

Автор: literator от 25-10-2024, 02:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Information Security Incident and Data Breach Management: A Step-by-Step Approach
Автор: John Kyriazoglou
Издательство: Apress
Год: 2024
Страниц: 164
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company’s reputation and brand name. For Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong.
 

Boardroom Cybersecurity: A Director's Guide to Mastering Cybersecurity Fundamentals

Автор: literator от 24-10-2024, 02:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Boardroom Cybersecurity: A Director's Guide to Mastering Cybersecurity Fundamentals
Автор: Dan Weis
Издательство: Apress
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

This book delves into the critical realm of cyber security, specifically focusing on the ever-present threats that can cripple your organization. We will dissect real-world attacks methods and mitigation strategies, analyze industry and regulatory requirements as they impact your boardroom decisions, and expose the vulnerabilities that leave organizations susceptible to data breaches. But why should cyber security be a top priority for CEOs, directors, and board members? A successful cyber-attack can be catastrophic. Beyond financial losses, data breaches can erode customer trust, damage brand reputation, disrupt critical operations, and even lead to legal ramifications for the board and for directors, such as regulatory fines and lawsuits. This book empowers you to make informed decisions for your organization regarding cyber risk. We will equip you to not only understand the evolving threat landscape and the potential impact of an attack, but also to proactively reduce and mitigate those risks. This knowledge will ensure you fulfill your reporting obligations and demonstrate strong corporate governance in the face of ever-present cyber threats. For boards, directors, and management who have a responsibility over cyber security and ensuring cyber resilience for their organization.
 

Плейбук реагирования на инциденты. Утечки данных в Дарквебе

Автор: literator от 23-10-2024, 20:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Плейбук реагирования на инциденты. Утечки данных в Дарквебе
Автор: Лаборатория Касперского
Издательство: Лаборатория Касперского
Серия: Утечки данных в Дарквебе
Год: 2024
Язык: русский
Формат: pdf
Размер: 12.2 MB

Киберпреступники постоянно придумывают новые способы кражи конфиденциальной информации, и сегодня утечка данных – реальная угроза как для крупных, так и для небольших компаний. В последние годы новости о масштабных утечках данных все чаще попадают на первые полосы популярных изданий, серьезно вредя репутации пострадавших компаний. В этой статье мы расскажем, что делать, если данные вашей компании были опубликованы в дарквебе, и как минимизировать последствия таких инцидентов.
 

Open Source Intelligence (OSINT) – A practical Introduction: A Field Manual

Автор: literator от 23-10-2024, 17:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Open Source Intelligence (OSINT) – A practical Introduction: A Field Manual
Автор: Varin Khera, Anand R. Prasad, Suksit Kwanoran
Издательство: River Publishers
Год: 2024
Страниц: 128
Язык: английский
Формат: pdf (true), epub
Размер: 34.5 MB

This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations. The book also delves into the integration of Artificial Intelligence (AI) and Machine Learning (ML) in OSINT, social media intelligence methodologies, and the unique characteristics of the surface web, deep web, and dark web. Open-source intelligence (OSINT) is a powerful tool that leverages publicly available data for security purposes. OSINT derives its value from various sources, including the internet, traditional media, academic publications, corporate papers, and geospatial information. Further topics include an examination of the dark web's uses and potential risks, an introduction to digital forensics and its methods for recovering and analyzing digital evidence, and the crucial role of OSINT in digital forensics investigations. The book concludes by addressing the legal considerations surrounding the use of the information and techniques presented. This book provides a comprehensive understanding of CTI, TI, and OSINT. It sets the stage for the best ways to leverage OSINT to support different intelligence needs to support decision-makers in today's complex IT threat landscape. This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking techniques, privacy best practices for OSINT researchers, and practical examples of OSINT investigations.
 

Zero to Hero: Your Guide to a Career in Cybersecurity

Автор: literator от 22-10-2024, 20:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Zero to Hero: Your Guide to a Career in Cybersecurity
Автор: Felix Kyei Asare
Издательство: CRC Press
Год: 2025
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

"Zero to Hero: Your Guide to a Career in Cybersecurity" is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom. Tailored to empower novices with no prior knowledge, as well as those with basic understanding seeking to solidify their footing in cybersecurity, it sets itself apart with a laser focus on real-world applicability, ensuring readers not only grasp theoretical concepts but are also primed to implement them effectively. "Zero to Hero: Your Guide to a Career in Cybersecurity" is not just a book; it's a transformative journey designed to launch aspiring professionals into the heart of the cybersecurity industry. It's perfectly suited for students, career changers, and IT professionals aiming to shift into cybersecurity, providing the knowledge, skills, and insights needed to secure a promising career in this indispensable field. Start your journey from zero to hero today and unlock the doors to a rewarding and critically important career in cybersecurity.
 

Кибероружие и кибербезопасность. О сложных вещах простыми словами

Автор: umkaS от 21-10-2024, 07:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Кибероружие и кибербезопасность. О сложных вещах простыми словами
Автор: Белоус А.И., Солодуха В.А.
Издательство: Инфра-Инженерия
Год: 2020
Cтраниц: 692, цвет.ил.
Формат: pdf
Размер: 155 мб
Язык: русский

Книга по широте охвата проблемы, новизне и практической значимости является фактически энциклопедией по кибербезопасности. Здесь вы найдете многочисленные примеры применения информационных атак, а также наиболее эффективные методы защиты от их воздействия. В доступной форме изложены теоретические основы информационной безопасности и базовые технологии защиты информации.
 

Wireless Ad-hoc and Sensor Networks: Architecture, Protocols, and Applications

Автор: literator от 20-10-2024, 03:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Wireless Ad-hoc and Sensor Networks: Architecture, Protocols, and Applications
Автор: Pawan Singh, Sudesh Kumar, Sachin Kumar Gupta, Abhay Kumar Rai
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies
Год: 2025
Страниц: 412
Язык: английский
Формат: pdf (true), epub
Размер: 21.8 MB

The book presents theoretical and experimental approaches, quantitative and qualitative analyses, and simulations in wireless ad-hoc and sensor networks. It further explains the power and routing optimization in underwater sensor networks, advanced cross-layer framework, challenges and security issues in underwater sensor networks, and the use of Machine Learning and Deep Learning techniques for security implementations in wireless ad-hoc and sensor networks. Wireless ad‑hoc and sensor network technologies have become the most exciting and fast‑growing field in the engineering world in the last few decades. Both technologies are the backbone of the current cutting‑edge technologies like the IoT, IIoT, and Industry 5.0. Ad‑hoc and sensor networks are a decentralized type of wireless network that does not depend on a pre‑existing infrastructure like routers and access points. This book covers many recent trends in wireless ad‑hoc and sensor networks, from fundamental principles to techniques, architecture, protocols, applications, and challenges in different areas such as onboard healthcare planning, including smart cities, smart vehicles, smart agriculture, future industry, and many more. It aims to include concepts of relevant technologies and researchers’ original findings. This book will help to encourage potential researchers, academicians, and scholars to explore further in this direction. Additionally, it may also be a reference book for postgraduate and graduate students studying Computer Science and information technology, electronics and communication engineering, and other allied realms.
 

5G Enabled Technology for Smart City and Urbanization System

Автор: literator от 20-10-2024, 02:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: 5G Enabled Technology for Smart City and Urbanization System
Автор: Susheela Hooda, Vidhu Kiran, Rupali Gill, Durgesh Srivastava
Издательство: CRC Press
Год: 2025
Страниц: 246
Язык: английский
Формат: pdf (true), epub
Размер: 32.4 MB

This book examines the applications, trends and challenges of 5G Enabled technologies for Smart City and Urbanization systems. It addresses the challenges to bringing such capabilities of 5G-enabled technologies for smart cities and urbanisation into practice by presenting the theoretical as well as technical research outcomes with case studies. It covers key areas, including smart building, smart health care, smart mobility, smart living, smart surveillance, and IOT-based systems. It explains how these systems are connected using different technologies that support 5G access and control protocols. Fifth-­generation (5G) technology refers to a new generation of cellular networks for wireless communication. The multiple power and performance levels of the 5G cellular network will enable new user experiences and connect new industries. Cloud service providers will be able to connect with enterprises more rapidly and reliably with 5G. Combining the two technologies will allow cloud applications to realize their full potential. Edge computing disrupts the tidy physical boundaries of the cloud data centre, forcing us to consider issues like security, scale, management, ownership and compliance. More critically, it exacerbates the scaling challenges with cloud-­based management approaches.