The Complete Google Manual 2024

Автор: literator от 26-01-2024, 05:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Complete Google Manual 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 146
Язык: английский
Формат: pdf
Размер: 57.1 MB

Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Со скромного старта в качестве поисковой системы, сейчас Google предлагает электронную почту с бесплатным онлайн-хранилищем, управление фотографиями и их редактирование, социальную сеть с миллионами пользователей, управление и редактирование фотографий, один из лучших интернет-браузеров, крупнейший видеосайт в мире, ведущую на рынке операционную систему для смартфонов, интерактивные карты и навигация, бесплатная платформа для ведения блогов и многое, многое другое. 100% неофициально.
 

Компьютерные сети. Принципы, технологии, протоколы (Юбилейное издание) - 2021

Автор: umkaS от 24-01-2024, 22:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Компьютерные сети. Принципы, технологии, протоколы (Юбилейное издание)
Автор: Олифер Виктор, Олифер Наталья
Издательство: Питер
Год: 2021
Cтраниц: 1005
Формат: pdf
Размер: 17 мб
Язык: русский

Это издание в некотором смысле особенное – прошло ровно 20 лет с момента выхода книги в свет. 20 лет – это немаленький срок, за это время дети наших первых читателей подросли и, возможно, стали интересоваться компьютерными сетями. И, возможно, у них в руках окажется 6-е издание книги «Компьютерные сети. Принципы, технологии, протоколы». Эта книга значительно отличается от той, которую читали их родители. Многое из того, что интересовало читателей конца 90-х годов – например, правило 4-х хабов, согласование сетей IP и IPX или сравнение технологий 100VG-AnyLAN и FDDI, – совсем не упоминается в последних изданиях. За 20 лет немало технологий прошли полный цикл от модного термина и всеобщего признания к практически полному забвению. Каждое новое издание книги в той или иной мере отражало изменения ландшафта сетевых технологий.
 

Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage

Автор: literator от 24-01-2024, 04:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
Автор: Bob Chaput
Издательство: Apress
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf
Размер: 37.1 MB

This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities. ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy.
 

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

Автор: literator от 23-01-2024, 10:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
Автор: Roger A. Grimes, Dr. John N. Just
Издательство: Wiley
Год: 2024
Страниц: 450
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks. Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. This book is for anyone interested in fighting social engineering and phishing attacks—from entire organizations to single individuals, from dedicated anti-phishing employees to IT managers, and for any IT security practitioner.
 

5G Non-Terrestrial Networks: Technologies, Standards, and System Design

Автор: literator от 22-01-2024, 23:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: 5G Non-Terrestrial Networks: Technologies, Standards, and System Design
Автор: Alessandro Vanelli-Coralli, Nicolas Chuberre, Gino Masini
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true), epub
Размер: 21.4 MB

Provides a complete and detailed description of the non-terrestrial component in the 5G ecosystem. 5G Non-Terrestrial Networksis the first multi-authored reference dedicated to the integration of non-terrestrial networks (NTN) into the 5G ecosystem. Written by leaders in the development of the 3GPP 5G NTN specification, this authoritative resource addresses all key aspects of non-terrestrial components of 5G systems, including standardization, architecture, protocols, and regulatory considerations. Drawing from their expertise in academic and industrial research and development, the authors introduce fundamental principles of non-terrestrial communications, define the NTN architecture and radio protocol stacks, describe applications to support mobility and radio resource management, and more. The book covers 5G New Radio-based technology for NTN as well as LTE NB-IoT/eMTC, providing a well-rounded understanding of the unique characteristics of 5G-NTN systems. Throughout the text, the authors offer insights on various design approaches, technical choices, and trade-off options. This book aims at providing an overview of this 3GPP-defined “NTN” standard. Aimed at easing the inclusion of NTN elements in the 5G ecosystem, the work was conducted within the 3GPP starting with the identification of the technical challenges and potential solutions to support New Radio (NR) protocols and features over satellite links.
 

Azure Security (Final Release)

Автор: literator от 22-01-2024, 14:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Azure Security (Final Release)
Автор: Bojan Magušić
Издательство: Manning Publications
Год: 2024
Страниц: 336
Язык: английский
Формат: epub
Размер: 15.1 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Attacks against cloud-based applications are increasingly common and sophisticated. It’s vital for any developer or resource owner to understand how to properly configure their Azure cloud environments and establish reliable security best practices. The Azure platform comes with dozens of built-in security tools to help keep your systems safe. This book will teach you exactly how to set them up for maximum effectiveness. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you’ve learned.
 

Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique

Автор: literator от 21-01-2024, 19:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique
Автор: Tarun Vashishth
Издательство: BPB Publications
Год: 2024
Страниц: 414
Язык: английский
Формат: epub (true)
Размер: 25.3 MB

Learn using Cloud data technologies for improving data analytics and decision-making capabilities for your organization. Digital forensics is the art and science of extracting the hidden truth and this book is your hands-on companion, bringing the world of digital forensics to life. Starting with the core principles of digital forensics, the book explores the significance of various case types, the interconnectedness of the field with cybersecurity, and the ever-expanding digital world's challenges. As you progress, you will explore data acquisition, image formats, digital evidence preservation, file carving, metadata extraction, and the practical use of essential forensic tools like HxD, The Sleuth Kit, Autopsy, Volatility, and PowerForensics. The book offers step-by-step instructions, real-world case studies, and practical examples, ensuring that beginners can confidently set up and use forensic tools. Experienced professionals, on the other hand, will find advanced insights into memory analysis, network forensics, anti-forensic techniques, and more. This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails. Digital forensics analysts may be called upon to investigate crimes committed using a computer or other digital device. It could include hacking, identity theft, data exfiltration, sabotage, etc.
 

Guide to Computer Network Security (6th Edition)

Автор: literator от 20-01-2024, 21:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Guide to Computer Network Security (6th Edition)
Автор: Joseph Migga Kizza
Издательство: Springer
Серия: Texts in Computer Science
Год: 2024
Страниц: 654
Язык: английский
Формат: pdf (true), epub
Размер: 27.7 MB

In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing Artificial Intelligence (AI) models across all computing security systems spheres, blockchain technology, and the Metaverse, leading toward security systems virtualizations. This guide is a comprehensive volume touching not only on every major topic in computing and information security and assurance realms, but also has gone beyond the security of computer networks as we used to know them, to embrace new and more agile and Artificial Intelligence boosted mobile systems, new online social networks and virtual platforms that are interweaving into our everyday fabric, if not already and creating an ever-growing ecosystem of intelligent digital and associated social networks. We bring into our ongoing discussion on computer network security, a broader view of the new ever-growing ecosystem of fixed, wireless, mobile, and virtual and online social networks.
 

Trivergence: Accelerating Innovation with AI, Blockchain, and the Internet of Things

Автор: literator от 19-01-2024, 20:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Trivergence: Accelerating Innovation with AI, Blockchain, and the Internet of Things
Автор: Bob Tapscott
Издательство: Wiley
Год: 2024
Страниц: 256
Язык: английский
Формат: pdf, epub (true), mobi
Размер: 10.1 MB

A Breakthrough Introduction to The Next Phase of the Digital Age. In Trivergence, Bob Tapscott, writer, speaker, complex system designer, and former CIO introduces an exciting new concept in explaining how the intersection of Artificial Intelligence (AI), Blockchain, and the Internet of Things (IoT) will transform business and society. He explains the synergies between these technologies and the disruptive potential that they will offer, as well as the challenges and risks to making it happen. He offers an insightful guide through the difficult decisions that businesses and society must make to thrive in a new era where decisions will be difficult, and uncertainties abound. You'll discover how and why AI's power is now exploding, its growth driven by smarter approaches to neural networks trained on a new hardware architecture that can derive its intelligence from ever more massive datasets. AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that had previously required human cognitive functions. From recognizing patterns in vast datasets to making recommendations for decision-making, AI is transforming industries such as healthcare, finance, and manufacturing. AI-powered virtual assistants, self-driving cars, and personalized content recommendations are just a glimpse of its potential. The significance of AI lies in its ability to automate complex tasks, enhance efficiency, and uncover insights hidden within data. Recent advances in Deep Learning have expanded beyond focusing on analyzing complex data sets to make predictions to generate entirely new content in data, text, speech, and image.
 

Forensic Radio Survey Techniques for Cell Site Analysis, 2nd Edition

Автор: literator от 17-01-2024, 23:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Forensic Radio Survey Techniques for Cell Site Analysis, 2nd Edition
Автор: Joseph Hoy
Издательство: Wiley
Год: 2024
Страниц: 411
Язык: английский
Формат: pdf (true), epub
Размер: 37.0 MB

Overview of the end-to-end process of planning, undertaking, and reporting of forensic radio surveying to support cell site analysis. The newly updated and revised Second Edition of Forensic Radio Survey Techniques for Cell Site Analysis provides an overview of the end-to-end process of planning, undertaking, and reporting of forensic radio surveying to support the forensic discipline of cell site analysis. It starts by recapping and explaining, in an accessible way, the theory, structure, and operation of cellular communications networks, then moves on to describe the techniques and devices employed to undertake forensic radio surveys. Worked examples are used throughout to demonstrate the practical steps required to plan and undertake forensic radio surveys, including the methods used to analyze radio survey data and compile it into a court report. A summary section condenses the technical and practical elements of the book into a handy reference resource for busy practitioners. The Second Edition contains 25% brand new material covering 5G New Radio networks and '6G and beyond,' critical communications, mobile satellite communications, IoT networks, Cell Site Analysis Tools, and much more.