The Complete Home Networking Manual - 6th Edition 2023

Автор: literator от 14-09-2023, 06:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Complete Home Networking Manual - 6th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 164
Язык: английский
Формат: pdf
Размер: 80.9 MB

Домашние сети часто перегружаются при передаче больших объемов данных на компьютеры, "умные" телевизоры и игровые приставки. Чаще всего маршрутизатор работает без сбоев и помех, но иногда он отключается от сети или Wi-Fi вообще перестает работать. В этом случае знание принципов работы маршрутизатора поможет вам избежать головной боли! Эта книга поможет вам понять технологию настройки сети. Какие устройства вам нужны, что эти устройства могут делать и как максимально эффективно использовать каждый элемент сетевой головоломки. Из книги вы узнаете, как лучше настроить, улучшить и защитить свою домашнюю сеть. Разделы книги рассказывают о том, как защитить себя в Интернете, как избежать вирусов и вредоносных программ, как зашифровать данные, как восстановиться после цифровой катастрофы, как повысить уровень безопасности в Интернете и социальных сетях. В книге также подробно рассказывается об использовании виртуальных частных сетей, даются дополнительные советы и рекомендации по работе с сетевыми командами Windows, а также о том, как защитить данные в дороге. Книга рекомендуется всем, кто хочет углубить свои знания в области сетевой и цифровой безопасности.
 

Cyber Resilience in Critical Infrastructure

Автор: literator от 12-09-2023, 21:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Resilience in Critical Infrastructure
Автор: Sinan Kufeoglu, Abdullah Talip Akgun
Издательство: CRC Press
Год: 2024
Страниц: 275
Язык: английский
Формат: pdf (true), djvu
Размер: 10.2 MB

Critical infrastructure sectors are those whose assets, systems, and networks, whether physical or virtual, are deemed so important to nations that their incapacitation or destruction would have a crippling effect on national security, national economic security, national public health or safety, or any combination of these. Each country might define their unique critical infrastructure. In this book, we compiled nine critical infrastructure sectors: Emergency Services, Energy, Finance, Food, Government, Health, Telecommunications, Transport, and Water. The continuity of services in these sectors is vital for the daily lives of societies and economies. Most cyberattacks occur in the following types: Insider attacks, social engineering, exploitation malware, extortion, and blackmail. The rising interconnectedness of vital infrastructures via IoT technologies, as well as the rise of coordinated cyberattacks worldwide, is a concerning issue. There are different types of attacks. While some of them are simultaneously IoT-based attacks, some of them are not. Therefore, IoT causes extra vulnerability to systems. Since the IoT is the evolution of Machine-to-Machine communication, and it uses embedded electronics to link everyday things to the Internet, with minimum human effort, these linked items can exchange and gather data. Digital systems can record, monitor, and alter each interaction between linked items in today’s hyper-connected environment. Although IoT is a beneficial breakthrough and has become widespread, it is vulnerable to cyberattacks.
 

Multi-Cloud Administration Guide: Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud

Автор: literator от 11-09-2023, 17:21, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Multi-Cloud Administration Guide: Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud
Автор: Jeroen Mulder
Издательство: BPB Publications
Год: 2024
Страниц: 597
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

A comprehensive guide to Multi-Cloud Administration for Cloud professionals. In today's landscape, organizations are embracing multi-cloud strategies to harness the advantages offered by multiple cloud providers. If you want to develop the necessary skills and expertise in managing multi-cloud environments, then this book is tailor-made for you. This is a comprehensive guide that equips you with the knowledge and skills needed to manage multiple cloud environments effectively. The book begins by exploring the Cloud Adoption Frameworks, providing a solid foundation for understanding multi-cloud strategies. It then covers topics such as virtualizing and managing connectivity, storage, and compute resources across different clouds. The book also discusses creating interoperability, managing data in a multi-cloud environment, and building and operating cloud-native applications. Lastly, it covers containerization, serverless computing, access management, security, and automating compliance. Throughout the book, you will hopefully find solutions, techniques, designs, and administrative guidance for various types of multi-cloud environments, using AWS, Azure, GCP and Alibaba Cloud. Why these? Because these are the most used clouds.
 

The OSINT Codebook: Cracking Open Source Intelligence Strategies

Автор: literator от 10-09-2023, 18:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The OSINT Codebook: Cracking Open Source Intelligence Strategies
Автор: Alexandre DeGarmo
Издательство: Independently published
Год: 2023
Страниц: 265
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

The OSINT Codebook: Cracking Open Source Intelligence Strategies is a comprehensive and cutting-edge guide written by acclaimed author Alexandre DeGarmo. This book delves deep into the world of Open Source Intelligence (OSINT) and equips readers with advanced strategies and techniques to leverage publicly available information for intelligence gathering, threat assessment, and decision-making. We explore the key features and benefits that readers can expect from The OSINT Codebook: Master the Art of OSINT: With Alexandre DeGarmo as your mentor, you will unravel the complexities of OSINT like never before. From understanding the fundamentals to advanced methodologies, this book provides a step-by-step learning experience to help you become an OSINT expert. Cutting-Edge Strategies: Stay ahead in the ever-evolving digital landscape with the latest OSINT strategies. Alexandre DeGarmo reveals his most coveted techniques, ensuring you are equipped to tackle emerging threats and challenges.
 

Хакинг на примерах. Уязвимости, взлом, защита (2023)

Автор: Igor1977 от 10-09-2023, 13:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Хакинг на примерах. Уязвимости, взлом, защита (2023)
Автор: Ярошенко А.А.
Издательство: СПб.: Наука и техника
Год: 2023, 2-е изд., исправ. и допол.
Формат: pdf
Страниц: 352
Размер: 30 mb
Язык: Русский

Из этой книги вы не узнаете, как взламывать банки – ничего противозаконного описано здесь не будет. Мы не хотим, чтобы у наших читателей или кого-либо еще возникли какие-то проблемы из-за нашей книги.
Будет рассказано: об основных принципах взлома сайтов (а чтобы теория не расходилась с практикой, будет рассмотрен реальный пример взлома); отдельная глава будет посвящена угону почтового ящика (мы покажем, как взламывается почтовый ящик – будут рассмотрены различные способы).
 

Blockchains: Empowering Technologies and Industrial Applications

Автор: literator от 10-09-2023, 05:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Blockchains: Empowering Technologies and Industrial Applications
Автор: Anwer Al-Dulaimi, Octavia A. Dobre, Chih-Lin I.
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 419
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

A comprehensive guide to the most recent developments in blockchains in theoretical and industrial perspectives. Originally introduced as a method to keep track of Bitcoin transactions over a peer-to-peer network, blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography into a chain held in public databases. The use of this technology has grown since its cryptocurrency creation and now store three types of information: 1) transactions, including the date, time, and value of purchases; 2) records of participates in transactions; and 3) unique code known as a “hash” that distinguishes one block from another. A single block on the blockchain can hold 1 MB of data, or potentially thousands of transactions – this then can allow for hundreds of thousands of transactions to be recorded as each block can join the state-of-the-art blockchain. Blockchains provides a detailed overview of the latest and most innovative concepts, techniques, and applications related to the developing blockchain. Aimed at novices and experts on the subject, the book focuses on blockchain technologies, integrated systems, and use cases, specifically by looking at three major technical areas: blockchain platforms and distributed database technologies, consensus and fault tolerance, and Blockchain as a Service (BaaS).
 

Artificial Intelligence and Blockchain in Industry 4.0

Автор: literator от 10-09-2023, 05:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Artificial Intelligence and Blockchain in Industry 4.0
Автор: Rohit Sharma, Rajendra Prasad Mahapatra, Gwanggil Jeon
Издательство: CRC Press
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The book addresses the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence. It further provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology. Industry 4.0 has significantly exploded as a result of using the Internet of Things’ (IoT) recent large- scale growth, which executes the intricate data analysis of confidential material that must be safeguarded against cybersecurity attacks. In a number of industries, including home automation, healthcare, electricity, agriculture, automation, and industrial processes, cybersecurity threats have rapidly increased. IoT device sensors produce a lot of data due to their broad range of services, which necessitates authori- sation, security, and privacy. In the past, conventional frameworks and pro- cedures were employed to guarantee IoT security. But over time, the use of various Artificial Intelligence (AI) techniques for spotting cybersecurity breaches has grown in favour .
 

Network Basics for Hackers: How Networks Work and How They Break

Автор: literator от 9-09-2023, 21:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Network Basics for Hackers: How Networks Work and How They Break
Автор: Master OccupytheWeb
Издательство: InfoSec Press
Год: 2023
Страниц: 270
Язык: английский
Формат: pdf
Размер: 34.0 MB

Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all types, including TCP/IP, Bluetooth Networks, Car Networks, W-iFi Networks, Radio Frequency Networks, SCADA/ICS Networks, and more. In his inimitable style, Master OTW makes the seemingly complex, simple. This book is designed for beginner to intermediate cybersecurity professionals. It begins with the basics of networks and networking, examines network analysis with Wireshark and tcpdump, offers one of the most complete and in-depth analyses of Wi-Fi and Bluetooth networks, then progresses through the various protocols such as DNS, ARP, SMTP, and others. The reader will be led through the building of those applications in Linux, such as an EXIM server for email or a BIND server for DNS. Then OTW leads the reader through the major vulnerabilities of that protocol/application. We will start with basic networking and TCP/IP concepts and then progress to tools for analyzing network packets and protocols.
 

The Complete Cloud Computing Manual - 19th Edition 2023

Автор: magnum от 7-09-2023, 20:26, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Complete Cloud Computing Manual - 19th Edition 2023Название: The Complete Cloud Computing Manual - 19th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 164
Язык: английский
Формат: PDF
Размер: 27,6 MB

Learn how to make the most of the cloud for home & business! Cloud computing has been with us for a while now, giving home, small to medium business and enterprise users a new way in which to support and utilise their infrastructure and data. While the cloud may come with many concerns, chiefly that of security of data, it’s one of the fastest growing and interesting aspects of modern computing. With The Cloud Computing Guidebook we will show you how to implement and better utilise the cloud: personally or for your business. We also look at how to secure and even build your own cloud service. 100% unofficial.
 

Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services

Автор: literator от 6-09-2023, 05:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services
Автор: Puthiyavan Udayakumar
Издательство: Apress
Год: 2023
Страниц: 714
Язык: английский
Формат: pdf (true), epub (true)
Размер: 16.7 MB

Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF. The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint. Since the dawn of the Internet, people, organizations, and governments have fallen victim to cyberattacks. Cybersecurity, cyberattacks, cybercriminals, and more have been frequently discussed in the IT and business world. You’ll need a basic understanding of these concepts to protect yourself and those around you. For cyber system administrators and architects working with Microsoft Azure integrated services.