The Cloud Leader's Handbook: Strategically Innovate, Transform, and Scale Organizations

Автор: literator от 5-07-2023, 21:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Cloud Leader's Handbook: Strategically Innovate, Transform, and Scale Organizations
Автор: Ron C. L’Esteve
Издательство: Apress
Год: 2023
Страниц: 275
Язык: английский
Формат: pdf
Размер: 10.2 MB

This book is a comprehensive guide covering modern cloud strategies and leadership approaches for building and scaling organizations to maturity on their cloud adoption journey. The book starts by examining technical topics from the perspective of the cloud leader, who is responsible for cloud teams and accountable for cloud products and platforms within their organization. Through a series of practical insights and real-world examples, you will gain a deep understanding of the key considerations for leading a cloud-driven organization. These considerations include understanding the benefits of digital transformation, managing global tech teams, and delivering excellence through platform ownership. Towards the end of the book, you will explore the latest trends and best practices for strategically innovating and scaling your organization in the cloud.
 

Empirical Cloud Security Second Edition: Practical Intelligence to Evaluate Risks and Attacks

Автор: literator от 4-07-2023, 21:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Empirical Cloud Security Second Edition: Practical Intelligence to Evaluate Risks and Attacks
Автор: Aditya K. Sood
Издательство: Mercury Learning and Information
Год: 2023
Страниц: 660
Язык: английский
Формат: epub (true)
Размер: 25.5 MB

The second edition of the book has been updated with the latest research and developments in the field of cloud security. The content has been refined and streamlined to make it more accessible and engaging for readers. The book is designed for security and risk assessment professionals, DevOps engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches. The chapters are designed with a granular framework, starting with the security concepts, followed by hands-on assessment techniques based on real-world studies, and concluding with recommendations including best practices.
 

5G NR, Wi-Fi 6, and Bluetooth LE 5: A Primer on Smartphone Wireless Technologies

Автор: literator от 3-07-2023, 21:47, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: 5G NR, Wi-Fi 6, and Bluetooth LE 5: A Primer on Smartphone Wireless Technologies
Автор: Douglas H. Morais
Издательство: Springer
Год: 2023
Страниц: 191
Язык: английский
Формат: pdf (true), epub
Размер: 11.6 MB

This book provides, at a high level and in a tractable fashion, a description of how wireless communications are achieved in the latest smartphones. The author shows how smartphones communicate via three separate systems, namely 5G NR, Wi-Fi 6, and Bluetooth Low Energy 5. He explains how 5G NR allows mobile voice and high-speed data communication, how Wi-Fi allows smartphone attachment to the Internet independent of 5G NR, and how Bluetooth allows smartphone attachment to speakers, in-car entertainment systems, smart watches, etc. This text explains the key basic technologies employed and then addresses how each system operates. This book is of interest to anyone with a rudimentary scientific understanding who desires to know more at an intuitive level rather than rigorous one how smartphones achieve wireless communications.
 

Сети связи пост-NGN

Автор: umkaS от 3-07-2023, 08:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Сети связи пост-NGN
Автор: Гольдштейн Б.С., Кучерявый А.Е.
Издательство: СПб.: БXB-Пeтepбуpг
Год: 2014
Cтраниц: 160
Формат: pdf
Размер: 11 мб
Язык: русский

Книга описывает инфокоммуникационные сети пост-NGN второго десятилетия текущего века. Предназначается студентам, бакалаврам и магистрам, а также аспирантам, исследования которых прямо или косвенно затрагивают разные аспекты построения, технической эксплуатации и развития перспективных телекоммуникационных сетей. Инженеры и менеджеры, работающие в области инфокоммуникаций, тоже найдут для себя новое.
 

Вычислительные системы, сети и телекоммуникации (2010)

Автор: umkaS от 2-07-2023, 08:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Вычислительные системы, сети и телекоммуникации
Автор: Токарев В.Л.
Издательство: Промпилот
Год: 2010
Cтраниц: 477
Формат: djvu
Размер: 12 мб
Язык: русский

В учебном пособии рассмотрены принципы построения, архитектура функциональная и структурная организация, основные устройства и модули вычислительных машин, сетей и структура и характеристики систем телекоммуникаций. Рассмотрены их программное обеспечение, функционирование и перспективы развития.
 

Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense

Автор: literator от 29-06-2023, 08:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defenseНазвание: Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense
Автор: Lyndon Marshall
Издательство: River Publishers
Год: 2023
Страниц: 192
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed. From acquiring software, to the ongoing flaws in email, to the risks of file sharing, and issues surrounding social media and social reputation, Practical Insecurity is the tool you need to maximize your self-protection in the digital world. Everyone has had a brush with cybersecurity―in some way. Our computer has gotten a virus, somebody you know has lost all their company’s data because of ransomware, someone has stolen our identity, a store we do business with has their computer system compromised―including our account―so we are offered free identity protection, and so on. It seems like everyday there is another bit of bad news and it often impacts us. But, the question largely goes what can I do as an individual or as the owner of a small business to protect myself against having my security compromised? Practical Insecurity provides the answers.

 

The Great Web 3.0 Glossary: All you need to know about Blockchain, Crypto, NFT, Metaverse, Service Robots & AI

Автор: literator от 28-06-2023, 18:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Great Web 3.0 Glossary: All you need to know about Blockchain, Crypto, NFT, Metaverse, Service Robots & AIНазвание: The Great Web 3.0 Glossary: All you need to know about Blockchain, Crypto, NFT, Metaverse, Service Robots & Artificial Intelligence
Автор: Nikolas Beutin, Daniel Boran
Издательство: Fachmedien Recht und Wirtschaft
Год: 2023
Страниц: 207
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Metaverse, Non-Fungible Tokens (NFTs), Cryptocurrencies, Blockchain, Artificial Intelligence (AI), Service Robots etc. are a rapidly expanding field with an ever-increasing number of terms and community-specific jargon. A new term is not always accompanied by something truly novel. In addition to verbal "pseudo-innuendos" and "crypto-slang" introduced with the intent of attracting attention quickly, there are several significant new developments. The issue with this development is that the risk of "Babylonian language confusion" is growing exponentially. The encyclopedia is intended for managers, students, and professors alike. With the aid of this encyclopedia, managers who are faced with Metaverse, NFT, Cryptocurrency, AI, Predictive Modeling, Service Robot, or Blockchain decisions in their daily work should have quick access to technical terms. This encyclopedia is also intended to help students keep track of the subject’s numerous terms as they study it. The encyclopedia can also be used as a guide for a consistent use of Metaverse, NFT, Cryptocurrency, and Blockchain terminology by instructors, teachers, and professors.

 

Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion

Автор: literator от 28-06-2023, 08:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification CompanionНазвание: Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion: Learn and Apply Network Design Concepts to Prepare for the Exam
Автор: Dario Cabianca
Издательство: Apress
Год: 2023
Страниц: 445
Язык: английский
Формат: pdf (true)
Размер: 47.4 MB

While many guides exist to help software engineers learn cloud networking design and architecture concepts, and even prepare for cloud network certifications on AWS and Azure, far fewer resources are available covering the Google Cloud Platform (GCP) Professional Cloud Network Engineer certification exam. Well, look no further! This self-paced guide book is designed to help engineers learn cloud networking best practices on GCP, and prepare for the GCP Professional Cloud Network Engineer certification exam. You will waste no time when you use this study companion. It lets you dive in and learn how GCP differs from other public cloud providers (AWS and Microsoft Azure).

 

Security and Risk Analysis for Intelligent Edge Computing

Автор: literator от 25-06-2023, 17:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security and Risk Analysis for Intelligent Edge ComputingНазвание: Security and Risk Analysis for Intelligent Edge Computing
Автор: Gautam Srivastava, Uttam Ghosh, Jerry Chun-Wei Lin
Издательство: Springer
Серия: Advances in Information Security
Год: 2023
Страниц: 244
Язык: английский
Формат: pdf (true), epub
Размер: 25.1 MB

This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease. Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing.

 

Risk Identification by Penetration Testing: A Comprehensive Guide to the PTES Framework

Автор: literator от 24-06-2023, 20:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Risk Identification by Penetration Testing: A Comprehensive Guide to the PTES FrameworkНазвание: Risk Identification by Penetration Testing: A Comprehensive Guide to the PTES Framework
Автор: Brandon S. Keath
Издательство: Leanpub
Год: 2023-05-04
Страниц: 121
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Dive into the world of penetration testing with this comprehensive guide by cybersecurity expert, Brandon S. Keath. Explore each stage of the Penetration Testing Execution Standard, learn essential tools and techniques, and gain insights from real-world examples. Master the art of ethical hacking and become a skilled penetration tester. In this section, we will explore post-exploitation with Metasploit, focusing on the main features of Meterpreter and the use of shells outside of Metasploit. Post-exploitation refers to the actions taken after gaining unauthorized access to a system. The goal is to maintain control, gather valuable information, and, in some cases, pivot to other systems within the network. Meterpreter is a powerful post-exploitation tool included in Metasploit. It provides advanced features and functionalities that facilitate information gathering, privilege escalation, maintaining access, and more. Meterpreter runs in memory, making it difficult to detect by antivirus software.