IoT and Analytics in Renewable Energy Systems (Volume 2)

Автор: literator от 16-06-2023, 21:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

IoT and Analytics in Renewable Energy Systems (Volume 2)Название: IoT and Analytics in Renewable Energy Systems (Volume 2): AI, ML and IoT Deployment in
Sustainable Smart Cities
Автор: O.V. Gnana Swathika, K. Karthikeyan
Издательство: CRC Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true)
Размер: 29.6 MB

Smart cities emanate from a smart renewable-energy-aided power grid. The smart grid technologies offer an array of benefits like reliability, availability, and resiliency. Smart grids phenomenally contribute to facilitating cities reaching those sustainability goals over time. Digital technologies, such as the Internet of Things (IoT), automation, Artificial Intelligence (AI) and Machine Learning (ML) significantly contribute to the two-way communication between utilities and customers in smart cities.

 

Azure Security (MEAP v10)

Автор: literator от 16-06-2023, 20:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Azure Security (MEAP v10)Название: Azure Security (MEAP v10)
Автор: Bojan Magusic
Издательство: Manning Publications
Год: 2023
Страниц: 458
Язык: английский
Формат: pdf, epub
Размер: 22.4 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud.

 

Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide

Автор: literator от 14-06-2023, 04:52, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive GuideНазвание: Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide
Автор: Alexander Kott
Издательство: Springer
Серия: Advances in Information Security
Год: 2023
Страниц: 468
Язык: английский
Формат: pdf (true), epub
Размер: 37.1 MB

This book offers a structured overview and a comprehensive guide to the emerging field of Autonomous Intelligent Cyber Defense Agents (AICA). The book discusses the current technical issues in autonomous cyber defense and offers information on practical design approaches. The material is presented in a way that is accessible to non-specialists, with tutorial information provided in the initial chapters and as needed throughout the book. The reader is provided with clear and comprehensive background and reference material for each aspect of AICA. This book is based on the premise that the future of cyber-defense and cyber resilience will depend largely on autonomous, Artificially Intelligent (AI) agents. Such an agent will reside on a system that includes one or more computing devices and be responsible for defending the system from cyber compromises. If a compromise occurs, the agent will then be responsible for response and recovery of the system, usually autonomously. To refer to such a class of agents, we use the term Autonomous Intelligent Cyber-defense Agent (AICA). In this book, we explore how AICA will be designed and how it will operate.

 

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd Edition

Автор: literator от 13-06-2023, 21:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd EditionНазвание: Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber, 2nd Edition
Автор: Ryan Leirvik
Издательство: Apress
Год: 2023
Страниц: 222
Язык: английский
Формат: pdf, epub
Размер: 12.8 MB

When it comes to managing cybersecurity in an organization, most organizations tussle with basic foundational components. This practitioner’s guide lays down those foundational components, with real client examples and pitfalls to avoid. A plethora of cybersecurity management resources are available―many with sound advice, management approaches, and technical solutions―but few with one common theme that pulls together management and technology, with a focus on executive oversight. Author Ryan Leirvik helps solve these common problems by providing a clear, easy-to-understand, and easy-to-deploy "playbook" for a cyber risk management approach applicable to your entire organization. This second edition provides tools and methods in a straight-forward, practical manner to guide the management of a cybersecurity program.

 

Advanced Wireless Communication and Sensor Networks: Applications and Simulations

Автор: literator от 13-06-2023, 17:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Advanced Wireless Communication and Sensor Networks: Applications and SimulationsНазвание: Advanced Wireless Communication and Sensor Networks: Applications and Simulations
Автор: Ashish Bagwari, Geetam Singh Tomar, Jyotshana Bagwari, Jorge Luis Victoria Barbosa
Издательство: CRC Press
Год: 2023
Страниц: 355
Язык: английский
Формат: pdf (true)
Размер: 35.7 MB

This book cover wireless communication, security issues, advanced wireless sensor networks, routing protocols of WSNs with cross-layer solutions, emerging trends in the advanced WSNs, power management, distributed sensing and data gathering techniques for WSNs, WSNs Security, applications, research of advanced WSNs with simulation results, and simulation tools for WSNs. Wireless communication is one of the dominant communication systems in the current era. It has permeated into every sphere of our modern day-to-day activities and the industrial sector. There are certain benefits of using wireless communications. The notable merits include cost, mobility, ease of installation, reliability, and disaster recovery. Meanwhile, new paradigm shifts have also revolutionized wireless communication. Some adaptations such as Bluetooth, Wi-Fi 802.11, WiMax 802.16 need mention here. Brimming with a multitude of merits, these standards have improved wireless communications systems to a great extent.

 

Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processes

Автор: literator от 13-06-2023, 07:26, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processesНазвание: Ethically hacking an industrial control system: Analyzing, exploiting, mitigating, and safeguarding industrial processes for an ethical hacker
Автор: Sharon Ferrone
Издательство: BPB Publications
Год: 2022
Страниц: 571
Язык: английский
Формат: pdf, epub
Размер: 33.97 MB

In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used to continually test and exploit the security integrity of a company's people, processes, and products in order to completely safeguard critical infrastructure. This pen testing book takes a different approach than most by assisting you in gaining hands-on experience with equipment you'll encounter in the field. This will allow you to comprehend how industrial equipment interacts and functions in a real-world setting. This book begins by covering the fundamentals of industrial processes, then goes on to learn how to design and break them. It also includes obtaining open-source intelligence to develop a dangerous environment for your potential customer. You'll learn how to install and employ offensive tactics used by skilled hackers as you go. Before eventually launching assaults against systems in an industrial network, you'll learn about industrial equipment, port, and service discovery, pivoting, and much more.

 

Social Engineering Attack: Rethinking Responsibilities and Solutions

Автор: literator от 13-06-2023, 05:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Social Engineering Attack: Rethinking Responsibilities and SolutionsНазвание: Social Engineering Attack: Rethinking Responsibilities and Solutions
Автор: Gunikhan Sonowal
Издательство: Nova Science Publishers
Год: 2023
Страниц: 284
Язык: английский
Формат: pdf (true)
Размер: 28.2 MB

The social engineering attack is presented in the first chapter of the book. It covers the definition, background, motives, and outcome of the social engineering attack. The life cycle of a social engineering attack is covered in the second chapter of the book. Attack formulation, information collecting, preparation, cultivating relationships, exploitation, and debriefing are the six phrases used by social engineering attackers throughout the life cycle. The basic concepts of social engineering attacks are covered in the third chapter of the book. The six principles of social engineering include scarcity, commitment, authority, social proof, reciprocity, social proof, and social proof. Various forms of social engineering attacks are discussed in the fourth chapter of the book. The physical method, social approach, reverse social engineering approach, technical approach, and socio-technical approach are the five main forms of social engineering attacks. Identity theft is discussed in five of the book's chapters. The purpose of the information that attackers stole from users is explained in this chapter. Social engineering tools are covered in the book's six chapters.

 

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography

Автор: literator от 12-06-2023, 21:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum CryptographyНазвание: Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography
Автор: Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam
Издательство: CRC Press
Год: 2024
Страниц: 289
Язык: английский
Формат: pdf (true)
Размер: 13.4 MB

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence (AI) for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using Machine Learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence.
 

SC-100: Microsoft Cybersecurity Architect: Practice Questions, First Edition

Автор: literator от 12-06-2023, 18:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

SC-100: Microsoft Cybersecurity Architect: Practice Questions, First EditionНазвание: SC-100: Microsoft Cybersecurity Architect: +180 Exam Practice Questions with Detailed Explanations and Reference Links
Автор: IPSpecialist
Издательство: IPSpecialist
Год: 2023
Страниц: 196
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

SC-100 – Microsoft Certified Cybersecurity Architect: Practice Questions. IP Specialists' Practice Questions are dedicatedly designed from a certification exam perspective. The collection of these questions from our Study Guides are prepared to keep the exam blueprint in mind, covering not only important but necessary topics as well. It's an ideal document to practice and revise your certification. The offered practice questions contain all domains covered in the exam blueprint and provide an end-to-end explanation of each question with reference links.

 

The Complete Home Networking Manual - 5th Edition 2023

Автор: literator от 12-06-2023, 09:49, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Complete Home Networking Manual - 5th Edition 2023Название: The Complete Home Networking Manual - 5th Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2023
Страниц: 163
Язык: английский
Формат: pdf
Размер: 87.1 MB

Ваша домашняя сеть постоянно испытывает нагрузку, передавая объемы данных на ваши компьютеры, "умные" телевизоры, игровые приставки и многое другое. Хотя в большинстве случаев они работают без особых проблем и помех, бывают случаи, когда маршрутизатор разрывает соединение с Интернетом или Wi-Fi вообще перестает работать. Именно в такие моменты, зная немного больше о том, как все это работает, вы сможете избежать головной боли - в основном от других членов семьи! Эта книга поможет вам разобраться в технологиях, связанных с созданием сети. Какое оборудование необходимо, что оно делает, и как получить максимальную отдачу от каждого элемента сетевой головоломки. Внутри вы узнаете, как лучше всего настроить домашнюю сеть, как ее улучшить и как ее защитить.