360° Vulnerability Assessment with Nessus and Wireshark

Автор: literator от 9-03-2023, 11:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

360° Vulnerability Assessment with Nessus and WiresharkНазвание: Vulnerability Assessment with Nessus and Wireshark: Identify, evaluate, treat, and report threats and vulnerabilities across your network
Автор: Raphael Hungaro Moretti, Emerson E. Matsukawa
Издательство: BPB Publications
Год: 2023
Страниц: 216
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark. Today, the world depends on services that run on the IT environments. These services, essentials for the modern world functioning constantly suffer attacks and invasions. This kind of preoccupation is true and must be a top priority for an IT security professional. This book will help you explore different techniques to locate, understand, and fix vulnerabilities that may exist in an IT infrastructure environment. The book starts by sharing the findings of professionals who are looking to create a secure IT environment. It then focuses on the building blocks of vulnerability assessment, tools, and frameworks that will help you find and map IT vulnerabilities. Moving on, the book deep dives into Network segregation and separation. It then shows you how to secure and harden your web servers using Apache and Nginx. Lastly, the book explains how to apply important hardening techniques to avoid operating system threats. This book is for Pentesters, Security analysts, Network administrators and also for any IT professionals who seek knowledge in security.
 

Искусственные нейронные сети: архитектуры, обучение, применения

Автор: umkaS от 7-03-2023, 10:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Искусственные нейронные сети: архитектуры, обучение, применения
Автор: Бодянский Е.В., Руденко О.Г.
Издательство: Телетех
Год: 2004
Cтраниц: 370
Формат: pdf
Размер: 15 мб
Язык: русский

Рассмотрены основные типы нейронов, архитектур, алгоритмов обучения искусственных нейронных сетей. Особое внимание уделяется задачам обработки информации в реальном времени: классификации, эмуляции, прогнозирования, управления и т. п. в условиях структурной и параметрической неопределенности.
 

The Complete Cloud Computing Manual - 17th Edition, 2023

Автор: literator от 7-03-2023, 03:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Complete Cloud Computing Manual - 17th Edition, 2023Название: The Complete Cloud Computing Manual - 17th Edition, 2023
Автор: Papercut Ltd
Издательство: Papercut Ltd
Год: 2023
Страниц: 154
Язык: английский
Формат: pdf
Размер: 93.9 MB

Learn how to make the most of the cloud for home & business! Cloud computing has been with us for a while now, giving home, small to medium business and enterprise users a new way in which to support and utilise their infrastructure and data. While the cloud may come with many concerns, chiefly that of security of data, it’s one of the fastest growing and interesting aspects of modern computing. With The Cloud Computing Guidebook we will show you how to implement and better utilise the cloud: personally or for your business. We also look at how to secure and even build your own cloud service. 100% unofficial.
 

The Complete Google User Manual - 17th Edition 2023

Автор: literator от 4-03-2023, 11:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Complete Google User Manual - 17th Edition 2023Название: The Complete Google User Manual - 17th Edition 2023
Автор: Papercut
Издательство: Papercut Limited
Год: 2023
Страниц: 144
Язык: английский
Формат: pdf
Размер: 51,7 MB

Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Начав со скромной поисковой системы, Google теперь предоставляет электронную почту с бесплатным онлайн-хранилищем, управление и редактирование фотографий, социальные сети с миллионами пользователей, один из лучших интернет-браузеров, крупнейший в мире видеосайт, ведущую на рынке операционную систему для смартфонов Android, интерактивные карты и навигацию, бесплатную платформу для ведения блогов и многое, многое другое. 100% неофициальное руководство.
 

Cybertax: Managing the Risks and Results

Автор: literator от 3-03-2023, 15:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cybertax: Managing the Risks and ResultsНазвание: Cybertax: Managing the Risks and Results
Автор: George K. Tsantes, James Ransome
Издательство: CRC Press/Auerbach Publications
Серия: IT Pro Practice Notes
Год: 2023
Страниц: 139
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations. In a perfect world, we would not need cybersecurity. Technology would work without interference, there would be no malicious actors, and users would never make mistakes. There would be no holes or errors in the code that powers technology, and com­munications between technologies would be secure. Unfortunately, the opposite is true. Technology systems are open and invite malicious exploits, bad actors are multiplying in numbers and sophistication, and users constantly make errors that allow bad things to happen. The number of devices and apps connected to the Internet is growing exponentially. Cybersecurity is a necessary program for any organization or individual. It is a tax on the organization; we call this “cybertax.”
 

Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (Early Release)

Автор: literator от 2-03-2023, 20:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (Early Release)Название: Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (Early Release)
Автор: Kim Crawley
Издательство: O’Reilly Media, Inc.
Год: 2023-02-28
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Hacker culture can be esoteric, but this entertaining reference is here to help. Organized from A to Z and written by a longtime hacker, this fun, conversational reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines. From phreaking to deepfakes, from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones.
 

Malware: Detection and Defense

Автор: literator от 2-03-2023, 20:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Malware: Detection and DefenseНазвание: Malware: Detection and Defense
Автор: Eduard Babulak
Издательство: ITexLi
Год: 2023
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book presents a collection of selected papers addressing malware detection, which is necessary to create reliable and resilient cyber and computer security mechanisms. Cyber security providers are facing a continuous stream of new, sophisticated cyberattacks on cyber critical infrastructures worldwide. These cyberattacks are often triggered by malware and ransomware. In today’s cyber security landscape, companies are facing increasing pressure to protect their data and systems from malicious attackers. As a result, there has been a significant rise in the number of security solutions that can identify malware. But how do you know if an image file is infected with malware? How can you prevent it from running? This blog post covers everything you need to know about malware in your images and how to prevent them from running. The malware will allow the attacker or un-legitimate user to enter the system without being recognized as a valid user. In this paper, we will look at how malware can hide within images and transfer between computers in the background of any system. In addition, we will compare multiple kernel models for detecting malicious images. We also highly suggest which model should be used by the system for detecting malware. We used Keras Framework with TensorFlow in back-end, this about for Deep Learning libraries. For manipulate and process our images, we use Pandas and Scikit-leaning libraries. All experiments ran using Python 3.7 with notebook IDE.
 

Physical Layer Security for Wireless Sensing and Communication

Автор: literator от 2-03-2023, 18:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Physical Layer Security for Wireless Sensing and CommunicationНазвание: Physical Layer Security for Wireless Sensing and Communication
Автор: Huseyin Arslan, Haji M. Furqan
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 386
Язык: английский
Формат: pdf (true)
Размер: 31.7 MB

Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference. Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed. The fifth generation (5G) of mobile communication signaled a paradigm shift in wireless networks by introducing a variety of services satisfying different performance requirements rather than concentrating on increasing the achievable data rates. As a result, enhanced mobile broadband (eMBB), massive machine-type communication (mMTC),and ultra-reliable low-latency communication (uRLLC) services were introduced to support a large number of devices and critical applications. Sixth-generation (6G) cellular communication standards intend to broaden this variety of applications and use cases even further, laying the groundwork for a human-centric digital society.
 

Google Tips & Tricks - 18th Edition, 2023

Автор: literator от 2-03-2023, 17:34, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Google Tips & Tricks - 18th Edition, 2023Название: Google Tips & Tricks - 18th Edition, 2023
Автор: Jon White (Editor)
Издательство: Future Publishing Ltd.
Год: 2023
Страниц: 132
Язык: английский
Формат: pdf
Размер: 70.3 MB

Команда Google полна сюрпризов. Как только вы думаете, что она превзошла саму себя, она выдает очередное улучшение, которое полностью меняет все. Последним крупным изменением стал логотип, выполненный шрифтом "Alphabet" - от старого Times он перешел к новому и элегантному виду по всему периметру. Теперь, однако, Google повысил свой статус, выпустив собственное мобильное устройство Google Pixel и систему голосового управления Nest Audio. Компания, которая сделала интернет-поиск тем, чем он является сегодня, взяла разработанную ею ОС и выпустила собственное оборудование для нее. Устройства Google Nest полностью изменят взаимодействие пользователя со своими гаджетами и повседневные задачи, сделав даже самые утомительные процессы немного проще. Узнайте все, что вам нужно знать о возможностях Google: от советов по образу жизни до приемов повышения производительности.
 

Internet of Things: New Trends, Challenges and Hurdles

Автор: literator от 2-03-2023, 16:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Internet of Things: New Trends, Challenges and HurdlesНазвание: Internet of Things: New Trends, Challenges and Hurdles
Автор: Manuel Dominguez-Morales, Angel Varela-Vaca, Lourdes Miro-Amarante
Издательство: ITexLi
Год: 2023
Страниц: 123
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book serves as a showcase of the breadth of Internet of Things (IoT) research conducted in recent years for people who, while not experts in the field, do have prior knowledge of the IoT. The book also serves curious, non-technical readers, enabling them to understand necessary concepts and terminologies associated with the IoT. The Internet of Things (IoT) has emerged as a popular area of research and has piqued the interest of academics and scholars worldwide. As such, many works have been done on IoT in a variety of application areas. The Internet of Things (IoT) refers to the process of connecting everyday physical objects to the Internet, from common household objects (lighting, appliances, etc.) to healthcare assets (such as medical devices), as well as wearables, smart devices and even smart cities. These IoT-connected physical objects are visible within the created network itself, allowing them to be consulted and/or acted upon. The great advantage of the IoT, which leads to its enormous importance today, centres on the ease of connecting new objects to this network.