Fuzzing: Исследование уязвимостей методом грубой силы

Автор: umkaS от 2-03-2023, 12:20, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fuzzing: Исследование уязвимостей методом грубой силы
Автор: Саттон М., Грин А., Амини П.
Издательство: Символ-Плюс
Год: 2009
Cтраниц: 525
Формат: djvu
Размер: 24 мб
Язык: русский

Фаззинг - это процесс отсылки намеренно некорректных данных в исследуемый объект с целью вызвать ситуацию сбоя или ошибку. Настоящих правил фаззинга нет. Это такая технология, при которой успех измеряется исключительно результатами теста. Для любого отдельно взятого продукта количество вводимых данных может быть бесконечным.
 

Blockchain, IoT, and AI Technologies for Supply Chain Management

Автор: literator от 2-03-2023, 01:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Blockchain, IoT, and AI Technologies for Supply Chain ManagementНазвание: Blockchain, IoT, and AI Technologies for Supply Chain Management
Автор: Priyanka Chawla, Adarsh Kumar, Anand Nayyar, Mohd Naved
Издательство: CRC Press
Серия: Innovations in Intelligent Internet of Everything (IoE)
Год: 2023
Страниц: 295
Язык: английский
Формат: pdf (true)
Размер: 21.2 MB

Blockchain, IoT, and AI Technologies for Supply Chain Management discusses the problems and difficulties that the facilitators of the supply chain confront, in addition to the possible solutions to such problems and difficulties. This book will be the only one of its kind to address the impact of COVID-19 on supply chain systems involving different stakeholders such as producers, dealers, and manufacturers and will provide a foundation for future research opportunities that will allow for the unrestricted expansion and prosperity of business. It will serve as a foundation for academics, scientists, and educationists interested in the use of modern technologies in the field of supply chain management, such as the Internet of Things (IoT), Artificial Intelligence (AI), and Blockchain. In addition to those engaged in research, undergraduate and postgraduate students in higher education can also use this publication as a reference book. The Internet of Things (IoT) is a network of physical objects or people that are equipped with software, electronics, networks, and sensors to collect and exchange data. The Internet of Things aims to extend Internet connectivity beyond traditional devices like computers, smartphones, and tablets to more mundane products like toasters. As a result of the Internet of Things, virtually everything becomes “smart,” utilizing the power of data collection, AI algorithms, and networks to improve aspects of our life.
 

Advance Cyber Security

Автор: literator от 28-02-2023, 16:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Advance Cyber SecurityНазвание: Advance Cyber Security
Автор: Manmohan Singh, Priyanka Sharma, Rahul Sharma
Издательство: Arcler Press
Год: 2023
Страниц: 296
Язык: английский
Формат: pdf (true)
Размер: 30.9 MB

Nowadays, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks. The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation. Numerous policy proposals have been advanced, and a number of bills have been introduced in Congress to tackle parts of the cyber security challenge. This book is designed to serve as the textbook for a semester course devoted to cyber security. It is focused on helping students acquired the skills sought in the professional workforce. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
 

Blogging All-in-One For Dummies, 3rd Edition

Автор: literator от 28-02-2023, 11:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Blogging All-in-One For Dummies, 3rd EditionНазвание: Blogging All-in-One For Dummies, 3rd Edition
Автор: Amy Lupold Bair, Susan Gunelius
Издательство: For Dummies
Год: 2023
Страниц: 771
Язык: английский
Формат: pdf (true)
Размер: 71.0 MB

Blog with the best of ‘em! If you’re looking for a complete guide to creating and solidifying your place in the blogosphere, you’ve come to the right place! With 8 books in one, Blogging All-in-One For Dummies is the only resource you’ll need to get started or to improve your existing blog. Learn about the most popular blogging platforms, creating content worth reading, and methods for driving traffic to your blog. Cut through the confusion and find the facts about monetizing your blog, using the best blogging tools for you, and increasing reader engagement to become an active, successful member of the blogging community. You're ready to start blogging, so let Dummies show you the way! Why does SEO matter? A large proportion of Internet traffic to your blog will come from search engines, which means that bloggers need to help search engines locate their blogs if they want to bring more readers to their content. Speaking of content, all of the content on your blog, from the words in your posts to the titles you give to your images, play a role in whether or not search engines include your content in their search results.
 

CCNP: ENCOR: 350-401: CCNP ENTERPRISE: Cisco Certified Network Professional

Автор: literator от 27-02-2023, 12:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

CCNP: ENCOR: 350-401: CCNP ENTERPRISE: Cisco Certified Network ProfessionalНазвание: CCNP: ENCOR: 350-401: CCNP ENTERPRISE: Cisco Certified Network Professional
Автор: 9tut Official
Издательство: 9tut Official
Год: 2021
Страниц: 213
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.1 course gives you the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You’ll also learn to implement security principles, implement automation and programmability within an enterprise network, and how to overlay network design by using SD-Access and SD-WAN solutions. This course helps you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam, which is part of four new certifications: CCNP Enterprise; CCIE Enterprise Infrastructure; CCIE Enterprise Wireless
Cisco Certified Specialist – Enterprise Core.
 

Software-Defined Networking 2: Extending SDN Control to Large-Scale Networks

Автор: literator от 26-02-2023, 10:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Software-Defined Networking 2: Extending SDN Control to Large-Scale NetworksНазвание: Software-Defined Networking: Extending SDN Control to Large-Scale Networks, Volume 2
Автор: Fetia Bannour, Sami Souihi, Abdelhamid Mellouk
Издательство: Wiley-ISTE
Год: 2022
Страниц: 173
Язык: английский
Формат: pdf (true), epub (true)
Размер: 19.7 MB

This book reviews the concept of Software-Defined Networking (SDN) by studying the SDN architecture. It provides a detailed analysis of state-of-the-art distributed SDN controller platforms by assessing their advantages and drawbacks and classifying them in novel ways according to various criteria. Additionally, a thorough examination of the major challenges of existing distributed SDN controllers is provided along with insights into emerging and future trends in that area. Decentralization challenges in large-scale networks are tackled using three novel approaches, applied to the SDN control plane presented in the book. The first approach addresses the SDN controller placement optimization problem in large-scale IoT-like networks by proposing novel scalability and reliability aware controller placement strategies. The second and third approaches tackle the knowledge sharing problem between the distributed controllers by suggesting adaptive multilevel consistency models following the concept of continuous Quorum-based consistency. These approaches have been validated using different SDN applications, developed from real-world SDN controllers.
 

Revealing Media Bias in News Articles: NLP Techniques for Automated Frame Analysis

Автор: literator от 26-02-2023, 09:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Revealing Media Bias in News Articles: NLP Techniques for Automated Frame AnalysisНазвание: Revealing Media Bias in News Articles: NLP Techniques for Automated Frame Analysis
Автор: Felix Hamborg
Издательство: Springer
Год: 2023
Страниц: 245
Язык: английский
Формат: pdf (true), epub
Размер: 30.5 MB

This book presents an interdisciplinary approach to reveal biases in English news articles reporting on a given political event. The approach named person-oriented framing analysis identifies the coverage’s different perspectives on the event by assessing how articles portray the persons involved in the event. In contrast to prior automated approaches, the identified frames are more meaningful and substantially present in person-oriented news coverage. The book is structured in seven chapters: Chapter 1 presents a few of the severe problems caused by slanted news coverage and identifies the research gap that motivated the research described in this thesis. Chapter 2 discusses manual analysis concepts and exemplary studies from the social sciences and automated approaches, mostly from computer science and computational linguistics, to analyze and reveal media bias. This way, it identifies the strengths and weaknesses of current approaches for identifying and revealing media bias. Chapter 3 discusses the solution design space to address the identified research gap and introduces person-oriented framing analysis (PFA). Crawling news websites can be achieved using many web crawling frameworks, such as scrapy for Python. Such frameworks traverse the links of websites, hence need to be tailored to the specific use case. Extracting information from news articles is required to convert the raw data that the crawler retrieves into a format that is suitable for further analysis tasks, such as Natural Language Processing.
 

Energy IoT Architecture: From Theory to Practice

Автор: literator от 23-02-2023, 16:52, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Energy IoT Architecture: From Theory to PracticeНазвание: Energy IoT Architecture: From Theory to Practice
Автор: Stuart McCafferty
Издательство: Artech House
Год: 2023
Страниц: 245
Язык: английский
Формат: pdf (true)
Размер: 27.5 MB

This book provides a very common-sense approach to transforming the Electricity Industry to meet clean energy goals and simplifying coordination with DER at scale with plug and play interoperability over time. It shows you a new way to architect solutions using a modern, event-driven, standards-based, elastic, cloud-based, distributed architecture to simplify and abstract communications with utility, customer, and third-party owned clean energy assets. You’ll find detailed explanations of common energy IoT reference architecture; understand integration of utility, customer, and third party distributed grid assets to support grid services and market opportunities, and master the elastic scalability solution which is considered by many to be the biggest problem in utility systems for DER. This is a must-have resource for architects, engineers, software developers, government officials, undergraduate students, and professors.
 

Шифровальщики. Как реагировать на атаки с использованием программ-вымогателей

Автор: HERSON от 22-02-2023, 13:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Шифровальщики. Как реагировать на атаки с использованием программ-вымогателейНазвание: Шифровальщики. Как реагировать на атаки с использованием программ-вымогателей
Автор: Олег Скулкин
Язык: русский
Издательство: Альпина Диджитал
Год: 2022
Страниц: 280
Формат: pdf
Размер: 10,2 Мб

«Шифровальщики» – это программы, которые находят уязвимости в сетях предприятий, чтобы потом с помощью этих уязвимостей внедриться в сеть, завладеть ценной для предприятия информацией и далее вымогать деньги из руководства компании. Разумеется, программы эти создаются людьми, которые могут как объединяться в преступные группы, так и действовать поодиночке. В последние годы происходит рост кибератак именно с помощью программ-шифровальщиков. К сожалению, этот тренд не обошел и Россию – здесь количество таких атак только за 2021 год выросло более чем в три (!) раза.
 

Kids Cybersecurity Using Computational Intelligence Techniques

Автор: literator от 22-02-2023, 04:59, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Kids Cybersecurity Using Computational Intelligence TechniquesНазвание: Kids Cybersecurity Using Computational Intelligence Techniques
Автор: Wael M. S. Yafooz, Hussain Al-Aqrabi, Arafat Al-Dhaqm
Издательство: Springer
Серия: Studies in Computational Intelligence
Год: 2023
Страниц: 279
Язык: английский
Формат: pdf (true), epub
Размер: 24.9 MB

Cybersecurity is a fast-evolving topic. There are many approaches and technologies designed to protect students. This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid’s textual aggression through methods of Machine Learning and Deep Learning and Natural Language Processing (NLP) for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content.