A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

Автор: literator от 3-09-2024, 14:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
Автор: Jason Edwards
Издательство: Wiley
Год: 2025
Страниц: 448
Язык: английский
Формат: pdf, epub (true)
Размер: 10.1 MB

Learn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. The cybersecurity landscape is increasingly complex, characterized by various sophisticated threats that target every aspect of the digital environment. From advanced persistent threats to ransomware, phishing, and zero-day exploits, the variety and sophistication of these cyber threats pose a constant challenge to organizations. This complexity is further amplified by the rapid pace of technological advancements and the expanding digital footprint of businesses, making securing digital assets an ever-evolving battle. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.
 

Security and Privacy in Web 3.0

Автор: literator от 2-09-2024, 11:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy in Web 3.0
Автор: Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu
Издательство: Springer
Год: 2024
Страниц: 164
Язык: английский
Формат: pdf (true), epub
Размер: 16.4 MB

Web 3.0 is the next generation of the Internet built on decentralized technologies such as blockchain and cryptography. It is designed to address issues encountered in the previous generation of the Internet such as imbalanced distribution of interests, monopoly of platform resources, and leakage of personal privacy. This book explores the challenges and solutions related to ensuring security and privacy in the context of the evolving Web 3.0 architecture. Web 3.0 represents the next generation of the web, characterized by decentralized networks, blockchain technology, and enhanced user control over data. As Web 3.0 evolves, the focus on addressing security and privacy concerns becomes increasingly crucial. This book provides a comprehensive understanding of the security and privacy issues specific to Web 3.0 and offers practical defense frameworks and methods to mitigate these challenges. This book is dedicated to the specific aspects of security and privacy in Web 3.0, from introducing the architecture and addressing the inherent issues to presenting innovative methods for privacy-preserving computing, user behavior identification, and abnormal transaction detection. It is of particular interest to researchers in the field of Web 3.0, blockchain, and network security, as it summarizes the security and privacy concerns in Web 3.0 and brings a number of innovative technologies and practical solutions to protect sensitive data and maintain user privacy in Web 3.0 environments, equipping researchers with the knowledge necessary to design secure and privacy-aware applications and systems in Web 3.0.
 

Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT

Автор: literator от 30-08-2024, 22:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Resource Discovery, Navigability and Trust Management Techniques for IoT and SIoT
Автор: Venugopal K R, Roopa M S, Santosh Pattar
Издательство: CRC Press
Год: 2025
Страниц: 330
Язык: английский
Формат: pdf (true)
Размер: 18.2 MB

A ready reference for the next-generation discovery techniques, this book presents advanced research findings on resource discovery, network navigability, and trust management on the Internet of Things (IoT) and Social Internet of Things (SIoT) ecosystems. It discusses the benefits of integrating social networking concepts into the Internet of Things to find the preferable, reliable, scalable, and near-optimal detection of things or services. It explores the concepts of the Social Internet of Things in different domains of IoT, such as the Internet of Vehicles and the Industrial Internet of Things. This book works to recognize and respond to user queries and improve service provisioning, find the optimal solution for the link selection in the SIoT structure, develop large-scale platforms, and provide a smart mechanism for trust evaluation.
 

Основы современной криптографии и стеганографии (2013)

Автор: umkaS от 30-08-2024, 07:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Основы современной криптографии и стеганографии (2013)
Автор: Рябко Б.Я., Фионов А.Н.
Издательство: Издательство "Горячая линия-Телеком"
Год: 2013 - 2-е издание
Cтраниц: 232
Формат: pdf
Размер: 12 мб
Язык: русский

В монографии изложены основные подходы и методы современной криптографии и стеганографии для решения задач, возникающих при обработке, хранении и передаче информации.
 

Cybersecurity Tabletop Exercises

Автор: literator от 30-08-2024, 05:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity Tabletop Exercises: From Planning to Execution
Автор: Robert Lelewski, John Hollenberger
Издательство: No Starch Press
Год: 2025
Страниц: 200
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises. Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks. With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture. This book has several audiences in mind. The first is information security professionals and those in related roles who are tasked with creating and facilitating a tabletop exercise for their employer. These individuals might need help executing their organization’s first tabletop exercise, or they might want to improve their performance in an ongoing series of exercises.
 

Become GCP Cloud Digital Leader Certified in 7 Days: Getting to Know Google Cloud

Автор: literator от 28-08-2024, 06:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Become GCP Cloud Digital Leader Certified in 7 Days: Getting to Know Google Cloud
Автор: Abhinav Krishna Kaiser
Издательство: Apress
Год: 2024
Страниц: 361
Язык: английский
Формат: pdf
Размер: 14.7 MB

Unlock opportunities in the IT industry through the entry level Google Cloud Platform (GCP) and embark on a journey of Cloud Digital Leader certification. In this book, aspiring IT professionals, IT leaders, and enthusiasts will find a comprehensive resource that simplifies the basic technological elements of GCP and the spread of its products and services that are needed to thrive in the digital age. You’ll begin by reviewing the details of GCP’s role in digital transformation and how cloud technology is revolutionizing businesses around the globe. Next, the book covers the use of data in GCP and AI and machine learning implementations in GCP. Further, it discusses use cases involving data lakes and data warehouses. Following this, you’ll examine cloud infrastructure, including technologies around virtual machines, containerization, and serverless computing. The last section focuses on security, managing operations, and monitoring using GCP. You will also gain insight into Google’s framework for service reliability engineering (SRE). Become GCP Cloud Digital Leader Certified in 7 Days allows you to dive into the world of Google Cloud Platform with confidence, armed with the knowledge to navigate the dynamic landscape of IT and emerge as a digital leader. For those who are in leadership at IT organizations. The book is also for all IT professionals and students preparing for the Google Cloud Platform: Cloud Digital Leader certification.
 

Redefining Security With Cyber AI

Автор: literator от 27-08-2024, 12:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Redefining Security With Cyber AI
Автор: Marwan Omar, Hewa Majeed Zangana
Издательство: IGI Global
Год: 2024
Страниц: 287
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In the rapidly evolving digital landscape, the importance of cybersecurity has never been more critical. With the increasing sophistication of cyber threats, traditional security measures often fall short in providing adequate protection. Cyber Artificial Intelligence (AI) offers advanced capabilities to detect, prevent, and respond to attacks in real time. As cyber threats continue to grow in complexity and frequency, the integration of AI into cybersecurity frameworks is not just advantageous but essential for maintaining robust and resilient defenses. Redefining Security With Cyber AI delves into the profound transformation of security paradigms brought about by the advent of AI. This book explores the intricate dance between the ever-expanding frontiers of digital technology and the AI-driven mechanisms that aim to safeguard them. Covering topics such as artificial neural networks, intrusion detection, and large language models, this book is an excellent resource for cybersecurity professionals, AI and Machine Learning researchers, IT executives and managers, policy makers and regulators, postgraduate students and educators, academicians, and more.
 

Home Networking Tricks and Tips - 5th Edition 2024

Автор: literator от 25-08-2024, 18:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Home Networking Tricks and Tips - 5th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 38.8 MB

"Home Networking Tricks and Tips - 5th Edition 2024" - это совершенное цифровое издание для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить свои навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их в своем "умном доме". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий.
 

Cyber Space and Outer Space Security

Автор: literator от 25-08-2024, 04:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Space and Outer Space Security
Автор: Karthikeyan Periyasami, Polinpapilinho F. Katina, Rajagopal Ramasamy
Издательство: River Publishers
Серия: River Publishers Series in Security and Digital Forensics
Год: 2024
Страниц: 293
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of Artificial Intelligence (AI) and data defense in aerospace cybersecurity. A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.
 

Industrial Edge Computing: Architecture, Optimization and Applications

Автор: literator от 25-08-2024, 03:37, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Industrial Edge Computing: Architecture, Optimization and Applications
Автор: Xiaobo Zhou, Shuxin Ge, Jiancheng Chi, Tie Qiu
Издательство: Springer
Год: 2024
Страниц: 216
Язык: английский
Формат: pdf (true), epub
Размер: 42.3 MB

This book serves as a pivotal guide for professionals and researchers within the industrial computing domain, offering an extensive examination of edge computing in industrial environments. Tailored for individuals possessing a foundational understanding of industrial computing systems, it aims to augment their knowledge concerning the role and capabilities of edge computing in this dynamically evolving sector. In an era where real-time, reliable, and scalable computing solutions are of paramount importance, traditional cloud computing models grapple with challenges such as latency, bandwidth limitations, data sovereignty, and privacy concerns. This book positions edge computing as a crucial evolution in industrial data processing and analytics, specifically addressing these challenges. It introduces a distinctive three-layer industrial edge computing architecture that integrates device, edge, and application layers, explicitly designed to accommodate the intricacies of the Industrial Internet of Things (IIoT). Beyond elucidating the theoretical foundations of edge computing, the book delves into its practical applications, with a particular emphasize on edge-assisted model inference as a key scenario. It offers insightful case studies and discussions on the integration of edge computing with Artificial Intelligence (AI), illustrating how this collaboration is revolutionizing industrial systems. A comprehensive understanding of the material is facilitated by a background in Computer Science, industrial engineering, IoT, and cloud computing.