Multi-Fractal Traffic and Anomaly Detection in Computer Communications

Автор: literator от 13-12-2022, 14:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Multi-Fractal Traffic and Anomaly Detection in Computer CommunicationsНазвание: Multi-Fractal Traffic and Anomaly Detection in Computer Communications
Автор: Ming Li
Издательство: CRC Press
Год: 2023
Страниц: 297
Язык: английский
Формат: pdf (true)
Размер: 31.7 MB

This book provides a comprehensive theory of mono- and multi-fractal traffic, including the basics of long-range dependent time series and 1/f noise, ergodicity and predictability of traffic, traffic modeling and simulation, stationarity tests of traffic, traffic measurement and the anomaly detection of traffic in communications networks. In this monograph, we address the theory of multi-fractal traffic and its applications to anomaly detection of traffic under distributed denial-of-service (DDoS) attacking in computer communications. Scholars and graduates studying network traffic in computer science will find the book beneficial.
 

Artificial Intelligence and Cybersecurity: Theory and Applications

Автор: literator от 12-12-2022, 19:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Artificial Intelligence and Cybersecurity: Theory and ApplicationsНазвание: Artificial Intelligence and Cybersecurity: Theory and Applications
Автор: Tuomo Sipola, Tero Kokkonen
Издательство: Springer
Год: 2023
Страниц: 300
Язык: английский
Формат: pdf (true), epub
Размер: 17.9 MB

This book discusses Artificial Intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of Artificial Intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The rapid development of technology is evident in our everyday lives. However, underneath it all lies the concern about cybersecurity. We have also witnessed the rise of artificial intelligence (AI) applications that surpass human intellect in specific tasks. The interplay of AI and cybersecurity is becoming increasingly relevant, as AI needs to be assessed from the cybersecurity point of view, and correspondingly, cybersecurity can benefit immensely from the advances in AI. This path will hopefully lead to less human work and more automated detection and classification in the world of cybersecurity.
 

Internet of Things and Cyber Physical Systems Security and Forensics

Автор: literator от 12-12-2022, 12:26, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Internet of Things and Cyber Physical Systems Security and ForensicsНазвание: Internet of Things and Cyber Physical Systems Security and Forensics
Автор: Keshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2023
Страниц: 299
Язык: английский
Формат: pdf (true)
Размер: 14.3 MB

The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science. Such systems are becoming increasingly common in public locations, businesses, universities, residences, and other shared offices, producing enormous amounts of data at rapid speeds in a variety of forms. IoT devices can be used as suspects, digital witnesses, or instruments of crime and cyberattacks, posing new investigation problems, forensic issues, security threats, legal concerns, privacy concerns, and ethical dilemmas. A cyberattack on IoT devices might target the device itself or associated systems, particularly vital infrastructure. This book discusses the advancements in IoT and Cyber Physical Systems (CPS) forensics.
 

Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and Networking

Автор: literator от 12-12-2022, 03:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and NetworkingНазвание: Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and Networking
Автор: Jun Du, Chunxiao Jiang
Издательство: Springer
Серия: Wireless Networks
Год: 2023
Страниц: 461
Язык: английский
Формат: pdf (true)
Размер: 14.3 MB

The first book on the multi-dimensional resource management for heterogenous communication, computing and caching in 6G. To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently.
 

Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS

Автор: literator от 10-12-2022, 07:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOSНазвание: Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols
Автор: Dr. Ahmed Hashem El Fiky
Издательство: BPB Publications
Год: 2023
Страниц: 303
Язык: английский
Формат: epub (true)
Размер: 10.4 MB

Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks. This book satisfies any IT professional's desire to become a successful ethical hacker who is willing to be employed in identifying and exploiting flaws in the organization's network environment. This book explains in detail how to conduct wireless penetration tests using a wide variety of tools to simulate cyber attacks on both Android and iOS mobile devices and wireless networks. This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng.
 

Azure Security For Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and Auditing

Автор: literator от 10-12-2022, 07:18, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Azure Security For Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and AuditingНазвание: Azure Security For Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and Auditing
Автор: Sagar Lad
Издательство: Apress
Год: 2023
Страниц: 221
Язык: английский
Формат: pdf, epub
Размер: 25.0 MB

This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. This book is intended for developers and IT consultants/architects who want practical insights into moving mission-critical workloads to Azure from technology and process aspects.
 

Deep Learning Approaches for Security Threats in IoT Environments

Автор: literator от 10-12-2022, 04:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Deep Learning Approaches for Security Threats in IoT EnvironmentsНазвание: Deep Learning Approaches for Security Threats in IoT Environments
Автор: Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 19.1 MB

Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment. In Deep Learning Approaches for Security Threats in IoT Environments , a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in Artificial Intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised Deep Learning techniques, as well as reinforcement and Federated Learning methods for privacy preservation.
 

Overcoming It Complexity: Simplify Operations, Enable Innovation, And Cultivate Successful Cloud Outcomes (Final Release)

Автор: literator от 10-12-2022, 03:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Overcoming It Complexity: Simplify Operations, Enable Innovation, And Cultivate Successful Cloud Outcomes (Final Release)Название: Overcoming It Complexity Simplify Operations, Enable Innovation, And Cultivate Successful Cloud Outcomes (Final Release)
Автор: Lee Atchison
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 100
Язык: английский
Формат: epub, mobi
Размер: 10.25 MB

The cloud promises cost savings, agility, and more. But the increasing complexity of modern IT systems often prevents businesses from realizing the outcomes they sought by moving to the cloud in the first place. At the core of this complexity is technical debt. Ad hoc decisions, traditional approaches, and "quick and dirty" solutions add up to fragile, more complex systems (and organizations)--reducing the pace of change, driving up costs, and degrading security. To succeed in the cloud, you first have to manage the problems IT complexity creates. This practical guide will help. If you're tasked with designing, delivering, or approving IT systems that support business growth, this book will teach you the principles and strategies you need to break out of silos, reassess traditional thinking, provide the business a better competitive position, and achieve cloud success across the company.
 

Основные концепции нейронных сетей

Автор: umkaS от 8-12-2022, 07:30, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Основные концепции нейронных сетей
Автор: Каллан Р.
Издательство: Вильямc
Год: 2001
Cтраниц: 288
Формат: pdf
Размер: 12 мб
Язык: русский

Эта книга является первой в полном курсе по нейронным сетям. Ее целью является раскрытие основных понятий и изучение основных моделей нейронных сетей с глубиной, достаточной для того, чтобы опытный программист мог реализовать такую сеть на том языке программирования, который покажется ему предпочтительнее.
 

The Complete Google User Manual – December 2022

Автор: literator от 4-12-2022, 10:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

The Complete Google User Manual – December 2022Название: The Complete Google User Manual – December 2022
Автор: Papercut
Издательство: Papercut Limited
Год: 2022
Страниц: 149
Язык: английский
Формат: pdf
Размер: 51.9 MB

Learn how to master Google’s unmissable free apps! There is so much more to Google than just searching online! From humble beginnings as a search engine, Google now provides email with free online storage, photo management and editing, social networking with millions of users, one of the best Internet browsers around, the biggest video site in the world, the market-leading smartphone operating system, interactive maps and navigation, a free blogging platform and much, much more. 100% unofficial.