Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Securing Mobile Devices and Technology
/ Комментариев: 0/

Название: Securing Mobile Devices and Technology
Автор: Kutub Thakur and Al-Sakib Khan Pathan
Издательство: CRC Press
Год: 2022
Формат: PDF
Страниц: 277
Размер: 12 Mb
Язык: English

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The CISO’s Transformation: Security Leadership in a High Threat Landscape
/ Комментариев: 0/

The CISO’s Transformation: Security Leadership in a High Threat LandscapeНазвание: The CISO’s Transformation: Security Leadership in a High Threat Landscape
Автор: Raj Badhwar
Издательство: Springer
Год: 2021
Страниц: 180
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. The Cybersecurity industry is very new and faces plethora of challenges such as widening gap between digital innovations and security controls, ever increasing and complex digital threat landscape due to rise and adoption of cloud, AI, IOT, 5G etc., the rise of the threat adversaries and severe shortage of Cybersecurity talent in the industry. The CISO role has evolved to a level which requires a well-rounded skill to ensure success.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information Security
/ Комментариев: 0/

Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information SecurityНазвание: Fundamentals of Information Security: A Complete Go-to Guide for Beginners to Understand All the Aspects of Information Security
Автор: Sanil Nadkarni
Издательство: BPB Publications
Год: 2021
Страниц: 292
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

An Ultimate Guide to Building a Successful Career in Information Security. The book starts by introducing the fundamentals of Information Security. You will deep dive into the concepts and domains within Information Security and will explore the different roles in Cybersecurity industry. The book includes a roadmap for a technical and non-technical student who want to make a career in Information Security. You will also understand the requirement, skill and competency required for each role. The book will help you sharpen your soft skills required in the Information Security domain. The book will help you with ways and means to apply for jobs and will share tips and tricks to crack the interview.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
/ Комментариев: 0/

Exam Ref SC-900 Microsoft Security, Compliance, and Identity FundamentalsНазвание: Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals
Автор: Yuri Diogenes, Nicholas DiCola
Издательство: Microsoft Press/Pearson Education
Год: 2022
Страниц: 224
Язык: английский
Формат: epub
Размер: 24.0 MB

Prepare for Microsoft Exam SC-900 and help demonstrate your real-world knowledge of the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. Designed for business stakeholders, new and existing IT professionals, functional consultants, and students, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Security, Compliance, and Identity Fundamentals level.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain for Information Security and Privacy
/ Комментариев: 0/

Blockchain for Information Security and PrivacyНазвание: Blockchain for Information Security and Privacy
Автор: Udai Pratap Rao, Piyush Kumar Shukla, Chandan Trivedi
Издательство: CRC Press
Год: 2022
Страниц: 441
Язык: английский
Формат: pdf (true)
Размер: 52.8 MB

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Edge Computing: Fundamentals, Advances and Applications
/ Комментариев: 0/

Edge Computing: Fundamentals, Advances and ApplicationsНазвание: Edge Computing: Fundamentals, Advances and Applications
Автор: K. Anitha Kumari, G. Sudha Sadasivam, D. Dharani
Издательство: CRC Press
Год: 2022
Страниц: 181
Язык: английский
Формат: pdf (true)
Размер: 16.9 MB

This reference text presents the state-of-the-art in edge computing, its primitives, devices and simulators, applications, and healthcare-based case studies. The text provides integration of blockchain with edge computing systems and integration of edge with Internet of Things (IoT) and cloud computing. It will facilitate the readers to setup edge-based environment and work with edge analytics. It covers important topics including cluster computing, fog computing, networking architecture, edge computing simulators, edge analytics, privacy-preserving schemes, edge computing with blockchain, autonomous vehicles, and cross-domain authentication.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Инфокоммуникационные системы. Программное обеспечение
/ Комментариев: 0/

Название: Инфокоммуникационные системы. Программное обеспечение
Автор: Журавлев А. Е., Макшанов А. В., Иванищев А. В.
Издательство: Лань
Год: 2021
Cтраниц: 376
Формат: pdf
Размер: 21 мб
Язык: русский

В учебнике подробно рассмотрены вопросы, связанные с актуальным программным обеспечением, обеспечивающим функционирование современных инфокоммуникационных систем и сетей, например, операционные системы и среды, типичные протоколы и программные интерфейсы и т. п. Также уделено отдельное внимание технологиям и подходам в сфере виртуализации. В заключении освещены основные особенности и нюансы проектирования современных высоконагруженных систем и сетей корпоративного уровня.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Online Terrorist Propaganda, Recruitment, and Radicalization
/ Комментариев: 0/

Название: Online Terrorist Propaganda, Recruitment, and Radicalization
Автор: John R. Vacca
Издательство: CRC Press
Год: 2019
Формат: PDF
Страниц: 532
Размер: 16,2 Mb
Язык: English

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online 'footprints' to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups' online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Recent Trends in Blockchain for Information Systems Security and Privacy
/ Комментариев: 0/

Recent Trends in Blockchain for Information Systems Security and PrivacyНазвание: Recent Trends in Blockchain for Information Systems Security and Privacy
Автор: Ajith Abraham, Amit Kumar Tyagi
Издательство: CRC Press
Год: 2022
Страниц: 362
Язык: английский
Формат: pdf (true)
Размер: 23.3 MB

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition
/ Комментариев: 0/

CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd EditionНазвание: CompTIA PenTest+ Study Guide: Exam PT0-002, 2nd Edition
Автор: Mike Chapple, David Seidl
Издательство: Sybex
Год: 2022
Страниц: 579
Язык: английский
Формат: pdf (true), epub
Размер: 57.2 MB

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing. In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field. You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems.




СЕТЕВЫЕ ТЕХНОЛОГИИ