Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


« Назад.. 1 2 3 4 5 6 7 8 9 10 ... 458 Вперёд »

Название: Social Engineering in Cybersecurity: Threats and Defenses
Автор: Gururaj H L, Janhavi V, Ambika V
Издательство: CRC Press
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It covers a wide range of social engineering attack vectors, including phishing, vishing, pretexting, baiting, tailgating, impersonation, and more. Each attack vector is dissected, with detailed explanations of how they work, real-world examples, and countermeasures. A packet sniffer is a technique for intercepting network packets or a type of spyware that hackers use to track individuals connected to a network. Although packet sniffing technologies are used by network administrators to monitor and verify network traffic, hackers may employ similar tools for unethical objectives. A WIFI adapter with monitor mode and packet sniffing capability is the most crucial item for packet sniffing. It is recommended to use a guest operating system, such as Kali Linux, to carry out packet sniffing. For packet sniffing, a person must be familiar not only with using terminals and sniffer tools such as Wireshark, Ettercap, Driftnet, etc. but also with network layer protocols.
Разместил: Ingvar16 17-05-2024, 18:34 | Комментарии: 0 | Подробнее
Название: Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities
Автор: Puthiyavan Udayakumar, R. Anandan
Издательство: Apress
Год: 2024
Страниц: 365
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems. The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure. This book equips IoT engineers, developers, and cybersecurity architects with knowledge and practical insights, guiding them in implementing a robust security framework using Microsoft Defender for IoT. By doing so, it ensures a more secure and resilient IoT infrastructure.
Разместил: Ingvar16 15-05-2024, 21:48 | Комментарии: 0 | Подробнее
Название: The Comprehensive Guide to Cybersecurity Hiring: Strategies, Trends, and Best Practices
Автор: Jason Edwards
Издательство: J. Ross Publishing
Год: 2024
Страниц: 302
Язык: английский
Формат: pdf, epub (true)
Размер: 11.1 MB

This comprehensive guide provides professionals, hiring managers, and business leaders with essential strategies and insights to navigate the complex cybersecurity talent landscape. It illuminates the nuances of various cybersecurity roles, providing a deep understanding of the skills and challenges inherent in these positions. These best practices extend beyond traditional recruitment methods, advocating for innovative tactics such as leveraging educational partnerships, social media, and community engagement to attract top talent in a competitive market. Additionally, The Comprehensive Guide to Cybersecurity Hiring emphasizes strategies for retention, highlighting the importance of developing a diverse and inclusive workplace, fostering continuous professional development, and creating an engaging work environment. This guide also delves into the crucial legal and ethical considerations in hiring to ensure compliance with regulations and ethical standards. For HR professionals, it serves as a vital tool to align recruitment with the specific needs of cybersecurity teams, thereby enhancing the integration of new hires. It provides insights into HR challenges for cybersecurity leaders and how to promote a collaborative approach to build a resilient cybersecurity workforce. The Comprehensive Guide to Cybersecurity Hiring is more than a book; it's a strategic asset for securing your organization's digital future by empowering you with the knowledge to attract, develop, and retain the right cybersecurity talent.
Разместил: Ingvar16 14-05-2024, 21:08 | Комментарии: 0 | Подробнее
Название: The Rise of the Algorithms: How YouTube and TikTok Conquered the World
Автор: John M. Jordan
Издательство: The Pennsylvania State University Press
Год: 2024
Страниц: 229
Язык: английский
Формат: pdf (true), epub
Размер: 25.2 MB

The meteoric rise of online video is reshaping the competition for human attention. The Rise of the Algorithms argues that this new technology has changed the way we interact with others, our relationships with public institutions, and our very own behaviors and psyches. In tracing the origins and evolution of online video, John M. Jordan examines the mechanics—and the ethical stakes—of online video platforms, especially YouTube and TikTok but also others, such as Twitch. Tracing the use of algorithms pioneered by Facebook and Google and so successfully exploited by TikTok’s corporate parent, ByteDance, Jordan shows how these platforms now engineer human behavior—with consequences for culture, politics, and identity. Jordan argues that we are at an inflection point. Until now we have proved, as a society, ill-prepared or unwilling to address such problems as the power of digital platforms, the personal cost of viral celebrity, the invasion of privacy, and the proliferation of disinformation. The Rise of the Algorithms combines this urgent assessment with a clear-eyed discussion of present challenges and recommendations for reclaiming our online futures. A valuable resource for understanding the transformations that have been and will be brought by YouTube, TikTok, and similar platforms, Jordan’s timely book is a vital work for anyone who uses the internet and especially for policy makers, technologists, communication and media specialists, and researchers who have a direct hand in determining the future of our online world.
Разместил: Ingvar16 14-05-2024, 17:02 | Комментарии: 0 | Подробнее
Название: Online Security Tricks and Tips - 18th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 108
Язык: английский
Формат: pdf
Размер: 45.0 MB

"Online Security Tricks and Tips" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Вы хотите улучшить свои пользовательские навыки? Вы хотите получить инсайдерские знания? Вы хотите учиться непосредственно у экспертов в этой области? На страницах нового руководства по безопасности в Интернете вы узнаете все, что вам нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как использовать свои устройства и получать от них максимальную отдачу. Мы можем сделать это, передавая свои навыки, выработанные десятилетиями, и предоставляя индивидуальную поддержку каждому из наших клиентов.
Разместил: Ingvar16 14-05-2024, 14:53 | Комментарии: 0 | Подробнее
Название: Adversary Emulation with MITRE ATT&CK: Bridging the Gap between the Red and Blue Teams
Автор: Drinor Selmanaj
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 402
Язык: английский
Формат: epub
Размер: 10.5 MB

By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. You'll learn to assess resilience against coordinated and stealthy threat actors capable of harming an organization. Author Drinor Selmanaj demonstrates adversary emulation for offensive operators and defenders using practical examples and exercises that actively model adversary behavior. Each emulation plan includes different hands-on scenarios, such as smash-and-grab or slow-and-deliberate. This book uses the MITRE ATT&CK knowledge base as a foundation to describe and categorize TTPs based on real-world observations, and provides a common language that's standardized and accessible to everyone. This book is primarily intended for practitioners responsible for enhancing cybersecurity. That said, it can also be a useful guide for a red/blue team, a pentester, an information security officer, or anyone who wants to strengthen their hands-on skills by emulating adversary behavior. Individuals interested in learning more about the MITRE ATT&CK framework and looking for additional learning material for various cybersecurity certifications will also find this book helpful. This book is not a beginner’s guide, so if you are new to the cybersecurity industry, I recommend that you start by reading up on operating systems, security, and the fundamentals of cybersecurity.
Разместил: Ingvar16 11-05-2024, 06:19 | Комментарии: 0 | Подробнее
Название: Google Workspace For Dummies
Автор: Paul McFedries
Издательство: For Dummies
Год: 2024
Страниц: 467
Язык: английский
Формат: pdf (true)
Размер: 24.6 MB

Easy advice for getting the most out of Google Workspace for school, work, or personal use. Google Workspace For Dummies is here to show you the tips and tricks for upping your productivity with Google's cloud-based software suite. This book includes jargon-free instructions on using Gmail, Calendar, Docs, Sheets, Drive, Chat, and Meet. You'll learn about the AI features, updated security, compatibility with other apps, picture-in-picture capability for video meetings, and beyond. Plus, you'll get info on Google's Forms and Notes feature that makes it simple to gather and share data and stay up-to-date with your team. It's easier than ever to collaborate securely in the cloud, thanks to this Dummies book. With so many apps in the Google Workspace package, and so many features and settings in each of those apps, you need some sort of guide that not only tells you what these tools and technologies are but also shows you how to get the most out of them so that you can get the most out of your (or your company’s) Google Workspace investment. Google Workspace For Dummies is a must for business users and workers who use Google applications on the job. Casual users and students, you'll love it, too.
Разместил: Ingvar16 10-05-2024, 19:52 | Комментарии: 0 | Подробнее
Название: Wireless Communications
Автор: Bin Tian
Издательство: China Science Publishing & Media Ltd./De Gruyter
Серия: Information and Computer Engineering
Год: 2024
Страниц: 258
Язык: английский
Формат: pdf (true), epub
Размер: 17.4 MB

This book presents the basic concepts, principles and technologies of wireless communication. The author focuses on the characteristics of the channel, the performance degradation, and various technologies to improve the performance of the wireless communication system. The upper technologies involved in building wireless performance are also discussed, and a prototype of the system is presented. Wireless communication is a dynamic and vibrant area in the communication industry in the past decades due to several factors. Firstly, there has been an explosive increase in demand for wireless access, driven by cellular system and wireless data applications. Secondly, the dramatic progress in signal processing algorithms and VLSI technology has enabled small-area and low-power implementation of sophisticated processing and coding techniques. Thirdly, the successful standardization of wireless systems, such as the second-generation (2G) standards (GSM and IS-95), the third-generation (3G) standards (WCDMA, CDMA2000, TD-SCDMA and WiMAX), the fourth-generation (4G) standards (TD-LTE), and fifth generation (5G) under development, provides a concrete demonstration that good idea from wireless communications can have a significant impact on life. People have devoted great enthusiasm to wireless communication technology. Wireless communication has great economic benefits. We believe that the way of writing this book is helpful for readers to understand wireless communication more quickly and simply.
Разместил: Ingvar16 9-05-2024, 16:33 | Комментарии: 0 | Подробнее
Название: Cloud Computing Tricks and Tips - 18th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 30.0 MB

Cloud Computing Tips and Tricks - это совершенное цифровое издание для тех, кто хочет поднять свои навыки на новый уровень. Вы хотите улучшить пользовательский опыт или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Вы хотите изучить приемы, используемые многими профессионалами? На страницах нового руководства для продвинутых пользователей вы узнаете все, что нужно знать, чтобы стать более уверенным, компетентным и опытным пользователем. Пользователи смогут получить максимальную отдачу от своего хранилища, а значит, и от самого облака. Это результат передачи навыков, которые мы вырабатывали десятилетиями, и предоставления индивидуальной поддержки каждому нашему клиенту.
Разместил: Ingvar16 7-05-2024, 18:15 | Комментарии: 0 | Подробнее
Название: Cloud Computing: Concepts, Technology, Security, and Architecture, Second Edition (Final)
Автор: Thomas Erl, Eric Barceló Monroy
Издательство: Pearson
Год: 2024
Страниц: 608
Язык: английский
Формат: epub
Размер: 35.3 MB

Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.
Разместил: Ingvar16 6-05-2024, 15:03 | Комментарии: 0 | Подробнее

« Назад.. 1 2 3 4 5 6 7 8 9 10 ... 458 Вперёд »




 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности