Автор: Radivilova Tamara, Ageyev Dmytro, Kryvinska Natalia Название: Data-Centric Business and Applications: Ict Systems-Theory, Radio-Electronics, Information Technologies and Cybersecurity (Volume 5) ISBN: 3030430693 ISBN-13(EAN): 9783030430696 Издательство: Springer Рейтинг: Цена: 139750.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Automated Subjective Assessment of Speech Intelligibility under Diotic and Dichotic Listening.- Different Approaches to Studying the Extreme Properties of Signal Functions Synthesized with Splines.- Adaptive Complex Singular Spectrum Analysis with Application to Modern Superresolution Methods.- Practical Application of Clustering Methods in Radar Signals Recognition System.- Optimization of the Quality of Information Support for Consumers of Cooperative Surveillance Systems.- Adaptive Semantic Analysis of Radar Data Using Fuzzy Transform.- Approaches to Building a Chaotic Communication System.- Implementation of Evolutionary Methods of Solving the Travelling Salesman Problem in a Robotic Warehouse.- Study of Approaches to the Management of the Production of Entomophages.- Information Technologies for Analysis and Modeling of Computer Network s Development.- The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments.- Fusion the Coordinate Data of Airborne Objects in the Networks of Surveillance Radar Observation Systems.- Analysis of Influence of Network Architecture Nonuniformity and Traffic Self-similarity Properties to Load Balancing and Average End-to-End Delay.
Автор: Robinson E. Pino; Alexander Kott; Michael Shevenel Название: Cybersecurity Systems for Human Cognition Augmentation ISBN: 3319352229 ISBN-13(EAN): 9783319352220 Издательство: Springer Рейтинг: Цена: 102480.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience.
Автор: Denise Nicholson Название: Advances in Human Factors in Cybersecurity ISBN: 3319605844 ISBN-13(EAN): 9783319605845 Издательство: Springer Рейтинг: Цена: 186330.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book reports on the latest research and developments in the field of cybersecurity, placing special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, as well as innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures.
Автор: Nicholson Название: Advances in Human Factors in Cybersecurity ISBN: 3319419315 ISBN-13(EAN): 9783319419312 Издательство: Springer Рейтинг: Цена: 174150.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book reports on the latest research and developments in the field of cybersecurity, giving a special emphasis on personal security and new methods for reducing human error and increasing cyber awareness, and innovative solutions for increasing the security of advanced Information Technology (IT) infrastructures. It covers a wealth of topics, including methods for human training, novel Cyber-Physical and Process-Control Systems, social, economic and behavioral aspects of the cyberspace, issues concerning the cyber security index, security metrics for enterprises, risk evaluation, and many others. Based on the AHFE 2016 International Conference on Human Factors in Cybersecurity, held on July 27-31, 2016, in Walt Disney World®, Florida, USA, this book not only presents innovative cybersecurity technologies, but also discusses emerging threats, current gaps in the available systems and future challenges that may be coped with through the help of human factors research.
Автор: Halder Soma, Ozdemir Sinan Название: Hands-On Machine Learning for Cybersecurity ISBN: 1788992288 ISBN-13(EAN): 9781788992282 Издательство: Неизвестно Рейтинг: Цена: 60070.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
Автор: Choo Kim-Kwang Raymond, Dehghantanha Ali, Parizi Reza M. Название: Blockchain Cybersecurity, Trust and Privacy ISBN: 3030381803 ISBN-13(EAN): 9783030381806 Издательство: Springer Рейтинг: Цена: 158380.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Chapter 1- Blockchain in Cybersecurity Realm: An Overview.- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT.- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain.- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications.- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus.- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning.- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis.- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security.- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography.- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain.- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms.- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
Автор: Sikos Leslie F., Choo Kim-Kwang Raymond Название: Data Science in Cybersecurity and Cyberthreat Intelligence ISBN: 3030387879 ISBN-13(EAN): 9783030387877 Издательство: Springer Рейтинг: Цена: 167700.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The Formal Representation of Cyberthreats for Automated Reasoning.- A Logic Programming Approach to Predict Enterprise-Targeted Cyberattacks.- Discovering Malicious URLs Using Machine Learning Techniques.- Machine Learning and Big Data Processing for Cybersecurity Data Analysis.- Systematic Analysis of Security Implementation for Internet of Health Things in Mobile Health Networks.- Seven Pitfalls of Using Data Science in Cybersecurity.
If you are a student or a professional looking for more tech knowledge and skills, or if you are simply curious about the fascinating world of computer networking and its powerful applications in our everyday life, then this is the book for you
In Computer Networking for Beginners Jason Callaway has condensed all the knowledge you need to pass your next exam or take a professional certification in a simple and clear way: starting from the basics, you will learn both the theoretical and the practical elements of networking, becoming proficient with network technology, regardless of your previous experience.
Learning how computers connect is not necessarily intended only for professionals.
Wireless technology is all around us when we surf the web, use social networks or chat with friends and colleagues, we instantaneously send millions of information from one device to another. Anyone should be more aware of how this world works, especially in order to understand and avoid the potential negative impacts on our work and our privacy of the several security issues that could unexpectedly come out.
Here is a tiny fraction of what you will find:
A complete explanation of the different network systems and their components
The OSI reference model
Computer Network Communication systems and their applications
Internet, Ethernet, and wireless technology
How a router works
The precise definition of IP address, with step-by-step instructions to configure it
All the secrets to the little-known process of IP subnetting
How to configure a VLAN
An introduction to Cisco System and the CCNA certification
Computer networks' vulnerabilities and the basics of cybersecurity
Machine learning techniques
As you can easily understand, unlike all the other guides on the same topic that give you just the basics to get started, here the author has left nothing out.
Becoming a professional networking engineer is now easier than ever
Are you interested in finding new and effective ways to keep your system safe and secure?Do you want to make sure you are not going to be attacked online, and that you won't have to worry about your personal or financial information getting into the wrong hands?
Are you worried about some of the attacks and the headlines going around right now concerning data breaches and hackers, and you want to make sure you stay safe and secure?
The Kali Linux operating system is one of the best options to work with when you are ready to try out some hacking in an ethical and safe manner.
Using some of the same techniques that many hackers are going to rely on, you can learn some of the different methods they are going to use, and figure out where your potential vulnerabilities are right from the start. When you know where these vulnerabilities are, it is so much easier to fix them and keep your network as safe as possible.
Inside this guidebook, we are going to spend some time taking a look at the Kali Linux system and how we are able to use it to help with protecting our systems. From learning how to work with a VPN to completing our own penetration test and network scan, this system is going to help keep you as safe and secure as possible. Some of the different topics we will explore to help out with this goal include:
-History of Kali Linux and some of the benefits of working with this operating system.
-Some of the basics and the commands you need to use in order to get started with this language.
-How to download and install the Kali Linux operating system.
-The importance of working on your cybersecurity and keeping your system safe.
-How to handle your own penetration testing to make sure your computer system is safe and to figure out where we can fix some vulnerabilities
-The different types of hackers we need to be aware of and how they all work differently from one another.
-The different types of attacks that can happen when we are going to work with a hacker and that we need to be prepared for.
-Some of the steps you are able to take in order to keep your system safe and secure from others.
Protecting your system and your computer safe from hackers can be important in ensuring your personal information is going to stay as safe and secure as possible. When you are ready to learn how to use the Kali Linux operating system, to make this happen, make sure to check out this guidebook to help you get started.