ТОП просматриваемых книг сайта:
Компьютеры: прочее
Различные книги в жанре Компьютеры: прочее, доступные для чтения и скачиванияCybersecurity. Managing Systems, Conducting Testing, and Investigating Intrusions - Thomas Mowbray J.
Аннотация
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skills Dives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations Delves into network administration for Windows, Linux, and VMware Examines penetration testing, cyber investigations, firewall configuration, and security tool customization Shares techniques for cybersecurity testing, planning, and reporting Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions is a comprehensive and authoritative look at the critical topic of cybersecurity from start to finish.
Аннотация
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication of millions of phones, computers and, more recently, tablets to be connected, millions of access points and base station antennas have been extensively deployed. Small cells and the Internet of Things with the billions of connected objects will reinforce this trend. This growing use of wireless communications has been accompanied by a perception of risk to the public from exposure to radio frequency (RF) electromagnetic field (EMF). To address this concern, biomedical research has been conducted. It has also been important to develop and improve dosimetry methods and protocols that could be used to evaluate EMF exposure and check compliance with health limits. To achieve this, much effort has was made in the 1990s and 2000s. Experimental and numerical methods, including statistical methods, have been developed. This book provides an overview and description of the basic and advanced methods that have been developed for human RF exposure assessment. It covers experimental, numerical, deterministic and stochastic methods.
Аннотация
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Usability von Produkten und Anleitungen im digitalen Zeitalter. Handbuch für Entwickler, IT-Spezialisten und technische Redakteure - Gertrud Grünwied
Аннотация
Technische Produkte konnen nur erfolgreich sein, wenn die Gebrauchstauglichkeit, die Usability, fruhzeitig im Entwicklungsprozess geplant und in allen Produktphasen verankert wird. Dies betrifft smarte Gerate, Softwareprodukte, Webanwendungen und Apps genauso wie komplexe und umfangreich dokumentierte Maschinen, Fahrzeuge und Systeme. In ihrem Buch vermittelt Gertrud Grunwied eine ganzheitliche Sicht auf intuitiv bedienbare Produkte und deren Anleitungen. Sie bietet das relevante Know-how zu User-Centered Design und eine Ubersicht zur Auswahl von Usability-Methoden. Usability-Ma?nahmen beschreibt sie schrittweise von der Planung, der Durchfuhrung und Auswertung bis zur Optimierung von Produkt und Anleitung. Der Praxisteil prasentiert Fallstudien fur Anleitungen mit und ohne Produkt sowie fur eine Dienste-App im Internet, au?erdem eine Betrachtung zu Kosten, Nutzen und Implementierungszeitpunkt von Usability-Methoden. Die dargestellten Usability-Ma?nahmen erstrecken sich nicht nur auf das technische Produkt selbst, sondern auch auf die Nutzungssituation und die smarte Benutzerinformation, zum Beispiel das Nachschlagen in der Bedienungsanleitung zur Fehlerbehebung, Dokumentations-Apps zum Kennenlernen von Systemfunktionen oder das Uben und Lernen anhand einer Produktsimulation per Video-Tutorial oder Animation. Damit richtet sich das Buch an alle Mitarbeiter produzierender Unternehmen und ihrer Dienstleister, die an Usability-Aspekten beteiligt sind – Produktmanager, Entwickler, IT-Spezialisten, Designer, Technische Redakteure und Mitarbeiter in Schulung und Service, aber auch an Studierende der Informatik und Ingenieurwissenschaften einschlie?lich Technischer Redaktion und Kommunikation. Inhalt: Anforderungen an Usability von Produkten und Anleitungen «4.0» – Prozesse und Planung – Nutzer- und Nutzungsforschung – Gestaltung – Evaluation – Anwenden der Methoden und ihre Wirtschaftlichkeit – Fallstudien – Software-Tools und Normen
Аннотация
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices. Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policy Discuss the process by which cyber security policy goals are set Educate the reader on decision-making processes related to cyber security Describe a new framework and taxonomy for explaining cyber security policy issues Show how the U.S. government is dealing with cyber security policy issues With a glossary that puts cyber security language in layman's terms—and diagrams that help explain complex topics—Cyber Security Policy Guidebook gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.
Аннотация
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic «orange book» view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
Аннотация
Vehicle dynamics and stability have been of considerable interest for a number of years. The obvious dilemma is that people naturally desire to drive faster and faster yet expect their vehicles to be “infinitely” stable and safe during all normal and emergency maneuvers. For the most part, people pay little attention to the limited handling potential of their vehicles until some unusual behavior is observed that often results in accidents and even fatalities. This book presents several model-based estimation methods which involve information from current potential-integrable sensors. Improving vehicle control and stabilization is possible when vehicle dynamic variables are known. The fundamental problem is that some essential variables related to tire/road friction are difficult to measure because of technical and economical reasons. Therefore, these data must be estimated. It is against this background, that this book’s objective is to develop estimators in order to estimate the vehicle’s load transfer, the sideslip angle, and the vertical and lateral tire/road forces using a roll model. The proposed estimation processes are based on the state observer (Kalman filtering) theory and the dynamic response of a vehicle instrumented with standard sensors. These estimators are able to work in real time in normal and critical driving situations. Performances are tested using an experimental car in real driving situations. This is exactly the focus of this book, providing students, technicians and engineers from the automobile field with a theoretical basis and some practical algorithms useful for estimating vehicle dynamics in real-time during vehicle motion.
Аннотация
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: • Explains fundamentals of public key cryptography • Offers numerous examples and exercises • Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam • Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
Аннотация
Рассмотрены мировоззренческие основы технологической сингулярности и транспостгуманизма. Приведены примеры конкретных областей приложения диалектической методологии в качестве матрицы научного поиска инновационных технологий.Для широкого круга читателей.