Видавець: 16

34057
Завантаження...
EЛЕКТРОННА КНИГА

Network Security and Cryptography. A Comprehensive Guide to Network Protection and Encryption Techniques

Mercury Learning and Information, Sarhan M. Musa

This new edition introduces fundamental concepts in computer networks, blockchain, cryptography, and network security. It covers classical cipher schemes, public key cryptography, authentication schemes, and Internet security, featuring new material on IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and AI security.Starting with computer network basics and mathematical foundations, it then explores classical and modern cipher schemes, public-key cryptography, and authentication methods. Later chapters address Internet and system security, and emerging technologies.Intended as a textbook for computer science and electronics courses, it also serves as a comprehensive reference for professionals. Its structured approach ensures a thorough understanding of both foundational and advanced topics, making it essential for mastering cryptography and network security.

34058
Завантаження...
EЛЕКТРОННА КНИГА

Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats

Aditya Mukherjee

With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.You’ll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security.By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.

34059
Завантаження...
EЛЕКТРОННА КНИГА

Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls

Manuj Aggarwal

While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or ‘shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the world's most trusted open source network security solution.Network Security with pfSense begins with an introduction to pfSense, where you will gain an understanding of what pfSense is, its key features, and advantages. Next, you will learn how to configure pfSense as a firewall and create and manage firewall rules. As you make your way through the chapters, you will test pfSense for failover and load balancing across multiple wide area network (WAN) connections. You will then configure pfSense with OpenVPN for secure remote connectivity and implement IPsec VPN tunnels with pfSense. In the concluding chapters, you’ll understand how to configure and integrate pfSense as a Squid proxy server.By the end of this book, you will be able to leverage the power of pfSense to build a secure network.

34060
Завантаження...
EЛЕКТРОННА КНИГА

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure

Sagar Rahalkar

The tech world has been taken over by digitization to a very large extent, and so it’s become extremely important for an organization to actively design security mechanisms for their network infrastructures. Analyzing vulnerabilities can be one of the best ways to secure your network infrastructure.Network Vulnerability Assessment starts with network security assessment concepts, workflows, and architectures. Then, you will use open source tools to perform both active and passive network scanning. As you make your way through the chapters, you will use these scanning results to analyze and design a threat model for network security. In the concluding chapters, you will dig deeper into concepts such as IP network analysis, Microsoft Services, and mail services. You will also get to grips with various security best practices, which will help you build your network security mechanism.By the end of this book, you will be in a position to build a security framework fit for an organization.

34061
Завантаження...
EЛЕКТРОННА КНИГА

Networking Fundamentals. Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366

Gordon Davies

A network is a collection of computers, servers, mobile devices, or other computing devices connected for sharing data. This book will help you become well versed in basic networking concepts and prepare to pass Microsoft's MTA Networking Fundamentals Exam 98-366.Following Microsoft's official syllabus, the book starts by covering network infrastructures to help you differentiate intranets, internets, and extranets, and learn about network topologies. You’ll then get up to date with common network hardware devices such as routers and switches and the media types used to connect them together. As you advance, the book will take you through different protocols and services and the requirements to follow a standardized approach to networking. You’ll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. Finally, you’ll be able to practice everything you’ve learned and take the exam confidently with the help of mock tests. By the end of this networking book, you’ll have developed a strong foundation in the essential networking concepts needed to pass Exam 98-366.

34062
Завантаження...
EЛЕКТРОННА КНИГА

Neural Network Programming with Tensorflow. Unleash the power of TensorFlow to train efficient neural networks

Manpreet Singh Ghotra, Rajdeep Dua

If you're aware of the buzz surrounding the terms such as machine learning, artificial intelligence, or deep learning, you might know what neural networks are. Ever wondered how they help in solving complex computational problem efficiently, or how to train efficient neural networks? This book will teach you just that.You will start by getting a quick overview of the popular TensorFlow library and how it is used to train different neural networks. You will get a thorough understanding of the fundamentals and basic math for neural networks and why TensorFlow is a popular choice Then, you will proceed to implement a simple feed forward neural network. Next you will master optimization techniques and algorithms for neural networks using TensorFlow. Further, you will learn to implement some more complex types of neural networks such as convolutional neural networks, recurrent neural networks, and Deep Belief Networks. In the course of the book, you will be working on real-world datasets to get a hands-on understanding of neural network programming. You will also get to train generative models and will learn the applications of autoencoders.By the end of this book, you will have a fair understanding of how you can leverage the power of TensorFlow to train neural networks of varying complexities, without any hassle. While you are learning about various neural network implementations you will learn the underlying mathematics and linear algebra and how they map to the appropriate TensorFlow constructs.

34063
Завантаження...
EЛЕКТРОННА КНИГА

Neural Network Projects with Python. The ultimate guide to using Python to explore the true power of neural networks through six projects

James Loy

Neural networks are at the core of recent AI advances, providing some of the best resolutions to many real-world problems, including image recognition, medical diagnosis, text analysis, and more. This book goes through some basic neural network and deep learning concepts, as well as some popular libraries in Python for implementing them.It contains practical demonstrations of neural networks in domains such as fare prediction, image classification, sentiment analysis, and more. In each case, the book provides a problem statement, the specific neural network architecture required to tackle that problem, the reasoning behind the algorithm used, and the associated Python code to implement the solution from scratch. In the process, you will gain hands-on experience with using popular Python libraries such as Keras to build and train your own neural networks from scratch.By the end of this book, you will have mastered the different neural network architectures and created cutting-edge AI projects in Python that will immediately strengthen your machine learning portfolio.

34064
Завантаження...
EЛЕКТРОННА КНИГА

Neural Networks with Keras Cookbook. Over 70 recipes leveraging deep learning techniques across image, text, audio, and game bots

V Kishore Ayyadevara

This book will take you from the basics of neural networks to advanced implementations of architectures using a recipe-based approach.We will learn about how neural networks work and the impact of various hyper parameters on a network's accuracy along with leveraging neural networks for structured and unstructured data.Later, we will learn how to classify and detect objects in images. We will also learn to use transfer learning for multiple applications, including a self-driving car using Convolutional Neural Networks.We will generate images while leveraging GANs and also by performing image encoding. Additionally, we will perform text analysis using word vector based techniques. Later, we will use Recurrent Neural Networks and LSTM to implement chatbot and Machine Translation systems.Finally, you will learn about transcribing images, audio, and generating captions and also use Deep Q-learning to build an agent that plays Space Invaders game.By the end of this book, you will have developed the skills to choose and customize multiple neural network architectures for various deep learning problems you might encounter.