networks

  1. New Age Cyber Threat Mitigation for Cloud Computing Networks

    Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate...
  2. Wireless Networks, IoT, and Mobile Devices Hacking

    Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also...
  3. Enterprise Penetration Testing

    Overview Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance...
  4. Lanham Micheal - Evolutionary Deep Learning. Genetic algorithms and neural networks

    Lanham Micheal - Evolutionary Deep Learning. Genetic algorithms and neural networks Discover one-of-a-kind AI strategies never before seen outside of academic papers! Learn how the principles of evolutionary computation overcome deep learning’s common pitfalls and deliver adaptable model...
  5. A Fresh Concept of Software-resemblant Hardware to Leap to 6G and Future Networks: Micro/Nanotechnologies as Enablers of Pervasivity

    A Fresh Concept of Software-resemblant Hardware to Leap to 6G and Future Networks: Micro/Nanotechnologies as Enablers of Pervasivity For a decade, with the uptake of 4G, we have become accustomed to the relentless increase in data and services on the move. The deployment of 5G is advancing...
  6. Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU]

    Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation / Attacking networks at the protocol level [RU] This book is about network protocol security. James Forshaw, a world-renowned bug bounty expert, looks at the network from an attacker's perspective to help...
  7. Network Science with Python: Explore the networks around us using network science, social network analysis, and machine learnin

    Create networks using data points and information Learn to visualize and analyze networks to better understand communities Explore the use of network data in both - supervised and unsupervised machine learning projects Book Description Network analysis is often taught with tiny or toy data sets...
  8. Blocking messengers/social networks from Mossad Agent

    "Mossad Agent" - provides services to search for information about a person based on minimal initial data and digital footprints. We work with professionals who have access to official sources and contacts in various structures, which allows us to ensure high speed and accuracy of results. We...
  9. A Fresh Concept of Software -resemblant Hardware to Leap to 6G and Future Networks

    For a decade, with the uptake of 4G, we have become accustomed to the relentless increase in data and services on the move. The deployment of 5G is advancing crucial key performance indicators (KPIs), along with quality of service (QoS). Setting the horizon to 2030 and later, 6G will take the...
  10. Wireless Multimedia Sensor Networks on Reconfigurable Hardware

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors...
  11. Ultimate Neural Network Programming with Python: Create Powerful Modern AI Systems by Harnessing Neural Networks with Python, Keras, and TensorFlow

    Master neural networks to build modern artificial intelligence systems. Book Description This book is a practical guide to the world of artificial intelligence (AI), covering the mathematics and principles behind applications such as Google Maps and Amazon. The book begins with an introduction...
  12. Python Deep Learning: Understand how deep neural networks work and apply them to real-world tasks

    Master effective navigation of neural networks, including convolutions and transformers, to tackle computer vision and NLP tasks using Python Key Features Understand the theory, mathematical foundations and the structure of deep neural networks Become familiar with transformers, large language...
  13. Ethical Hacking - Scanning Networks

    Hidden content
  14. Ethical Hacking - Hacking Wireless Networks

    Hidden content
  15. Wifi Hacking Series For Red Teamers & Pentesters

    Wireless Penetration Testing Pentesting of the wireless systems is easier task than doing that on the wired network. You cannot really apply good physical security measures against a wireless medium, if you are located close enough, you are able to “hear” (or at least your wireless adapter is...
  16. Ethical Hacking-Hacking Wireless Networks

    Hidden content