СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 112
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
/ Комментариев: 0/

Vehicular Communications for Smart Cars: Protocols, Applications and Security ConcernsНазвание: Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
Автор: Niaz Chowdhury, Lewis Mackenzie
Издательство: CRC Press
Год: 2022
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust, and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. A Vehicle to Vehicle (V2V) communication system can offer a wide range of powerful applications to improve the driving experience. The Internet of Things (IoT) is an outstanding evolution that enables communication between numerous devices through sensors, actuators, embedded systems, and various other technologies via the Internet.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
/ Комментариев: 0/

Название: Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Автор: Gunikhan Sonowal
Издательство: Apress
Год: 2022
Формат: true pdf/epub
Страниц: 230
Размер: 16.8 Mb
Язык: English

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2
/ Комментариев: 0/

Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2Название: Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2
Автор: Daniel Ventre
Издательство: Wiley, ISTE
Год: 2020
Страниц: 272
Язык: английский
Формат: epub
Размер: 10.2 MB

The aim of the book is to analyse and understand the impacts of Artificial Intelligence (AI) in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of Artificial Intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of Artificial Intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
/ Комментариев: 0/

Security and Privacy in the Internet of Things: Architectures, Techniques, and ApplicationsНазвание: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
Автор: Ali Ismail Awad, Jemal Abawajy
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 339
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Provides the authoritative and up-to-date information required for securing IoT architecture and applications. The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Kafka Up and Running for Network DevOps: Set Your Network Data in Motion
/ Комментариев: 0/

Название: Kafka Up and Running for Network DevOps: Set Your Network Data in Motion
Автор: Eric Chou
Издательство: Leanpub
Год: 2021
Формат: ePUB, PDF
Страниц: 153
Размер: 10 Mb
Язык: English

Today's network is about agility, automation, and continuous improvement. In Kafka Up and Running for Network DevOps, we will be on a journey to learn and set up the hugely popular Apache Kafka data messaging system. Kafka is unique in its principle to treat network data as a continuous flow of information that can adapt to the ever-changing business requirements. Whether you need a system to aggregate log messages, collect metrics, or something else, Kafka can be the reliable, highly redundant system you want.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition
/ Комментариев: 0/

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd EditionНазвание: Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition
Автор: Douglas H. Morais
Издательство: Springer
Год: 2022
Страниц: 337
Язык: английский
Формат: pdf (true), epub
Размер: 27.1 MB

This second edition is an update of the first publication. Material in the first edition addressed mainly the key physical layer technologies associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. It also expands upon some of the original material. Finally, to make the book more pedagogically applicable, problems have been added at the end of those chapters where the material lends itself to associated meaningful computational and/or descriptive problems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Stability Analysis of Neural Networks
/ Комментариев: 0/

Название: Stability Analysis of Neural Networks
Автор: Grienggrai Rajchakit, Praveen Agarwal, Sriraman Ramalingam
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 415
Размер: 10 Mb
Язык: English

This book discusses recent research on the stability of various neural networks with constrained signals. It investigates stability problems for delayed dynamical systems where the main purpose of the research is to reduce the conservativeness of the stability criteria. The book mainly focuses on the qualitative stability analysis of continuous-time as well as discrete-time neural networks with delays by presenting the theoretical development and real-life applications in these research areas. The discussed stability concept is in the sense of Lyapunov, and, naturally, the proof method is based on the Lyapunov stability theory. The present book will serve as a guide to enable the reader in pursuing the study of further topics in greater depth and is a valuable reference for young researcher and scientists.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cyber Forensics : Examining Emerging and Hybrid Technologies
/ Комментариев: 0/

Cyber Forensics : Examining Emerging and Hybrid TechnologiesНазвание: Cyber Forensics : Examining Emerging and Hybrid Technologies
Автор: Albert J. Marcella
Издательство: CRC Press
Год: 2021
Страниц: 382
Язык: английский
Формат: pdf (true)
Размер: 25.4 MB

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. Written by professionals responsible for routinely performing forensic investigations, presenting legal arguments and evidence in court, along with information security, privacy, and information technology (IT) audit professionals, this book examines the role which cyber forensics plays in such critical business areas as the Internet of Things (IoT); cloud computing; risk mitigation and management; fraud; operational technologies and Supervisory Control and Data Acquisition (SCADA) systems; mobile technologies; and emerging fields, such as unmanned aircraft systems and social network forensics.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
/ Комментариев: 0/

Название: Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
Автор: Gregory Falco and Eric Rosenbach
Издательство: Oxford University Press
Год: 2022
Формат: ePUB, PDF
Страниц: 225
Размер: 10 Mb
Язык: English

Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
5G Technology: 3GPP New Radio
/ Комментариев: 0/

5G Technology: 3GPP New RadioНазвание: 5G Technology: 3GPP New Radio
Автор: Harri Holma, Antti Toskala
Издательство: Wiley
Год: 2020
Страниц: 516
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

A comprehensive guide to 5G technology, applications and potential for the future. 5G brings new technology solutions to the 5G mobile networks including new spectrum options, new antenna structures, new physical layer and protocols designs and new network architectures. 5G Technology: 3GPP New Radio is a comprehensive resource that offers explanations of 5G specifications, performance evaluations, aspects of device design, practical deployment considerations and illustrative examples from field experiences.