СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 123
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide (Final)
/ Комментариев: 0/

CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide (Final)Название: CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide
Автор: Jason Ball, Thomas Arneson
Издательство: Cisco Press
Год: 2022
Страниц: 592
Язык: английский
Формат: epub
Размер: 10.1 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. CCNP Collaboration Cloud and Edge Solutions CLCEI 300-820 Official Cert Guide presents you with an organized test-preparation routine using proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and enable you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Where Attackers Infiltrate Your Network and How to Beat Them
/ Комментариев: 0/

Название: Where Attackers Infiltrate Your Network and How to Beat Them
Автор: David Wolpoff, Keegan Henckel-Miller
Издательство: Randori
Год: 2021
Формат: PDF
Размер: 12 Мб
Язык: английский / English

As someone regularly hired to hack Fortune 500 companies, I’ve gone up against many different types of organizations — some are adept at stopping me and making my life harder, others leave the door wide open. What I’ve found is that the most challenging organizations to break into are the ones anticipating my every move. They have experience protecting what matters most. I wrote this book to take you through the attacker’s kill chain step-by-step, as seen and performed by an actual attacker. The goal isn’t to scare you into buying a new security product — there is plenty of that already. I want organizations to understand the attacker’s perspective — a hacker’s logic used to break into organizations. Because once you see your environment the way a hacker does, your security strategy will change. You’ll prioritize like an attacker does, and figure out how to protect what matters most.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, 2nd Edition
/ Комментариев: 0/

Название: Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin
Автор: Paul C. van Oorschot
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 464
Размер: 10 Mb
Язык: English

Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Machine Learning for Cloud Management
/ Комментариев: 0/

Machine Learning for Cloud ManagementНазвание: Machine Learning for Cloud Management
Автор: Jitendra Kumar, Ashutosh Kumar Singh, Anand Mohan
Издательство: CRC Press
Год: 2022
Страниц: 199
Язык: английский
Формат: pdf (true)
Размер: 28.9 MB

Cloud computing offers subscription-based on-demand services, and it has emerged as the backbone of the computing industry. It has enabled us to share resources among multiple users through virtualization, which creates a virtual instance of a computer system running in an abstracted hardware layer. Unlike early distributed computing models, it offers virtually limitless computing resources through its large scale cloud data centers. It has gained wide popularity over the past few years, with an ever-increasing infrastructure, a number of users, and the amount of hosted data. The large and complex workloads hosted on these data centers introduce many challenges, including resource utilization, power consumption, scalability, and operational cost. Therefore, an effective resource management scheme is essential to achieve operational efficiency with improved elasticity. Machine learning enabled solutions are the best fit to address these issues as they can analyze and learn from the data.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments
/ Комментариев: 0/

Название: Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments
Автор: Ric Messier
Издательство: McGraw-Hill Education
Год: 2020
Формат: true pdf, epub
Страниц: 320
Размер: 29 Mb, 24.3 Mb
Язык: English

Manage your own robust, inexpensive cybersecurity testing environment
This hands-on guide shows clearly how to administer an effective cybersecurity testing lab using affordable technologies and cloud resources. Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments fully explains multiple techniques for developing lab systems, including the use of Infrastructure-as-Code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Written by a seasoned IT security professional and academic, this book offers complete coverage of cloud and virtual environments as well as physical networks and automation. Included with the book is access to videos that demystify difficult concepts.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Computer Networking: A Top-Down Approach, Global Edition, 8th Edition
/ Комментариев: 0/

Название: Computer Networking: A Top-Down Approach, Global Edition, 8th Edition
Автор: James F. Kurose, Keith W. Ross
Издательство: Pearson
Год: 2022
Формат: PDF
Страниц: 797
Размер: 59 Mb
Язык: English

A top-down,layered approach to computer networking.
Unique among computernetworking texts, the 8th Edition, Global Edition, of thepopular Computer Networking: A Top Down Approach buildson the authors’ long tradition of teaching this complex subject through alayered approach in a “top-down manner.” The text works its way from theapplication layer down toward the physical layer, motivating students byexposing them to important concepts early in their study of networking.Focusing on the Internet and the fundamentally important issues of networking,this text provides an excellent foundation for students in computer science andelectrical engineering, without requiring extensive knowledge of programming ormathematics.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain in Telecom: An Insight into the Potential Benefits of Combining Blockchain, 5G, IoT, Cloud Computing, and AI/ML in the Telecom Business
/ Комментариев: 0/

Blockchain in Telecom: An Insight into the Potential Benefits of Combining Blockchain, 5G, IoT, Cloud Computing, and AI/ML in the Telecom BusinessНазвание: Blockchain in Telecom: An Insight into the Potential Benefits of Combining Blockchain, 5G, IoT, Cloud Computing, and AI/ML in the Telecom Business
Автор: Shibaji Sankar Biswas
Издательство: BPB Publications
Год: 2022
Страниц: 250
Язык: английский
Формат: pdf, epub
Размер: 10.28 MB

Exploring the future of the Telecom industry with the power of Blockchain technology. ‘Blockchain in Telecom’ delves deeper into the Blockchain architecture and its potential benefits of implementation in the telecommunications industry. This book also provides an overview of how blockchain supports 5G, IoT, Cloud, and AI/ML in telecom businesses. Readers will benefit from reading the chapters as they establish plans for integrating Blockchain technology into the telecoms industry alongside other new technologies such as 5G and IoT, as well as AI/ML, cloud computing, and edge computing. Additionally, this book will help them in managing implementation plans through risk mitigation for implementation and migration.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions
/ Комментариев: 0/

Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New DirectionsНазвание: Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions
Автор: Ahmed A. Abd El-Latif, Bassem Abd-El-Atty
Издательство: Springer
Год: 2022
Страниц: 283
Язык: английский
Формат: pdf (true), epub
Размер: 40.7 MB

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many others. Moreover, it proposes new models, practical solutions and technological advances related to transmitted data in 5G networks with IoT, cloud computing, and other applications in Smart Cities. Finally, it highlights and discusses the techniques and security challenges of data processing in IoT and 5G networks.




Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cloud Computing: Master the Concepts, Architecture and Applications with Real-world examples and Case studies
/ Комментариев: 0/

Cloud Computing: Master the Concepts, Architecture and Applications with Real-world examples and Case studiesНазвание: Cloud Computing: Master the Concepts, Architecture and Applications with Real-world examples and Case studies
Автор: Kamal Kant Hiran, Ruchi Doshi, Temitayo Fagbola
Издательство: BPB Publications
Год: 2019
Страниц: 330
Язык: английский
Формат: True (PDF,EPUB)
Размер: 35.3 MB

This book begins with the fundamentals of cloud computing, its service and deployment models, architecture, as well as application. This book begins with the fundamentals of cloud computing, its service and deployment models, architecture, as well as applications and platforms. It presents some key enterprise strategies and models for the adoption of and migration to cloud. Privacy and security issues and challenges also form a major part of our discussion in the book as well as case studies of cloud computing adoption in India. The book concludes with a discussion of several advanced topics, such as Amazon Web Services (AWS), Open Nebulla, Microsoft Azure, Apache Hadoop and Google App Engine (GAE).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0
/ Комментариев: 0/

Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0Название: Internet of Things and M2M Communication Technologies: Architecture and Practical Design Approach to IoT in Industry 4.0
Автор: Veena S. Chakravarthi
Издательство: Springer
Год: 2021
Страниц: 303
Язык: английский
Формат: pdf (true), epub
Размер: 52.9 MB

This book provides readers with a 360-degree perspective on the Internet of Things (IoT) design and M2M communication process. It is intended to be used as a design guide for the development of IoT solutions, covering architecture, design, and development methods. This book examines applications such as industry automation for Industry 4.0, Internet of Medical Things (IoMT), and Internet of Services (IoS) as it is unfolding. Discussions on engineering fundamentals are limited to what is required for the realization of IoT solutions.