СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 137
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cloud Native Security
/ Комментариев: 0/

Cloud Native SecurityНазвание: Cloud Native Security
Автор: Chris Binnie, Rory McCune
Издательство: Wiley
Год: 2021
Страниц: 334
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB, 10.1 MB

Explore the latest and most comprehensive guide to securing your Cloud Native technology stack. Cloud Native Security delivers a detailed study into minimizing the attack surfaces found on today’s Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates. The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches
/ Комментариев: 0/

Название: Researching Cybercrimes: Methodologies, Ethics, and Critical Approaches
Автор: Anita Lavorgna, Thomas J. Holt
Издательство: Palgrave Macmillan
Год: 2021
Формат: PDF, ePUB
Страниц: 548
Размер: 11 Mb
Язык: English

This edited book promotes and facilitates cybercrime research by providing a cutting-edge collection of perspectives on the critical usage of online data across platforms, as well as the implementation of both traditional and innovative analysis methods. The accessibility, variety and wealth of data available online presents substantial opportunities for researchers from different disciplines to study cybercrimes and, more generally, human behavior in cyberspace. The unique and dynamic characteristics of cyberspace often demand cross-disciplinary and cross-national research endeavors, but disciplinary, cultural and legal differences can hinder the ability of researchers to collaborate.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Assessing and Insuring Cybersecurity Risk
/ Комментариев: 0/

Название: Assessing and Insuring Cybersecurity Risk
Автор: Ravi Das
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 167
Размер: 10 Mb
Язык: English

Remote workforces using VPNs, Cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company’s level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much level of uncertainty an organization can tolerate before the uncertainty starts to negatively affect mission critical flows and business processes.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Network Design with Applications to Transportation and Logistics
/ Комментариев: 0/


Название: Network Design with Applications to Transportation and Logistics
Автор: Crainic T.G., Gendreau M., Gendron B. (Eds.)
Издательство: Springer
Год: 2021
Формат: pdf
Страниц: 668
Размер: 10 mb
Язык: english

This book explores the methodological and application developments of network design in transportation and logistics. It identifies trends, challenges and research perspectives in network design for these areas. Network design is a major class of problems in operations research where network flow, combinatorial and mixed integer optimization meet. The analysis and planning of transportation and logistics systems continues to be one of the most important application areas of operations research. Networks provide the natural way of depicting such systems, so the optimal design and operation of networks is the main methodological area of operations research that is used for the analysis and planning of these systems. This book defines the current state of the art in the general area of network design, and then turns to its applications to transportation and logistics. New research challenges are addressed.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Foundations of Blockchain: Theory and Applications (SpringerBriefs in Computer Science)
/ Комментариев: 0/

Foundations of Blockchain: Theory and Applications (SpringerBriefs in Computer Science)Название: Foundations of Blockchain: Theory and Applications
Автор: Ahmed Imteaj, M. Hadi Amini, Panos M. Pardalos
Издательство: Springer
Год: 2021
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

This book provides a comprehensive analysis of fundamental topics related to blockchain. Throughout, the authors explore different vital issues and specific areas of blockchain. For convenience, the authors present the elementary description, visualize the working procedure of blockchain paradigm, and highlight the areas it can be applied in real life. They explain the blockchain process from a diverse perspective i.e. distributed Internet of Things (IoT), interdependent networks, intelligent mining, etc. They also analyze the interconnection of a blockchain network and such novel research areas to show a pathway towards a new research direction. This book also holds the core challenges and open research issues of blockchain technology, considering existing applications. Chapters include consensus mechanisms of blockchain, blockchain applicability in centralized and decentralized internet of things, blockchain interoperability from the perspective of interdependent networks, and blockchain for resource-constrained devices.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Как найти и скачать всё, что хочешь в Интернете
/ Комментариев: 0/

Как найти и скачать всё, что хочешь в Интернете
Название: Как найти и скачать всё, что хочешь в Интернете
Автор: Матвиенко Ю.В.
Издательство: Триумф
Год: 2012
Формат: pdf
ISBN: 978-5-93673-179-2
Размер: 14,22 мб
Качество: хорошее
Язык: русский

Эта книга рассказывает о простых приемах, облегчающих поиск нужной информации, - оказывается, что знание некоторых приемов многократно сокращает поиск.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Microsoft Certified Azure Fundamentals All-in-One Exam Guide (Exam AZ-900)
/ Комментариев: 0/

Microsoft Certified Azure Fundamentals All-in-One Exam Guide (Exam AZ-900)Название: Microsoft Certified Azure Fundamentals All-in-One Exam Guide (Exam AZ-900)
Автор: Jack Hyman
Издательство: McGraw-Hill Education
Год: 2021
Страниц: 304
Язык: английский
Формат: epub
Размер: 12.7 MB

A highly effective, integrated self-study system for the Microsoft Azure Fundamentals exam. Prepare for the current version of the Microsoft Azure Fundamentals exam using the detailed information contained in this test preparation guide. Written by a cloud computing expert and experienced author, the book contains accurate practice questions, step-by-step exercises, and special elements that aid in learning and reinforce retention. Microsoft Certified Azure Fundamentals All-in-One Exam Guide (Exam AZ-900) features in-depth coverage of every topic on the challenging exam. You will explore core Azure services, security, compliance, and trust. Fulfilling the promise of the All-in-One series, the guide serves as both a test preparation tool and an on-the-job reference for risk and compliance professionals.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Wiley 5G REF: Security
/ Комментариев: 0/

Название: The Wiley 5G REF: Security
Автор: Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios
Издательство: Wiley
Год: 2021
Формат: EPUB
Размер: 24 Мб
Язык: английский / English

The Wiley 5G Ref: Security offers a stellar collection of articles selected from the online-only Work, The Wiley 5G Reference. It aims to provide a solid educational foundation for researchers and practitioners in the field of 5G Security and Privacy to expand their knowledge base by including the latest developments in these disciplines. The book introduces the security landscape of 5G, and significant security and privacy risks associated with the 5G networks. Then, the security solutions for different segments of the 5G network, i.e., radio network, edge network, access network, and core network, are discussed. Since 5G is developed based on network softwarization, security threats associated with key network softwarization technologies such as SDN, NFV, NS, and MEC are also presented in detail. Then, the security issues related to the new 5G and IoT services are delivered. Finally, a detailed discussion on the privacy of 5G networks is presented by considering Datafied Society.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
/ Комментариев: 0/

Название: Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
Автор: Jonathan Weissman
Издательство: McGraw-Hill Education
Год: 2021
Формат: epub
Страниц: 672
Размер: 22.5 Mb
Язык: English

Practice the Skills Essential for a Successful Career in Cybersecurity


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Embracing Risk: Cyber Insurance as an Incentive Mechanism for Cybersecurity
/ Комментариев: 0/

Embracing Risk: Cyber Insurance as an Incentive Mechanism for CybersecurityНазвание: Embracing Risk: Cyber Insurance as an Incentive Mechanism for Cybersecurity
Автор: Mingyan Liu
Издательство: Morgan & Claypool
Серия: Synthesis Lectures on Learning, Networks, and Algorithms
Год: 2021
Страниц: 145
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides an introduction to the theory and practice of cyber insurance. Insurance as an economic instrument designed for risk management through risk spreading has existed for centuries. Cyber insurance is one of the newest sub-categories of this old instrument. It emerged in the 1990s in response to an increasing impact that information security started to have on business operations. For much of its existence, the practice of cyber insurance has been on how to obtain accurate actuarial information to inform specifics of a cyber insurance contract. As the cybersecurity threat landscape continues to bring about novel forms of attacks and losses, ransomware insurance being the latest example, the insurance practice is also evolving in terms of what types of losses are covered, what are excluded, and how cyber insurance intersects with traditional casualty and property insurance. The central focus, however, has continued to be risk management through risk transfer, the key functionality of insurance.