СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 166
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Smart Sensors for Industrial Internet of Things
/ Комментариев: 0/

Название: Smart Sensors for Industrial Internet of Things
Автор: Gupta D.
Язык: English
Издательство: Springer
Год: 2021
Формат: pdf
Кол-во страниц: 343
Размер: 10 мб

This book brings together the latest research in smart sensors technology and exposes the reader to myriad industrial applications that this technology has enabled. The book emphasizes several topics in the area of smart sensorsin industrial real-world applications. The contributions in this book give a broader view on the usage of smart sensor devices covering a wide range of interdisciplinary areas like Intelligent Transport Systems, Healthcare, Agriculture, Drone communications and Security.
By presenting an insight into Smart Sensors for Industrial IoT, this book directs the readers to explore the utility and advancement in the smart sensors and their applications into numerous research fields. Lastly, the book aims to reach through a mass number of industry experts, researchers, scientists, engineers, and practitioners and help them guide and evolve to advance research practices.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hacking for Beginners with Kali Linux: Learn Kali Linux and Master Tools to Crack Websites, Wireless Networks and Earn Income (5 Books in 1)
/ Комментариев: 0/


Название: Hacking for Beginners with Kali Linux: Learn Kali Linux and Master Tools to Crack Websites, Wireless Networks and Earn Income (5 Books in 1)
Автор: Darwin Tye
Издательство: Independently published
Год: 2020
Формат: pdf/djvu
Страниц: 300
Размер: 12 mb
Язык: английский

Hacking is a Skill. Hacking is a practice. Hacking is a passion. To be a hacker you need not build things but you need to crack them. Hackers are always decipted as evil in popular cultural references. However, there are good hackers called as ” Ethical hackers “ also known as ” Penetration testers” and “security researchers”. This Mega book set is written by a penetration researcher who have 20 years experience in the industry. He had spent time with hundreds of hackers and security researchers and compiled all his thoughts into this book.
Hacking is not easy. But if you can follow a pathway followed by thousands of hackers from years ago you can easily become one. Author of this book explains these hacking procedures in 5 modules for your easy understanding.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures
/ Комментариев: 0/

Название: Hardware Supply Chain Security: Threat Modelling, Emerging Attacks and Countermeasures
Автор: Basel Halak (Editor)
Издательство: Springer
Год: 2021
Формат: true pdf/epub
Страниц: 221
Размер: 26.6 Mb
Язык: English

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition
/ Комментариев: 0/


Название: Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition
Автор: Kief Morris
Издательство: O’Reilly
Год: 2021
Страниц: 577
Размер: 17.72 МБ
Формат: PDF, EPUB
Язык: English

Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other conservative organizations plan moves to the cloud, development teams for companies worldwide are attempting to build large infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by DevOps teams to manage cloud-age infrastructure.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
/ Комментариев: 0/

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access ConnectionНазвание: Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Автор: Dr. Hidaia Mahmood Alassouli
Издательство: Independently published
Год: 2021
Страниц: 137
Язык: английский
Формат: pdf, azw3, epub
Размер: 15.4 MB

Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
What Are the Dangers of Online Scams?
/ Комментариев: 0/

Название: What Are the Dangers of Online Scams?
Автор: John Allen
Издательство: Referencepoint Press
Год: 2020
Формат: PDF
Размер: 10 Мб
Язык: английский / English

As more people conduct business and social activity on the internet, the opportunities for online scams have exploded. The growth of online scams has led to an industry dedicated to stopping them.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
/ Комментариев: 0/

Название: Understanding Network Hacks: Attack and Defense with Python 3, 2nd Edition
Автор: Bastian Ballmann
Издательство: Springer
Год: 2021
Формат: PDF, EPUB
Страниц: 235
Размер: 17 Mb
Язык: English

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting, Bluetooth and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Building Confidence in Blockchain: Investing in Cryptocurrency and a Decentralized Future
/ Комментариев: 0/


Название: Building Confidence in Blockchain: Investing in Cryptocurrency and a Decentralized Future
Автор: Carter Lee Woetzel
Издательство: New Degree Press
Год: 2020
Страниц: 264
Размер: 11.56 МБ
Формат: PDF, EPUB
Язык: English

Did you know that the US dollar has lost more than 97% of its value since 1917?
The reality is that inflation is just one of the many issues that plagues the dollar as a primary form of currency. Other issues like centralization, increasingly expensive transaction and contract infrastructure, and entrenched trust deficits all make this traditional asset both inefficient and impractical as the currency of the future.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context
/ Комментариев: 0/

Название: Simulation for Cyber-Physical Systems Engineering: A Cloud-Based Context (Simulation Foundations, Methods and Applications)
Автор: Jose L. Risco Mart?n (Editor), Saurabh Mittal (Editor), Tuncer Oren (Editor)
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 453
Размер: 67.4 Mb
Язык: English

This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. It highlights the underlying infrastructure, modeling paradigms, and simulation methodologies that can be brought to bear to develop the next generation of systems for a highly connected society. Such systems, aptly termed cyber-physical systems (CPS), are now widely used in e.g. transportation systems, smart grids, connected vehicles, industrial production systems, healthcare, education, and defense.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Computer Networking: A Top-Down Approach 8th Edition
/ Комментариев: 0/

Название: Computer Networking: A Top-Down Approach, Eighth Edition
Автор: James Kurose, Keith Ross
Издательство: Pearson
Год: 2021
Формат: True PDF
Страниц: 774
Размер: 14.4 Mb
Язык: English

A top-down, layered approach to computer networking.
Unique among computer networking texts, the 8th Edition of the popular Computer Networking: A Top Down Approach builds on the authors’ long tradition of teaching this complex subject through a layered approach in a “top-down manner.”