СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 179
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Социальная сеть. Феномен Facebook
/ Комментариев: 0/

Название: Социальная сеть. Феномен Facebook
Автор: Штайншаден Якоб
Издательство: Питер
Год: 2011
Формат: pdf
ISBN: 978-5-459-00829-6
Размер: 26,95 мб
Качество: хорошее
Язык: русский

На персональных данных можно заработать миллиарды долларов, вот почему целая очередь крупных инвесторов платит миллионы за то, чтобы обладать маленьким кусочком Facebook. Что же в действительности происходит с информацией, которую пользователи ежедневно публикуют в сети?


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Accountability and Privacy in Network Security
/ Комментариев: 0/

Название: Accountability and Privacy in Network Security
Автор: Yuxiang Ma (Author), Yulei Wu, Jingguo Ge
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 146
Размер: 17.6 Mb
Язык: English

This book discusses accountability and privacy in network security from a technical perspective, providing a comprehensive overview of the latest research, as well as the current challenges and open issues. Further, it proposes a set of new and innovative solutions to balance privacy and accountability in networks in terms of their content, flow and service, using practical deep learning techniques for encrypted traffic analysis and focusing on the application of new technologies and concepts.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
/ Комментариев: 0/

Название: Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks (Advances in Information Security, Privacy, and Ethics)
Автор: K. Martin Sagayam (Author, Editor), Bharat Bhushan (Editor), A. Diana Andrushia (Editor), Victor Hugo C. de Albuquerque (Editor)
Издательство: IGI Global
Год: 2020
Формат: epub
Страниц: 405
Размер: 22.7 Mb
Язык: English

Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Large-Scale Data Streaming, Processing, and Blockchain Security
/ Комментариев: 0/

Название: Large-Scale Data Streaming, Processing, and Blockchain Security (Advances in Information Security, Privacy, and Ethics)
Автор: Hemraj Saini (Author, Editor), Geetanjali Rathee (Editor), Dinesh Kumar Saini (Editor)
Издательство: IGI Global
Год: 2021
Формат: epub
Страниц: 285
Размер: 26.4 Mb
Язык: English

Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to ones personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the current technological requirements.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Research Anthology on Combating Denial-of-Service Attacks
/ Комментариев: 0/

Название: Research Anthology on Combating Denial-of-Service Attacks
Автор: Information Resources Management Association
Издательство: IGI Global
Год: 2021
Формат: epub
Страниц: 655
Размер: 59 Mb
Язык: English

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to these networks shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives but also by an inherent logistical bias that grants advantage to attackers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Сетевые технологии. Обработка форм в рамках динамических Интернет-сайтов. Учебное пособие для бакалавров
/ Комментариев: 0/

Название: Сетевые технологии. Обработка форм в рамках динамических Интернет-сайтов. Учебное пособие для бакалавров
Автор: Богун В.В.
Издательство: Ай Пи Ар Медиа
ISBN: 978-5-4497-0720-8
Год: 2020
Формат: PDF
Страниц: 169
Размер: 13.7 MB
Язык: Русский

В предлагаемом учебном пособии рассмотрена реализация различных алгоритмов обработки форм, представленных в рамках динамических Интернет-страниц, на основе применения объектно-ориентированного скриптового языка программирования PHP и реляционной системы управления базами данных MySQL. Рассмотрены механизмы обработки информации с сохранением данных в текстовых файлах и таблицах баз данных с приведением скриншотов и исходных кодов программ для пользовательской и администраторской сторон. Для реализации самостоятельной деятельности студентов (в рамках практических или лабораторных занятий, а также при организации внеуадиторной научно-исследовательской деятельности) приведены макеты динамических Интернет-страниц к решению необходимых задач.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Applications in IoT Security
/ Комментариев: 0/

Blockchain Applications in IoT SecurityНазвание: Blockchain Applications in IoT Security
Автор: Harshita Patel, Ghanshyam Singh Thakur
Издательство: IGI Global
Год: 2021
Страниц: 300
Язык: английский
Формат: epub
Размер: 19.2 MB

Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Developing a Cybersecurity Immune System for Industry 4.0
/ Комментариев: 0/

Developing a Cybersecurity Immune System for Industry 4.0Название: Developing a Cybersecurity Immune System for Industry 4.0
Автор: Sergei Petrenko
Издательство: River Publishers
Год: 2020
Страниц: 458
Язык: английский
Формат: pdf (true)
Размер: 127.3 MB

Cyber immune systems try to mimic the adaptive immune system of humans and animals because of their capability to detect and fend off new, unseen pathogens. Today's current cybersecurity systems provide an effective defense mechanism against known cyber-attacks but are not so good when it comes to defending against unknown attacks. This book describes the possible development and organization of self-healing computing based on cyber immunity techniques and aimed at working in the new realm of Industry 4.0. Industry 4.0 is the trend towards automation and data exchange in manufacturing technologies and processes which include cyber-physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), cloud computing, cognitive computing and Artificial Intelligence.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
70 Tips and Tricks for Mastering the CISSP Exam
/ Комментариев: 0/

70 Tips and Tricks for Mastering the CISSP ExamНазвание: 70 Tips and Tricks for Mastering the CISSP Exam
Автор: R. Sarma Danturthi
Издательство: Apress
Год: 2020
Страниц: 368
Язык: английский
Формат: pdf (true), rtf
Размер: 10.1 MB

Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given. The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Technology and Applications
/ Комментариев: 0/

Название: Blockchain Technology and Applications (River Publishers Series in Security and Digital Forensics)
Автор: Ahmed Banafa
Издательство: River Publishers
Год: 2020
Формат: True PDF
Страниц: 174
Размер: 21.5 Mb
Язык: English

Blockchain is an emerging technology that can radically improve transactions security at banking, supply chain, and other transaction networks. It’s estimated that Blockchain will generate $3.1 trillion in new business value by 2030. Essentially, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering.