СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 21
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Recent Advances in Computational Intelligence and Cyber Security
/ Комментариев: 0/

Название: Recent Advances in Computational Intelligence and Cyber Security
Автор: Ashok Kumar Singh, Zeeshan Ali Siddiqui, Siddharth Singh, Amit Kumar Singh
Издательство: CRC Press
Год: 2024
Страниц: 400
Язык: английский
Формат: pdf (true)
Размер: 32.8 MB

In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. The relentless pace of technological evolution and the ceaseless emergence of cyber threats demand not only adaptation but also an exploration of the forefronts of innovation and defence. Recent Advances in Computational Intelligence and Cyber security is a testament to the exhilarating journey undertaken by researchers, practitioners, and visionaries in these pivotal fields. Within the confines of this book, we embark on a captivating exploration of the cutting-edge developments that define the current state of computational intelligence and the intricate dance with the ever-evolving landscape of cyber security. Creating models and methods that will enable computer systems to replicate human intellect is the aim of the Computer Science field of Artificial Intelligence (AI). That’s why cybersecurity is getting more and more crucial. Preventing data breaches, financial losses, and privacy violations requires effective network security and information security. This clarifes the growing signifcance of cybersecurity.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Improving Security, Privacy, and Trust in Cloud Computing
/ Комментариев: 0/

Название: Improving Security, Privacy, and Trust in Cloud Computing
Автор: Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal
Издательство: IGI Global
Год: 2024
Страниц: 319
Язык: английский
Формат: pdf (true), epub
Размер: 26.0 MB

Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. It recognizes that a resilient cloud strategy is built upon these three fundamental pillars, each reinforcing the other. Security forms the fortress that guards against external threats and internal vulnerabilities. Privacy ensures that individuals' personal information is respected and protected, even in the cloud. Trust is the bond that unites cloud service providers and consumers, fostering a relationship grounded in transparency, reliability, and accountability. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Performance Analysis of Cooperative Networking with Multi Channels
/ Комментариев: 0/

Название: Performance Analysis of Cooperative Networking with Multi Channels
Автор: Praveen Kumar Devulapalli, Sushanth Babu Maganti, Pardhasaradhi Pokkunuri
Издательство: CRC Press
Год: 2025
Страниц: 123
Язык: английский
Формат: pdf (true)
Размер: 11.7 MB

This book covers wireless cooperative communication and advanced communication techniques for research scholars and post-graduate students. First, in Chapter 1, we discuss cooperative communication by highlighting wireless channel impairments and addressing cooperative architecture gains. We offer a systematic guide to understanding fundamental principles and implementing valuable taxonomies. The literature review supports the need for a thorough investigation into existing cooperative protocols, and the proposal for a design for developing a cooperative communication model is presented in Chapter 2. Furthermore, the central hypothesis presented in the literature review indicates that meaningful results may be obtained by efficiently selecting relays with correct channel estimation. The rest of this book, which is characterized by its focus on how and when to select relays, will seek to address the lack of studies on successful relay selection in the form of a cooperative communication model under such channel conditions. In Chapter 3, two sophisticated routing algorithms based on MACC and distance parameters are implemented to maximize the benefits of CR in a multi-​radio-​multi-​channel large-​scale wireless network. The combined throughput and transmission time of the proposed algorithms are similar to the IACR algorithm.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI
/ Комментариев: 0/

Название: Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI
Автор: Toni Janevski
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true), epub
Размер: 26.7 MB

All-in-one resource on the development of Internet and telecoms worldwide, based on the technological frameworks as defined by the ITU. Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI is a highly comprehensive resource that provides full coverage of existing and future fixed and mobile broadband networks, internet, and telecom and OTT services. This book explains how to perform technical, business, and regulatory analysis for future 5G-Advanced, 6G, WiFi, and optical access. This book also covers optical transport, submarine cable, future satellite broadband, cloud computing, massive and critical IoT and frameworks and use of AI / ML in telecommunications. The main “form” of AI at the present time is Machine Learning (ML). ITU has defined architecture for ML in future networks including 5G/IMT‐2020 and beyond. What is ML? According to the ITU’s definition: Machine Learning refers to processes that enable computational systems to understand data and gain knowledge from it without necessarily being explicitly programmed. However, ML is based on mathematics and it is commonly implemented via software tools which are programmed (either by humans or by software tools developed by humans).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Home Networking Tricks and Tips - 4th Edition 2024
/ Комментариев: 0/

Название: Home Networking Tricks and Tips - 4th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 37.8 MB

"Советы и рекомендации по созданию домашних сетей" - это совершенная цифровая публикация для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их из всего "умного дома". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CompTIA Network+ Study Guide: Exam N10-009 (6th Edition)
/ Комментариев: 0/

Название: CompTIA Network+ Study Guide: Exam N10-009 (6th Edition)
Автор: Todd Lammle, Jon Buhagiar
Издательство: Sybex
Год: 2024
Страниц: 1024
Язык: английский
Формат: epub
Размер: 16.6 MB

Prepare for the Network+ certification and a new career in network installation and administration. In the newly revised Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009, bestselling authors and network experts Todd Lammle and Jon Buhagiar deliver thorough and accurate coverage of how to install, configure, and troubleshoot today's networking hardware peripherals and protocols. This book shows you how to succeed on the in-demand CompTIA Network+ certification exam, impress interviewers in the networking industry, and excel in your first role as a network administrator, support technician, or related position. The accomplished authors draw on their combined 30+ years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam: N10-009: Networking concepts, implementation, operations, security, and troubleshooting. Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam: N10-009, the Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009 is a must-have resource for network admins seeking to enhance their skillset with foundational skills endorsed by industry pros and thought leaders from around the world.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Нейронные сети для обработки информации
/ Комментариев: 0/

Название: Нейронные сети для обработки информации
Автор: Осовский С.
Издательство: М.: Финансы и статистика
Год: 2002
Cтраниц: 345
Формат: pdf
Размер: 12 мб
Язык: русский

Представлены важнейшие разделы теории искусственных нейронных сетей. Основное внимание уделяется алгоритмам обучения и их применению для обработки измерительной информации. Дается детальный обзор и описание важнейших методов обучения сетей различной структуры, иллюстрируемые численными экспериментами с практически подтвержденными результатами.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Нечеткая логика и искусственные нейронные сети
/ Комментариев: 0/

Название: Нечеткая логика и искусственные нейронные сети - Круглов В.В., Дли М.И., Голунов Р.Ю.
Автор: Круглов В.В., Дли М.И., Голунов Р.Ю.
Издательство: М.: ФИЗМАТЛИТ
Год: 2001
Cтраниц: 221
Формат: pdf
Размер: 12 мб
Язык: русский

В книге рассмотрены теоретические аспекты подобных сетей,именно, аппарат нечеткой логики,основы теории искусственных нейронных сетей и собственно гибридных сетей применительно к задачам управлениям и принятия решения в условиях неопределенности.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)
/ Комментариев: 0/

Название: Developing Cybersecurity Programs and Policies in an AI-Driven World, 4th Edition (Early Release)
Автор: Omar Santos
Издательство: Pearson IT Certification
Год: 2024
Страниц: 657
Язык: английский
Формат: epub
Размер: 32.2 MB

Developing Cybersecurity Programs and Policies is a complete guide to establishing a cyber security program and governance in your organization. In this book, you will learn how to create cyber security policies, standards, procedures, guidelines, and plans-and the differences among them. You will also learn how threat actors are launching attacks against their victims-compromising confidentiality, integrity, and availability of systems and networks. Santos starts by providing an overview of cybersecurity policy and governance, and how to create cybersecurity policies and develop a cybersecurity framework. He then provides details about governance, risk management, asset management, and data loss prevention. This book begins with a foundational overview of cybersecurity policy and governance to set the stage for the need for balance between policy and practicality in cybersecurity programs. It then goes into detail on cybersecurity policy organization, format, and styles, providing insights into crafting effective and adaptable policies. As the book progresses, it covers topics such as cloud security, governance and risk management, and asset management and data loss prevention, which are just some of the multifaceted challenges organizations face in securing their assets. Cloud security is paramount in today’s environments because of the need to protect data, applications, and infrastructures operated over the cloud. As businesses and organizations increasingly use cloud services, the complexity and volume of cyber threats escalate. Cloud security is important to ensure compliance with rigorous regulatory requirements and industry standards. It plays a crucial role in enabling the safe adoption of cloud technologies, enabling innovation and agility.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response
/ Комментариев: 0/

Название: Combatting Cyber Terrorism : A guide to understanding the cyber threat landscape and incident response planning
Автор: Richard Bingley
Издательство: IT Governance Publishing Ltd
Год: 2024
Страниц: 315
Язык: английский
Формат: pdf (true), epub (true)
Размер: 10.4 MB

In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. Increasingly, cyber security practitioners are confronted with a stark phrase: cyber terrorism. For many, it conveys fear and hopelessness. What is this thing called 'cyber terrorism' and what can we begin to do about it? Malicious-minded ICT users, programmers and even programs (including much AI-powered software) have all been instrumental in recruiting, inspiring, training, executing and amplifying acts of terrorism. This has resulted in the loss of life and/or life-changing physical injuries that could never have occurred without support and facilitation from the cyber sphere. These types of attacks can be encapsulated by the phrase 'cyber terrorism'. This book recounts case studies to show the types of threats we face and provides a comprehensive coverage of risk management tactics and strategies to protect yourself against such nefarious threat actors. These include key mitigation and controls for information security or security and HR-related professionals.