СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 225
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Google Classroom: The 2020 Ultimate User Guide to Master Classroom by Matt Phoenix-P2P
/ Комментариев: 0/

Название: Google Classroom: The 2020 Ultimate User Guide to Master Classroom by Matt Phoenix-P2P
Автор: Коллектив
Язык: English
Издательство: Интернет - издание
Год: 2020
Для сайта: mirlib.ru
Формат: pdf
Кол-во страниц: 55
Размер: 17 MB

Online classes have become more in demand during the past few months, as students and teachers alike look for avenues to carry on with their education, as well as achieve some semblance of normalcy during these troubling times.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CCNA 200-301 Exam Cram 6th Edition
/ Комментариев: 0/

Название: CCNA 200-301 Exam Cram Sixth Edition
Автор: Anthony J. Sequeira
Издательство: Pearson IT Certification
Год: 2020
Формат: epub
Страниц: 560
Размер: 15 Mb
Язык: English

CCNA 200-301 Exam Cram, Sixth Edition is the perfect study guide to help you pass the Cisco 200-301 CCNA exam, providing coverage and practice questions for every exam topic. The book contains an extensive set of preparation tools, including topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, Packet Tracer labs, and an extensive glossary. The book also contains the extremely useful Cram Sheet tear-out: a collection of essential facts in an easy to review format. Complementing all these great study tools is the powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic practice questions.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Effective CISSP: Security and Risk Management
/ Комментариев: 0/

Название: The Effective CISSP: Security and Risk Management
Автор: Wentz Wu
Издательство: Amazon
Год: 2020
Формат: true pdf/epub
Страниц: 316
Размер: 4.3 Mb
Язык: English

The Effective CISSP: Security and Risk Management is for CISSP aspirants and those who are interested in information security or confused by cybersecurity buzzwords and jargon. It is a supplement, not a replacement, to the CISSP study guides that CISSP aspirants have used as their primary source. It introduces core concepts, not all topics, of Domain 1 in the CISSP CBK - Security and Risk Management. It helps CISSP aspirants build a conceptual security model or blueprint so that they can proceed to read other materials, learn confidently and with less frustration, and pass the CISSP exam accordingly.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Diameter: New Generation AAA Protocol - Design, Practice, and Applications
/ Комментариев: 0/

Название: Diameter: New Generation AAA Protocol - Design, Practice, and Applications
Автор: Hannes Tschofenig, Sebastien Decugis, Jean Mahoney
Издательство: Wiley
Год: 2019
Формат: True PDF
Страниц: 230
Размер: 13 Mb
Язык: English

Presents the principles, design, development and applications of the Diameter protocol suite
The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Mobile Information Service for Networks
/ Комментариев: 0/

Название: Mobile Information Service for Networks
Автор: Jiang, Changjun, Li, Zhong
Издательство: Springer
Год: 2020
Формат: True PDF/EPUB
Страниц: 250
Размер: 50.1 Mb
Язык: English

Provides detailed information on fundamental supporting technologies for mobile information services for networks
Shares tips and insights into the development of applications and key technologies in the domains of intelligent transportation, smart tourism, and mobile payment
Broadens readers’ understanding of the mobile information service platform used by the authors



Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Analyzing Social Media Networks with NodeXL: Insights from a Connected World 2nd Edition
/ Комментариев: 0/

Название: Analyzing Social Media Networks with NodeXL: Insights from a Connected World Second Edition
Автор: Hansen Ph.D. University of Michigan, Derek, Shneiderman Ph.D. SUNY at Stony Brook, Ben, Smith Ph.D. UCLA Los Angeles CA, Marc A
Издательство: Morgan Kaufmann
Год: 2019
Формат: epub, true pdf
Страниц: 248
Размер: 111.8 Mb, 15 Mb
Язык: English

Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated guide to NodeXL, the open-source social network analysis (SNA) plug-in for use with Excel. The book analyzes social media, provides a NodeXL tutorial, and presents network analysis case studies, all of which are revised to reflect the latest developments.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Ethical Hacking: Best Tips and Tricks of Ethical Hacking
/ Комментариев: 0/

Название: Ethical Hacking: Best Tips and Tricks of Ethical Hacking
Автор: Elijah Lewis
Издательство: Amazon
Год: 2020
Формат: PDF
Страниц: 93
Размер: 0.6 Mb
Язык: English

This book is for those of you looking to adding more skills to your arsenal. It touches upon all topics that an ethical hacker should know about and how to implement the skills of a professional hacker.
The book will provide a brief history of ethical hacking. You will learn what ethical hacking means and how this term is different from general hacking. Hacking topics include physical threats as well as the non-physical threats in an organization that all skilled ethical hackers must understand.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity and Decision Makers: Data Security and Digital Trust
/ Комментариев: 0/

Cybersecurity and Decision Makers: Data Security and Digital TrustНазвание: Cybersecurity and Decision Makers: Data Security and Digital Trust
Автор: Marie De Freminville
Издательство: Wiley-ISTE
Год: 2020
Страниц: 211
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Spatial Computing
/ Комментариев: 0/

Название: Spatial Computing (MIT Press Essential Knowledge series)
Автор: Shashi Shekhar, Pamela Vold
Издательство: The MIT Press
Год: 2019
Формат: true pdf/epub/azw3
Страниц: 258
Размер: 10 Mb
Язык: English

An accessible guide to the ideas and technologies underlying such applications as GPS, Google Maps, Pok?mon Go, ride-sharing, driverless cars, and drone surveillance.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
LPWAN Technologies for IoT and M2M Applications
/ Комментариев: 0/

Название: LPWAN Technologies for IoT and M2M Applications
Автор: Bharat S. Chaudhari (Editor), Marco Zennaro (Editor)
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 432
Размер: 22.4 Mb
Язык: English

Low power wide area network (LPWAN) is a promising solution for long range and low power Internet of Things (IoT) and machine to machine (M2M) communication applications. The LPWANs are resource-constrained networks and have critical requirements for long battery life, extended coverage, high scalability, and low device and deployment costs. There are several design and deployment challenges such as media access control, spectrum management, link optimization and adaptability, energy harvesting, duty cycle restrictions, coexistence and interference, interoperability and heterogeneity, security and privacy, and others.