СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 33
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Communication Efficient Federated Learning for Wireless Networks
/ Комментариев: 0/

Название: Communication Efficient Federated Learning for Wireless Networks
Автор: Mingzhe Chen, Shuguang Cui
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 189
Язык: английский
Формат: pdf (true), epub
Размер: 24.2 MB

This book provides a comprehensive study of Federated Learning (FL) over wireless networks. It consists of three main parts: (a) Fundamentals and preliminaries of FL, (b) analysis and optimization of FL over wireless networks, and © applications of wireless FL for Internet-of-Things systems. In particular, in the first part, the authors provide a detailed overview on widely-studied FL framework. In the second part of this book, the authors comprehensively discuss three key wireless techniques including wireless resource management, quantization, and over-the-air computation to support the deployment of FL over realistic wireless networks. It also presents several solutions based on optimization theory, graph theory and machine learning to optimize the performance of FL over wireless networks. In the third part of this book, the authors introduce the use of wireless FL algorithms for autonomous vehicle control and mobile edge computing optimization. Machine Learning and data-driven approaches have recently received considerable attention as key enablers for next-generation intelligent networks. Currently, most existing learning solutions for wireless networks rely on centralizing the training and inference processes by uploading data generated at edge devices to data centers.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Learning Techniques for the Internet of Things
/ Комментариев: 0/

Название: Learning Techniques for the Internet of Things
Автор: Praveen Kumar Donta, Abhishek Hazra, Lauri Loven
Издательство: Springer
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf (true), epub
Размер: 31.7 MB

Learning for the Internet of Things is a combination of advanced learning techniques for the Internet of Things (IoT) encompassing a range of cutting-edge approaches, including Deep Learning with CNNs, RNNs, and transformers, Federated Learning, edge AI for local data processing, reinforcement learning for autonomous decision-making, and their applications in real time. The book is structured into thirteen chapters; each comes with its own dedicated contributions and future research directions. Chapter 1 introduces IoT and the use of Edge computing, particularly cloud computing, and mobile edge computing. This chapter also mentions the use of edge computing in various real-time applications such as healthcare, manufacturing, agriculture, and transportation. Chapter 2 motivates mathematical modeling for Federated Learning systems with respect to IoT and its applications. Further Chapter 3 extends the discussion of Federated Learning for IoT, which has emerged as a privacy-preserving distributed Machine Learning approach.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The Zero Trust Framework and Privileged Access Management (PAM)
/ Комментариев: 0/

Название: The Zero Trust Framework and Privileged Access Management (PAM)
Автор: Ravindra Das
Издательство: CRC Press
Год: 2024
Страниц: 126
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Artificial Intelligence for Cyber Defense and Smart Policing
/ Комментариев: 0/

Название: Artificial Intelligence for Cyber Defense and Smart Policing
Автор: S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
Издательство: CRC Press
Год: 2024
Страниц: 187
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing Artificial Intelligence for cyber defense and smart policing. Organizations share information about cyber attacks as a crucial component of cyber threat intelligence, in order to enhance their understanding of potential threats and proactively safeguard their systems and networks. Cyber-attacks and defenses both rely heavily on Machine Learning, but neither of them achieve their goals when they rely on it completely. A malware sniffer can detect malware in encrypted traffic based on an analysis of encrypted traffic elements in network telemetry. The algorithms of Machine Learning uncover threats hidden in encryption, instead of decrypting them.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
CCNP and CCIE Enterprise Core ENCOR 350-401 (Official Cert Guide), 2nd Edition
/ Комментариев: 0/

Название: CCNP and CCIE Enterprise Core ENCOR 350-401 (Official Cert Guide), 2nd Edition
Автор: Brad Edgeworth, Ramiro Garza Rios, Dave Hucaby, Jason Gooley
Издательство: Cisco Press
Год: 2024
Страниц: 1149
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This fully updated second edition includes the latest topics and additional information covering changes to the latest ENCOR 350-401 exam.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Network Security and Cryptography, 2nd Edition
/ Комментариев: 0/

Название: Network Security and Cryptography: A Self-Teaching Introduction, 2nd Edition
Автор: Sarhan M. Musa
Издательство: Mercury Learning & Information
Год: 2022
Страниц: 611
Язык: английский
Формат: pdf (true)
Размер: 20.3 MB

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on Artificial Intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, Big Data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Online Security Tricks and Tips - 17th Edition 2024
/ Комментариев: 0/

Название: Online Security Tricks & Tips - 17th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 110
Язык: английский
Формат: pdf
Размер: 46.3 MB

"Советы и рекомендации по безопасности в Интернете" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Хотите ли вы улучшить свои пользовательские навыки? Хотите ли вы получить инсайдерские знания? Хотите ли вы учиться непосредственно у экспертов в этой области? На страницах нового руководства для продвинутых пользователей вы узнаете все, что нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как пользоваться устройством, и поэтому получает от него максимальную отдачу. Этого мы можем достичь, передавая вам навыки, которые мы вырабатывали десятилетиями, и предоставляя вам индивидуальную поддержку.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
5G Technology: 3GPP Evolution to 5G-Advanced, 2nd Edition
/ Комментариев: 0/

Название: 5G Technology: 3GPP Evolution to 5G-Advanced, 2nd Edition
Автор: Harri Holma, Antti Toskala, Takehiro Nakamura
Издательство: CRC Press
Год: 2024
Страниц: 650
Язык: английский
Формат: pdf (true)
Размер: 11.7 MB

An Essential Insider’s View of the Development Work of 5G Technology Up to Release 18. 5G brings new technology solutions to the 5G mobile networks, including new spectrum options, antenna structures, physical layer and protocols designs, and network architectures. 5G Technology: 3GPP Evolution to 5G-Advanced is an accessible and comprehensive resource that offers explanations of 5G specifications and performance evaluations, aspects of device design, practical deployment considerations and illustrative examples from field experiences. With contributions from a panel of international experts on the topic (industry insiders working at the forefront of development), the book presents the main new technology components in 5G and describes the physical layer, radio protocols, and network performance indicators associated with them. It has intentionally been written to cater to individuals at all levels of 5G expertise. 5G Technology: 3GPP Evolution to 5G-Advanced serves as a complete resource for wireless researchers, network planners, lecturers in universities, technology analysts, R&D engineers, application developers, and spectrum regulators who wish to thoroughly understand the latest in 5G technology and get ahead of the curve with regards to its potential applications in a wide variety of industries.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Администрирование в информационных системах (2018)
/ Комментариев: 0/

Название: Администрирование в информационных системах
Автор: Беленькая М. Н., Малиновский С. Т., Яковенко Н. В.
Издательство: Горячая линия-Телеком
Год: 2018 - 2-е изд., испр. и доп.
Cтраниц: 408
Формат: pdf
Размер: 15 мб
Язык: русский

Систематизированы основные сведения, необходимые администратору информационных систем (ИС). Приведена информация о функциях и задачах специалистов по управлению и сопровождению ИС, стандартах работы, организации и функциях служб администрирования ИС. Описаны стандарты работы ИС и стандартизирующие организации. Рассмотрены объекты управления ИС, модели и протоколы управления. Особое внимание уделено моделям управления, в том числе ITIL, FCAPS, ONC.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain-Based Data Security in Heterogeneous Communications Networks
/ Комментариев: 0/

Название: Blockchain-Based Data Security in Heterogeneous Communications Networks
Автор: Dongxiao Liu, Xuemin (Sherman) Shen
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 200
Язык: английский
Формат: pdf (true), epub
Размер: 12.5 MB

This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions. Blockchain is a ledger that is maintained by distributed network nodes. More specifically, it consists of blocks of peer-to-peer transactions. With consensus protocols, such as Proof-of-Work (PoW), the blockchain helps ensure a consistent view of ledger storage among mutually distrusted network nodes. Using the blockchain as a trusted machine for program execution, smart contract can be deployed for managing shared business logic. Specifically, smart contract can define terms and conditions for participants to change ledger storage. For DM in future networks, smart contract can help network stakeholders to collaboratively manage data lifecycle events over the blockchain for data sharing and processing.