СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 332
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
/ Комментариев: 1/


Название: The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Автор: Charles M. Kozierok
Издательство: No Starch Press
Год: 2005
Страниц: 1616
Формат: True PDF
Размер: 54 Mb
Язык: English

This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book’s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Applications and Smart Contracts: Developing with Ethereum and Solidity (Видеокурс)
/ Комментариев: 0/

Название: Blockchain Applications and Smart Contracts: Developing with Ethereum and Solidity (Видеокурс)
Автор: James Steele
Издательство: Addison-Wesley Professional
Год: 2018
Видео: H264 MP4 AVC, 1280x720
Аудио: AAC 44100 KHz 2 Ch
Продолжительность: 03:08:00
Размер: 1,29 Gb
Язык: English

Blockchain, the underlying technology of cryptocurrencies, is positioned to revolutionize the world economy; and Ethereum as a particular blockchain enables new decentralized use-cases with the ability to run programs called smart contracts.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security Intelligence: A Practitioners Guide to Solving Enterprise Security Challenges
/ Комментариев: 0/

Название: Security Intelligence: A Practitioners Guide to Solving Enterprise Security Challenges
Автор: Qing Li and Gregory Clark
Издательство: Wiley
Год: 2015
Формат: PDF
Размер: 20 Мб
Язык: английский / English

Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the equation that is the deployment strategy, then verifies the solution against the original problem by analyzing security incidents and mining hidden breaches, ultimately refines the security formula iteratively in a perpetual cycle.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Wireless Powered Communication Networks: From Security Challenges to IoT Applications
/ Комментариев: 0/


Название: Wireless Powered Communication Networks: From Security Challenges to IoT Applications
Автор: Abbas Jamalipour, Ying Bi
Издательство: Springer
Год: 2018
Страниц: 111
Формат: PDF, EPUB
Размер: 12 Mb
Язык: English

This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Защита личной информации в интернете, смартфоне и компьютере
/ Комментариев: 0/


Название: Защита личной информации в интернете, смартфоне и компьютере
Автор: Камский В.А.
Издательство: Изд.: Наука и Техника, Санкт-Петербург
Год: 2017
Формат: pdf
Страниц: 272
Размер: 61 mb
Язык: русский

По статистике большинство пользователей персональных компьютеров и Интернета сами позволяют похищать/использовать свои личные данные злоумышленникам или просто подкованным в техническом плане третьим лицам. И ущерб от таких противоправных действий колеблется от незначительного до катастрофического. Никто не поможет лучше всего защитить ваши данные чем... вы Сами!


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Contemporary Knowledge and Systems Science
/ Комментариев: 0/

Название: Contemporary Knowledge and Systems Science
Автор: W. B. Lee and Farzad Sabetzadeh
Издательство: IGI Global
Год: 2018
Формат: EPUB
Размер: 16 Мб
Язык: английский / English

As branches of research and knowledge continue to expand, platforms for gathering and understanding new information become important aspects of organizational improvement. Contemporary Knowledge and Systems Science provides emerging research on the methods and applications of knowledge systems in social science, economics, and technological developments. While highlighting topics such as knowledge retention, organizational information, and evolutionary algorithms, this publication explores the different types of new knowledge from a systems perspective.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Experience-Based Human-Computer Interactions
/ Комментариев: 0/

Название: Experience-Based Human-Computer Interactions
Автор: Petr Sosnin
Издательство: IGI Global
Год: 2017
Формат: PDF
Размер: 18 Мб
Язык: английский / English

Human computer interaction is constantly evolving in many areas and facets of modern society. Analyzing these interactions can provide a more balanced understanding of these technological advances as they pertain to peoples lives.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cyber Security Policy Guidebook
/ Комментариев: 0/

Название: Cyber Security Policy Guidebook
Автор: Jennifer L. Bayuk; Jason Healey; Paul Rohmeyer; Marcus Sachs; Jeffrey Schmidt; Joseph Weiss
Издательство: Wiley
Год: 2012
ISBN: 1118027809 / 9781118027806
Формат: pdf
Страниц: 288
Размер: 10,2 mb
Язык: English

Drawing upon a wealth of experience from academia, industry, and government service, "Cyber Security Policy Guidebook" details and dissects, in simple language, current organizational cyber security policy issues on a global scale--taking great care to educate readers on the history and current approaches to the security of cyberspace.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Privacy and Big Data: The Players, Regulators, and Stakeholders
/ Комментариев: 0/


Название: Privacy and Big data: The Players, Regulators, and Stakeholders
Автор: Terence Craig, Mary E. Ludloff
Издательство: O'Reilly Media
Год: 2011
ISBN: 9781449305000 / 1449305008
Формат: pdf
Страниц: 108
Размер: 12,1 mb
Язык: English

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Emerging Automation Techniques for the Future Internet
/ Комментариев: 0/

Название: Emerging Automation Techniques for the Future Internet (Advances in Wireless Technologies and Telecommunication)
Автор: Mohamed Boucadair
Издательство: IGI Global
Год: 2018
Формат: True PDF
Страниц: 373
Размер: 12.6 Mb
Язык: English

Automation techniques are meant to facilitate the delivery of flexible, agile, customized connectivity services regardless of the nature of the networking environment. New architectures combine advanced forwarding and routing schemes, mobility features, and customer-adapted resource facilities used for operation and delivery of services.