СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 52
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Network Defense and Countermeasures: Principles and Practices, 4th Edition (Early Access)
/ Комментариев: 0/

Название: Network Defense and Countermeasures: Principles and Practices, 4th Edition (Early Access)
Автор: Chuck Easttom
Издательство: Pearson Education
Год: 2024
Страниц: 640
Язык: английский
Формат: epub
Размер: 15.3 MB

All you need to know about defending networks, in one book. The hottest topic in the IT industry today is computer security. The news is replete with stories of hacking, viruses, and identity theft. The cornerstone of security is defending the organizational network. Network Defense and Countermeasures: Principles and Practices offers a comprehensive overview of network defense. It introduces students to network security threats and methods for defending the network. Three entire chapters are devoted to firewalls and intrusion-detection systems. There is also a chapter providing a basic introduction to encryption. Combining information on the threats to networks, the devices and technologies used to ensure security, as well as concepts such as encryption provides students with a solid, broad-based approach to network defense. This book provides a blend of theoretical foundations and practical applications. Each chapter ends with multiple choice questions and exercises, and most chapters also have projects. Students who successfully complete this textbook, including the end of chapter material, should have a solid understanding of network security.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery
/ Комментариев: 0/

Название: Evaluation of Some SMTP Testing, Email Verification, Header Analysis, SSL Checkers, Email Delivery, Email Forwarding and WordPress Email Tools
Автор: Dr. Hedaya Alasooly
Издательство: BookRix GmbH & Co. KG
Год: 2023
Страниц: 232
Язык: английский
Формат: epub (true)
Размер: 13.6 MB

Simple Mail Transfer Protocol (SMTP) is a set of rules used while sending emails. Usually, this protocol is associated with IMAP or POP3. However, SMTP is utilized to deliver messages, while POP3 and IMAP are utilized to receive them. The SMTP testing tool identifies issues with email security in your server that can hinder your email delivery. It checks the health status of your outgoing email server and notifies you about the detected problems, such as connectivity issues, and how to tackle them. An SMTP test tool can identify SMTP server issues and troubleshoot them to keep your email secure and safe. The SSL Checker tool can verify that the SSL Certificate on your web server is properly installed and trusted. Header Analyzers can help you view and analyze message headers by displaying the information in a user-friendly manner and also by calling out various issues, such as suspected delivery delays that may require your attention.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Home Networking For Beginners - 3rd Edition 2023
/ Комментариев: 0/

Home Networking For Beginners - 3rd Edition 2023Название: Home Networking For Beginners - 3rd Edition 2023
Автор: Papercut Limited
Издательство: Papercut Limited
Год выхода: 2023
Страниц: 104
Качество: хорошее
Формат: PDF
Размер: 70,7 MB
Язык: английский

Home Networking For Beginners is the first and only choice if you are new adopter and want to learn everything you’ll need to get started with the your home network hub and online security. This independent manual is crammed with helpful guides and step-by-step fully illustrated tutorials, written in plain easy to follow English. Over the pages of this new user guide you will clearly learn all you need to know about networking your home and smart devices. With this unofficial instruction manual at your side no problem will be unsolvable, no question unanswered as you learn, explore and enhance your networking skills.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Методы и средства инженерно-технической защиты информации
/ Комментариев: 0/

Название: Методы и средства инженерно-технической защиты информации
Автор: Аверченков В.И., Рытов М.Ю., Кувыклин А.В., Гайнулин Т.Р.
Издательство: М.: Флинта
Год: 2011
Cтраниц: 187
Формат: pdf
Размер: 12 мб
Язык: русский

В данном учебном пособии рассматриваются общие вопросы теории информационной безопасности, основные положения технологии добывания информации и ведения технической разведки, технические методы и средства противодействия способам несанкционированного доступа к информации, организационное обеспечение инженерно-технической защиты информации, средства инженерной защиты и технической охраны объектов.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide
/ Комментариев: 0/

Название: Demystifying Intelligent Multimode Security Systems: An Edge-to-Cloud Cybersecurity Solutions Guide
Автор: Jody Booth, Werner Metz
Издательство: Apress
Год: 2023
Страниц: 206
Язык: английский
Формат: pdf
Размер: 29.0 MB

Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
System Design Using the Internet of Things with Deep Learning Applications
/ Комментариев: 0/

Название: System Design Using the Internet of Things with Deep Learning Applications
Автор: Arpan Deyasi, Angsuman Sarkar, Soumen Santra
Издательство: Apple Academic Press, CRC Press
Год: 2024
Страниц: 282
Язык: английский
Формат: pdf (true)
Размер: 24.9 MB

This new volume aims to find real-world solutions to present-day problems by using IoT and related technologies. The volume explores the diverse applications of the Internet of Things in diverse areas―in healthcare, the construction industry, in wildlife monitoring, in home security systems, in agriculture, in cryptology, in hospitality employment, in data security, and more. The chapters illustrate the aspects of defining the architecture, product design, modules, interfaces, and data for a system to satisfy specified requirements of the IoT applications discussed. The chapters show the novel results that can safely be applied in their respective domains. In this context, the editors expect that the present solutions can meet the ever-increasing demand of industries. With chapters from both academics and industry professionals involved in IoT/AI solutions, System Design Using Internet of Things with Deep Learning Applications will be a valuable resource for students in this area as well as for those working in novel architecture design and system implementation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
/ Комментариев: 0/

Название: Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Автор: Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 550
Язык: английский
Формат: pdf (true)
Размер: 23.4 MB

Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. Security and Privacy Schemes for Dense 6G Wireless Communication Networks is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, Data Science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization experts.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
5G and 6G Communication Technologies
/ Комментариев: 0/

Название: 5G and 6G Communication Technologies
Автор: Zoran Gacovski
Издательство: Arcler Press
Год: 2022
Страниц: 438
Язык: английский
Формат: pdf (true)
Размер: 16.2 MB

This book covers different topics from 5G and 6G mobile technologies, including: telecommunication, antenna and bandwidth aspects of 5G, business solutions enabled by 5G technology, different application scenarios of 5G, and topics from the 6G technology. Section 1 focuses on telecommunication, antenna and bandwidth aspects of 5G, describing mobile communication through 5G technology, a review in the core technologies of 5G: device-to-device communication, multi-access edge computing and network function virtualization, design of a multiband patch antenna for 5G communication systems, wideband reconfigurable millimeter-wave linear array antenna using liquid crystal for 5G networks, and FBMC vs OFDM waveform contenders for 5G wireless communication system. Section 2 focuses on business solutions enabled by 5G technology, describing the roles of 5G mobile broadband in the development of IoT, big data, cloud and SDN, planning and profit sharing in overlay Wi-Fi and LTE systems toward 5G networks, construction of enterprise 5G business ecosystem - case study of Huawei, and 5G new radio prototype implementation based on SDR.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Essentials of Cloud Computing: A Holistic, Cloud-Native Perspective, Second Edition
/ Комментариев: 0/

Название: Essentials of Cloud Computing: A Holistic, Cloud-Native Perspective, Second Edition
Автор: Chellammal Surianarayanan, Pethuru Raj Chelliah
Издательство: Springer
Год: 2023
Страниц: 368
Язык: английский
Формат: pdf (true), epub
Размер: 27.8 MB

Numerous advancements are being brought in and incorporated into the cloud domain with the aim of realizing a trove of deeper and decisive automations. Rather than discussing the cloud paradigm in isolation, this fully updated text examines how cloud computing can work collaboratively with other computing models to meet the needs of evolving trends.This multi-dimensional approach encompasses the challenges of fulfilling the storage requirements of big data, the use of the cloud as a remote server for Internet of Things and sensor networks, and an investigation of how cloud computing is interlinked with other established computing phenomenon such as edge computing. New chapters illustrate the distinct ideals of the cloud-native computing, proclaimed as the next-generation cloud computing paradigm.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Blockchain Technology for IoT and Wireless Communications
/ Комментариев: 0/

Название: Blockchain Technology for IoT and Wireless Communications
Автор: Gajula Ramesh, Budati Anil Kumar, Praveen Jugge
Издательство: CRC Press
Год: 2024
Страниц: 165
Язык: английский
Формат: pdf (true)
Размер: 14.6 MB

Smart communications are the concept in which smart appliances and devices are integrated into an application that runs in a smart hand-held device. The residents of a smart home can have complete control over their home’s electronic gadgets using wireless communications. These technologies can help people control gadgets in the home/office remotely and often simultaneously, which increases convenience and reduces time spent on these tasks. However, problems can arise in the security systems associated with these smart devices; security may be compromised when there are loopholes or human mistakes. When security credentials are lost, overall security can also be lost. This is because smart technology is made up of plenty of devices that are integrated with Internet of Things (IoT) technology and the cloud. This environment can introduce many security issues, as discussed in this text. Blockchain is a promising technology that operates in a decentralized environment to protect devices and the data collected by devices from security and privacy issues by using wireless communication technology. Blockchain-enabled IoT can be used to achieve end-to-end security. Blockchain technology is already used in wireless sensor/communication networks to estimate and predict house data and civil structures.