СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 64
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity for Smart Cities: Practices and Challenges
/ Комментариев: 0/

Cybersecurity for Smart Cities: Practices and ChallengesНазвание: Cybersecurity for Smart Cities: Practices and Challenges
Автор: Mohiuddin Ahmed, Paul Haskell-Dowland
Издательство: Springer
Год: 2023
Страниц: 210
Язык: английский
Формат: pdf (true), epub
Размер: 14.5 MB

Ensuring cybersecurity for smart cities is crucial for a sustainable cyber ecosystem. Given the undeniable complexity of smart cities, fundamental issues such as device configurations and software updates should be addressed when it is most needed to fight cyber-crime and ensure data privacy. This book addresses the cybersecurity challenges associated with smart cities, aiming to provide a bigger picture of the concepts, intelligent techniques, practices and research directions in this area. Furthermore, this book serves as a single source of reference for acquiring knowledge on the technology, processes and people involved in the next-generation of cyber-smart cities. Internet of Things (IoT) is defined as a network of connected physical objects with sensors and ability of processing data with several other technological devices in order to be able to connect and exchange data within each other. Any particular thing or electrical device that has the capability to get connected to the internet and exchange data as a part of information comes under the umbrella of IoT. Several traditionally common but new disruption of IoT includes, Smart home, Smart healthcare system, automotive waste management system, mobile pharmacy, smart fire alarms, smart traffic management, smart security system, and smart city etc.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Intelligent Green Communication Network for Internet of Things
/ Комментариев: 0/

Intelligent Green Communication Network for Internet of ThingsНазвание: Intelligent Green Communication Network for Internet of Things
Автор: Rajan Patel, Nimisha Patel, Linda Smail
Издательство: CRC Press
Год: 2023
Страниц: 267
Язык: английский
Формат: pdf (true)
Размер: 14.3 MB

The text covers the advanced and innovative concept of green communication networks using the Internet of Things in different fields including cloud technology, agriculture, the automobile sector, and robotics. It will also help readers in learning the efficient use of sensors and devices in the Internet of Things networks. The text covers 5G communication and its application for intelligent and green network-enabled Internet of Things. The Internet of Things (IoT) has transformed how we work and live due to rapid technological advancements. Despite the obvious benefits of IoT, which, in turn, benefits our society, it’s worth remembering that IoT also uses energy, contributes to harmful contamination, and harms the environment. E-waste puts additional strain on the ecosystem. The world is becoming smarter. To enhance the advantages while lowering the costs, despite the dangers of IoT, there is a growing desire to relocate. Green IoT is widely viewed as the IoT’s future and good for the environment.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Your System's Sweetspots: CEO's Advice on Basic Cyber Security
/ Комментариев: 0/

Your System's Sweetspots: CEO's Advice on Basic Cyber SecurityНазвание: Your System's Sweetspots: CEO's Advice on Basic Cyber Security
Автор: Warren H. Lau
Издательство: INPress International
Год: 2023
Страниц: 188
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Computer Systems Nowadays have become more sophisticated, more convenient to use, however, the convenience comes in a price. The system nowadays are more vulnerable to cyber attacks! What to do if your computer/ smartphone/ website server is compromised? What to do if your email account is PWNed? Or, if your friends, relatives or employers face the above problem, what would you do to help them? In this book, you will learn about the most recent hackers tricks, most prevalent form of cyberattacks that personal computers and website managers nowadays have to deal with. One of the best things you can do in business is to pre-test the security of all your interacting objects - websites, mobile applications, networks, etc. Complying with the law is just as important as protecting your systems and networks from criminal hacker attacks. Ethical hackers and penetration testers can secure potential entry points, make sure all systems and applications are password protected, and secure network infrastructure with a firewall.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Digital Twin: A Dynamic System and Computing Perspective
/ Комментариев: 0/

Digital Twin: A Dynamic System and Computing PerspectiveНазвание: Digital Twin: A Dynamic System and Computing Perspective
Автор: Ranjan Ganguli, Sondipon Adhikari, Souvik Chakraborty, Mrittika Ganguli
Издательство: CRC Press
Год: 2023
Страниц: 252
Язык: английский
Формат: pdf (true)
Размер: 28.3 MB

The digital twin of a physical system is an adaptive computer analog which exists in the cloud and adapts to changes in the physical system dynamically. This book introduces the computing, mathematical, and engineering background to understand and develop the concept of the digital twin. It provides background in modeling/simulation, computing technology, sensor/actuators, and so forth, needed to develop the next generation of digital twins. Concepts on cloud computing, Big Data, IoT, wireless communications, high-performance computing, and blockchain are also discussed. Sensors can also be connected to prototyping boards such as the Arduino Uno and Raspberry Pi 2 which then allow them (sensors) to become part of the Internet of Things (IoT). Algorithms based on pattern recognition methods such as Machine Learning, fuzzy logic, etc., can also be used for data processing or feature extraction.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Основы современной криптографии
/ Комментариев: 0/

Название: Основы современной криптографии
Автор: Баричев С.Г., Серов Р.Е.
Издательство: М.: Горячая Линия — Телеком
Год: 2006
Cтраниц: 152
Формат: pdf
Размер: 12 мб
Язык: русский

Интересная книга по основам криптографии. В первой главе рассказывается история криптографии, основные понятия и определения, требования к криптосистемам, а также краткие сведения о криптоанализе. Далее рассматриваются традиционные симметричные и асимметричные криптосистемы, включая Криптосистемы Эль-Гамаля, Диффи-Хеллмана, Ривеста-Шамира-Адлемана, Меркля-Хеллмана и Хора-Ривеста, а также криптосистемы, основанные на эллиптических кривых.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Introduction to Wireless Networking and Its Impact on Applications
/ Комментариев: 0/

Introduction to Wireless Networking and Its Impact on ApplicationsНазвание: Introduction to Wireless Networking and Its Impact on Applications
Автор: Peter Steenkiste
Издательство: Springer
Серия: Synthesis Lectures on Mobile & Pervasive Computing
Год: 2023
Страниц: 131
Язык: английский
Формат: pdf (true), epub
Размер: 14.2 MB

This book teaches readers how wireless networks work, why some of their properties impact wireless network performance at the application level, and what both network engineers and application developers can do to cope with these challenges. Internet users increasingly rely on wireless access links for diverse tasks such as web browsing, video conferencing, interactive games, and data sharing. Irrespective of how they access the Internet, they expect good performance and a high quality of experience. Unfortunately, wireless access networks are much more challenging to build than wired networks. In wired networks, signals used for communication are contained in a carefully engineered transmission medium. In contrast, wireless signals travel in our physical environment, where the presence of obstacles, interference, and mobility can affect communication. In addition, network performance can differ significantly across physical environments. As a result, the performance of wireless links is often lower and less predictable than that of wired links. The author structured the book according to the layers in the Internet protocol stack, similar to traditional network books. However, rather than presenting a general description of each layer, the focus is on wireless networks and how they differ from wired networks.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
/ Комментариев: 0/

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing ToolsНазвание: Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Автор: Dr. Hidaia Mahmood Alassouli
Издательство: Independently published
Год: 2023
Страниц: 179
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Burp Suite is an integrated platform/graphical tool for performing security testing of web applications. Burp suite is a java application that can be used to secure or crack web applications. The suite consists of different tools, like a proxy server, a web spider an intruder and a so-called repeater, with which requests can be automated. You can use Burp's automated and manual tools to obtain detailed information about your target applications. Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment. In this report I am using a combination of Burp tools to detect and exploit vulnerabilities in Damn Vulnerable Web App (DVWA) with low security. By default, Burp Scanner scans all requests and responses that pass through the proxy. Burp lists any issues that it identifies under Issue activity on the Dashboard. You can also use Burp Scanner to actively audit for vulnerabilities. Scanner sends additional requests and analyzes the application's traffic and behavior to identify issues.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IoT Enabled Multi-Energy Systems : From Isolated Energy Grids to Modern Interconnected Networks
/ Комментариев: 0/

IoT Enabled Multi-Energy Systems : From Isolated Energy Grids to Modern Interconnected NetworksНазвание: IoT Enabled Multi-Energy Systems : From Isolated Energy Grids to Modern Interconnected Networks
Автор: Mohammadreza Daneshvar, Behnam Mohammadi-Ivatloo
Издательство: Academic Press/Elsevier
Год: 2023
Страниц: 191
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

IoT-Enabled Multi-Energy Systems: From Isolated Energy Grids to Modern Interconnected Networks proposes practical solutions for the management and control of energy interactions throughout the interconnected energy infrastructures of the future multi-energy grid. The book discusses a panorama of modeling, planning and optimization considerations for IoT technologies, their applications across grid modernization, and the coordinated operation of multi-vector energy grids. The work is suitable for energy, power, mechanical, chemical, process and environmental engineers, and highly relevant for researchers and postgraduate students who work on energy systems. Sections address core theoretical underpinnings, significant challenges and opportunities, how to support IoT-based developed expert systems, and how AI can empower IoT technologies to sustainably develop fully renewable modern multi-carrier energy networks. Contributors address artificial intelligence technology and its applications in developing IoT-based technologies, cloud-based intelligent energy management schemes, Data Science and multi-energy Big Data analysis, Machine Learning and Deep Learning techniques in multi-energy systems, and much more.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Channel Coding in 5G New Radio
/ Комментариев: 0/

Channel Coding in 5G New RadioНазвание: Channel Coding in 5G New Radio
Автор: Jun Xu, Yifei Yuan
Издательство: CRC Press
Год: 2023
Страниц: 330
Язык: английский
Формат: pdf (true)
Размер: 50.6 MB

This book provides a comprehensive coverage of major channel codes adopted since the 3rd generation of mobile communication. Modulation schemes suitable for 5G mobile communications are also described based on key New Radio application scenarios and performance requirements. It covers low density parity check (LDPC) codes, Polar codes, tail-biting convolutional codes (TBCC) and Turbo codes. Outer codes and a few advanced coding and modulations are also discussed. In addition, it includes detailed illustration of each channel coding scheme such as the basic code structure, decoding algorithms, performance evaluation and complexity analysis. The book offers insights on why and how channel codes are designed and developed in standardization organizations, which significantly facilitates the reading and understanding of the of 5G channel coding technologies.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Beyond Edge Computing: Swarm Computing and Ad-hoc Edge Clouds
/ Комментариев: 0/

Beyond Edge Computing: Swarm Computing and Ad-hoc Edge CloudsНазвание: Beyond Edge Computing: Swarm Computing and Ad-hoc Edge Clouds
Автор: Ana Juan Ferrer
Издательство: Springer
Год: 2023
Страниц: 197
Язык: английский
Формат: pdf (true), epub
Размер: 22.3 MB

This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture. Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures.