СЕТЕВЫЕ ТЕХНОЛОГИИ » Страница 88
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
IoT and Big Data Analytics for Smart Cities: A Global Perspective
/ Комментариев: 0/

IoT and Big Data Analytics for Smart Cities: A Global PerspectiveНазвание: IoT and Big Data Analytics for Smart Cities: A Global Perspective
Автор: Sathiyaraj Rajendran, Munish Sabharwal, Gheorghita Ghinea
Издательство: CRC Press
Год: 2023
Страниц: 225
Язык: английский
Формат: pdf (true)
Размер: 17.9 MB

The book IoT and Big Data Analytics (IoT-BDA) for Smart Cities – A Global Perspective, emphasizes the challenges, architectural models, and intelligent frameworks with smart decisionmaking systems using Big Data and IoT with case studies. The book illustrates the benefits of Big Data and IoT methods in framing smart systems for smart applications. The text is a coordinated amalgamation of research contributions and industrial applications in the field of smart cities. With advanced technologies, traditional human life has been migrated to a digital world. It has been observed that many of the advanced applications have been developed with the integration of advanced smart technologies like Artificial Intelligence (AI), cognitive computing, Machine Learning (ML), Big Data analytics, business intelligence, and Internet of Things (IoT). Among these technologies, Big Data Analytics with the integration IoT, offers extensive variety of applications and plays a vital role in assisting and managing smart city applications.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Emerging Real-World Applications of Internet of Things
/ Комментариев: 0/

Emerging Real-World Applications of Internet of ThingsНазвание: Emerging Real-World Applications of Internet of Things
Автор: Anshul Verma, Pradeepika Verma, Yousef Farhaoui
Издательство: CRC Press
Год: 2023
Страниц: 273
Язык: английский
Формат: pdf (true)
Размер: 11.2 MB

The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provides smart devices for home automation as well as business solutions for delivering insights into everything from real-time monitoring of working systems to supply chain and logistics operations. The IoT has become one of the most prominent technological inventions of the 21st century. Due to the versatility of IoT devices, there are numerous real-world applications of the IoT in various domains such as smart home, smart city, health care, agriculture, industry, and transportation.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
/ Комментариев: 0/

What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st CenturyНазвание: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
Автор: Shimon Brathwaite
Издательство: CRC Press
Год: 2023
Страниц: 189
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release)
/ Комментариев: 0/

Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release)Название: Kafka Connect: Build Data Pipelines by Integrating Existing Systems (Sixth Early Release)
Автор: Mickael Maison, Kate Stanley
Издательство: O’Reilly Media, Inc.
Год: 2022-10-06
Страниц: 260
Язык: английский
Формат: epub (true), mobi
Размер: 10.08 MB

Used by more than 80% of Fortune 100 companies, Apache Kafka has become the de facto event streaming platform. Kafka Connect is a key component of Kafka that lets you flow data between your existing systems and Kafka to process data in real time. With this practical guide, authors Mickael Maison and Kate Stanley show data engineers, site reliability engineers, and application developers how to build data pipelines between Kafka clusters and a variety of data sources and sinks. Connect allows you to quickly adopt Kafka by tapping into existing data and enabling many advanced use cases. No matter where you are in your event streaming journey, Kafka Connect is the ideal tool for building a modern data pipeline.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
/ Комментариев: 0/

Название: What Every Engineer Should Know About Cyber Security and Digital Forensics, 2nd Edition
Автор: Joanna F. DeFranco and Bob Maley
Издательство: CRC Press
Год: 2023
Формат: True PDF
Страниц: 199
Размер: 13,5 Mb
Язык: English

Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cloud Computing Technology
/ Комментариев: 0/

Cloud Computing TechnologyНазвание: Cloud Computing Technology
Автор: Huawei Technologies Co., Ltd.
Издательство: Springer
Год: 2023
Страниц: 389
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, Big Data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and Artificial Intelligence (AI).


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid
/ Комментариев: 0/

Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably ParanoidНазвание: Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid
Автор: Seth Enoka
Издательство: No Starch Press
Год: 2022
Страниц: 226
Язык: английский
Формат: pdf (true), epub (true), mobi
Размер: 21.9 MB

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion. For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
How to Hack Like a Legend: Breaking Windows
/ Комментариев: 0/

How to Hack Like a Legend: Breaking WindowsНазвание: How to Hack Like a Legend: Breaking Windows
Автор: Sparc Flow
Издательство: No Starch Press
Год: 2022
Страниц: 218
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Cybersecurity: A Practical Engineering Approach
/ Комментариев: 0/

Cybersecurity: A Practical Engineering ApproachНазвание: Cybersecurity: A Practical Engineering Approach
Автор: Henrique M. D. Santos
Издательство: CRC Press
Серия: Chapman & Hall/CRC Textbooks in Computing
Год: 2022
Страниц: 341
Язык: английский
Формат: pdf (true), epub
Размер: 16.9 MB

Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. Kerberos is a network authentication protocol, aiming to achieve strong authentication using secret-key cryptography, in a local network environment with shared services. In fact, it embraces several sub protocols to accomplish that goal. Pentest (short for Penetration Test, and also referred to by Ethical Hacking) is a fundamental activity in Cybersecurity, aiming to test a computerized system against possible failures resulting from simulated malicious activity.


Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Semantic Models in IoT and eHealth Applications
/ Комментариев: 0/

Semantic Models in IoT and eHealth ApplicationsНазвание: Semantic Models in IoT and eHealth Applications
Автор: Sanju Tiwari, Fernando Ortiz Rodriguez
Издательство: Academic Press, Elsevier
Серия: Intelligent Data-Centric Systems
Год: 2022
Страниц: 292
Язык: английский
Формат: pdf (true)
Размер: 12.8 MB

Semantic Models in IoT and eHealth Applications explores the key role of semantic web modeling in eHealth technologies, including remote monitoring, mobile health, cloud data and biomedical ontologies. The book explores different challenges and issues through the lens of various case studies of healthcare systems currently adopting these technologies. Chapters introduce the concepts of semantic interoperability within a healthcare model setting and explore how semantic representation is key to classifying, analyzing and understanding the massive amounts of biomedical data being generated by connected medical devices.