" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 219

: Internet of Things. Information Processing in an Increasingly Connected World
: Leon Strous, Vinton G. Cerf
: Springer
ISBN: 3030156508
: 2018
: 243
:
: pdf (true), epub
: 27.3 MB

This book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018.
The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 plenary contributions, an invited talk and a position paper from the IFIP domain committee on IoT. The papers cover a wide range of topics from a technology to a business perspective and include among others hardware, software and management aspects, process innovation, privacy, power consumption, architecture, applications.
: Ingvar16 , 02:47 | : 0 |
: Network Programmability with YANG: Data Modeling-driven Management with YANG
: Benoit Claise, Joe Clarke
: Addison-Wesley Professional
ISBN: 0135180392
: 2019
: 500
:
: pdf
: 21.7 MB

The entire networking industry is being pressured to automate to scale and move faster. In modern networks, you just cant manage everything by hand anymore. You need to automate relentlessly, and the most practical way to do so is with YANG and NETCONF. But existing documentation on these technologies has been poor, jargon-filled, or non-existent, so most implementers have been forced to learn by trial and error. Now, Network Programmability with YANG gives them comprehensive and reliable guidance for unlocking the power of network automation using model-driven APIs and protocols. Written by three leaders of the YANG development effort, this plain-spoken book guides networking professionals in successfully applying software practices based on YANG data models.
: Ingvar16 18-03-2019, 20:02 | : 0 |
: Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
: Jeff Bollinger, Brandon Enright, Matthew Valites
: O'Reilly Media
ISBN: 1491949406
: 2015
: 275
:
: pdf (true), epub
: 17.7 MB

Any good attacker will tell you that expensive security monitoring and prevention tools arent enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. Youll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.
: Ingvar16 18-03-2019, 19:43 | : 0 |
: QoS for Fixed and Mobile Ultra-Broadband
: Toni Janevski
: Wiley-IEEE Press
ISBN: 1119470501
: 2019
: 344
:
: pdf (true)
: 10.17 MB

Provides extensive coverage of standardized QoS technologies for fixed and mobile ultra-broadband networks and servicesbringing together technical, regulation, and business aspects. The Quality of Service (QoS) has been mandatory for traditional telecommunication services such as telephony (voice) and television (TV) since the first half of the past century, however, with the convergence of telecommunication networks and services onto Internet technologies, the QoS provision remains a big challenge for all ICT services, not only for traditional ones. This book covers the standardized QoS technologies for fixed and mobile ultra-broadband networks and services, including the business aspects and QoS regulation framework, which all will have high impact on the ICTs in the current and the following decade.
: Ingvar16 18-03-2019, 18:39 | : 0 |
: Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
: Slava Gomzin
: Wiley
: 2014
: PDF
: 312
: 33.9 Mb
: English

Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.
: Ice Zero 18-03-2019, 17:28 | : 0 |
: Internet Daemons: Digital Communications Possessed
: Fenwick McKelvey
: University of Minnesota Press
ISBN: 1517901545
: 2018
: 336
:
: pdf (true), djvu
: 10.1 MB

A complete history and theory of internet daemons brings these little-knownbut very consequentialprograms into the spotlight.
We're used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net's infrastructureas well as the devices we use to access itdaemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our livesincluding their role in hot-button issues like network neutrality.
: Ingvar16 17-03-2019, 18:01 | : 0 |
:
: ..
: :
: 2011
C: 401
: pdf
: 12
:

, , , , .
: rivasss 17-03-2019, 09:31 | : 0 |
: Big Data and Software Defined Networks
: Javid Taheri
: The Institution of Engineering and Technology
ISBN: 1785613049
: 2018
: 504
:
: pdf (true)
: 36.3 MB

Big Data Analytics and Software Defined Networking (SDN) are helping to drive the management of data and usage of the extraordinary increase of computer processing power provided by Cloud Data Centres (CDCs). SDN helps CDCs run their services more efficiently by enabling managers to configure, manage, secure, and optimize the network resources very quickly. Big-Data Analytics in turn has entered CDCs to harvest the massive computing powers and deduct information that was never reachable by conventional methods. Big Data and Software Defined Networks investigates areas where Big-Data and SDN can help each other in delivering more efficient services.
: Ingvar16 17-03-2019, 04:44 | : 0 |
: .
: . , .
:
: 2004
: pdf
: 732
: 58,7 Mb
:

- , : , , , , , . , .
, , , .
: MIHAIL62 16-03-2019, 16:17 | : 0 |
: Learning Regular Expressions
: Ben Forta
: Addison-Wesley Professional
: 2018
: ePUB
: 144
: 2 Mb
: English

Learn to use one of the most powerful text processing and manipulation tools available
Regular expression experts have long been armed with an incredibly powerful tool, one that can be used to perform all sorts of sophisticated text processing and manipulation in just about every language and on every platform. Thats the good news. The bad news is that for too long, regular expressions have been the exclusive property of only the most tech savvy. Until now.
: Ice Zero 16-03-2019, 11:36 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 219




 MirKnig.Su  2018