Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Принципы построения, применения и проектирования коммуникационной платформы U-SYS
Автор: Росляков А.В., Крылов П.С.
Издательство: СОЛОН-Пресс
Год: 2016
Формат: pdf
Размер: 19 мб
Язык: русский

В учебном пособии рассмотрены принципы построения, применения и проектирования оборудования коммуникационной платформы U-SYS компании Huawei (Китай), используемой для построения сетей связи следующего поколения NGN.
Разместил: rivasss 29-11-2021, 10:56 | Комментарии: 0 | Подробнее
Information Risk Management: A practitioner's guide, 2nd EditionНазвание: Information Risk Management: A practitioner's guide, 2nd Edition
Автор: David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2021
Страниц: 240
Язык: английский
Формат: pdf (true), epub
Размер: 22.2 MB

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline. Some experts believe that the threat and vulnerability assessments should be carried out ahead of the impact assessments; others disagree and opt for the reverse arrangement. I believe that, in practice, either method will suffice as long as the information assets have been clearly identified, but that it can be extremely helpful if the threat and vulnerability assessments can be performed at the same time as impact assessments, since many of the threats and vulnerabilities will be apparent to the information asset owners.
Разместил: Ingvar16 28-11-2021, 17:03 | Комментарии: 0 | Подробнее
Название: A - значит Anonymous. Иллюстрированная история хакерской группировки, изменившей мир
Автор: Кушнер Дэвид
Издательство: Бомбора
Год: 2021
Формат: PDF
Страниц: 123
Размер: 45.3 Mb
Язык: Русский

Они не прощают. Они не забывают. Они — Anonymous, самая засекреченная и в то же время знаменитая хакерская группировка современности. Что о ней известно? Да практически ничего. Лишь такому мастеру, как Дэвид Кушнер, автору бестселлеров «Повелители DOOM» и «Потрачено. Беспредельная история GTA», под силу проникнуть в самое сердце Anonymous и услышать невыдуманные истории легендарных хакеров, рассказанные ими самими. Этот комикс — результат потрясающего творческого союза Кушнера и Корена Шадми, американского художника, вошедшего в список Топ-100 лучших иллюстраторов современности. Книга захватит с первых страниц и не отпустит, пока вы не дочитаете ее до конца.
Разместил: vitvikvas 28-11-2021, 15:51 | Комментарии: 0 | Подробнее
Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd EditionНазвание: Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd Edition
Автор: Orin Thomas
Издательство: Microsoft Press/Pearson Education
Год: 2022
Страниц: 368
Язык: английский
Формат: epub
Размер: 45.3 MB

Prepare for the updated version of Microsoft Exam MS-100 and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. The MS-100 exam deals with advanced topics that require candidates to have an excellent working knowledge of Microsoft 365 identity and services functionality. Some of the exam relates to topics that even experienced Microsoft 365 administrators may rarely encounter unless they are consultants who deploy new Microsoft 365 tenancies on a regular basis.
Разместил: Ingvar16 27-11-2021, 19:20 | Комментарии: 0 | Подробнее
Название: Algorithmic Mechanism Design for Internet of Things Services Market
Автор: Yutao Jiao, Ping Wang, Dusit Niyato
Издательство: Springer
Год: 2022
Формат: ePUB, PDF
Страниц: 120
Размер: 19,1 Mb
Язык: English

This book establishes game-theoretical frameworks based on the mechanism design theory and proposes strategy-proof algorithms, to optimally allocate and price the related IoT services, so that the social welfare of IoT ecosystem or the service provider’s revenue can be maximized and the IoT service provision can be sustainable. This book is written by experts based on the recent research results on the interaction between the service providers and users in the IoT system. Since the IoT networks are essentially supported by data, communication, and computing resources, the book focuses on three representative IoT services, including the data analytics services, the cloud/fog computing services for blockchain networks, and the wireless powered data crowdsourcing services. Researchers, scientists, and engineers in the field of resource allocation and service management for future IoT ecosystem can benefit from the book. As such, this book provides valuable insights and practical methods, especially the novel deep learning-based mechanism that can be considered in the emerging IoT technology.
Разместил: vitvikvas 27-11-2021, 15:09 | Комментарии: 0 | Подробнее

Название: Lifecycle IoT Security for Engineers
Автор: Dhondge Kaustubh
Издательство: Artech House
Год: 2021
Формат: PDF
Страниц: 215
Размер: 16 mb
Язык: English

This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way.
Разместил: wildman 27-11-2021, 13:47 | Комментарии: 0 | Подробнее
Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum ComputingНазвание: Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing
Автор: Mehmet Toy
Издательство: Springer
Год: 2021
Страниц: 461
Язык: английский
Формат: pdf (true)
Размер: 15.3 MB

Future networks will be heterogonous as the current networks. The main difference would be that the future networks will include hyperscalers and space networks and end-to-end automation. Perhaps the transaction-based usage billing for services is highly likely. In this book, we describe future applications and services, current and future underlay and overlay networks, an overall service architecture, an overall management architecture, and various techniques in building future networks and services such as routing, security, quality of service (QoS), burst switching, 5G and 6G, MEC, AI/ML, Application Programming Interfaces (APIs), Network Slicing, and Quantum Computing.
Разместил: Ingvar16 26-11-2021, 18:22 | Комментарии: 0 | Подробнее
Connectivity and Edge Computing in IoT: Customized Designs and AI-based SolutionsНазвание: Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions
Автор: Jie Gao, Mushu Li, Weihua Zhuang
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 177
Язык: английский
Формат: pdf (true), epub
Размер: 21.1 MB

This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions.
Разместил: Ingvar16 26-11-2021, 15:32 | Комментарии: 0 | Подробнее
Название: Internet of Things and Its Applications
Автор: Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Suneeta Satpathy
Издательство: Springer
Год: 2022
Формат: PDF
Страниц: 562
Размер: 23,5 Mb
Язык: English

This book offers a holistic approach to the Internet of Things (IoT) model, covering both the technologies and their applications, focusing on uniquely identifiable objects and their virtual representations in an Internet-like structure. The authors add to the rapid growth in research on IoT communications and networks, confirming the scalability and broad reach of the core concepts. The book is filled with examples of innovative applications and real-world case studies. The authors also address the business, social, and legal aspects of the Internet of Things and explore the critical topics of security and privacy and their challenges for both individuals and organizations. The contributions are from international experts in academia, industry, and research.
Разместил: vitvikvas 26-11-2021, 12:48 | Комментарии: 0 | Подробнее
IoT and Cloud Computing for Societal GoodНазвание: IoT and Cloud Computing for Societal Good
Автор: Jitendra Kumar Verma, Deepak Saxena
Издательство: Springer
Серия: EAI/Springer Innovations in Communication and Computing
Год: 2022
Страниц: 331
Язык: английский
Формат: pdf (true), epub
Размер: 35.9 MB

Internet of Things (IoT) and Cloud Computing are two recent innovations that have transformed business and industry. This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book is organized into four parts focusing on different aspects of IoT and cloud computing: Part III deals with the optimization of existing IoT and cloud technology. Chapter 12 discusses multi-modal feature analysis for precise human hand gesture recognition. This would find useful application particularly in the domain of virtual reality. Finally, Part IV of the book deals with the security and privacy in IoT and cloud computing. Chapter 16 discusses the application of artificial intelligence for enhancing security of IoT devices. Chapter 17 takes an outward perspective by focusing on cyber-attacks, attack vectors, and remedies in the context of IoT devices. Chapter 18 proposes a privacy-secure link utilization routing algorithm for improving performance in IoT and cloud computing.
Разместил: Ingvar16 25-11-2021, 20:07 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности