Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Internet Access in Vehicular NetworksНазвание: Internet Access in Vehicular Networks
Автор: Wenchao Xu, Haibo Zhou
Издательство: Springer
Год: 2021
Страниц: 176
Язык: английский
Формат: pdf (true), epub
Размер: 26.4 MB

This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a Machine Learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme.
Разместил: Ingvar16 19-11-2021, 20:39 | Комментарии: 0 | Подробнее
Mobile Edge Computing by Anwesha MukherjeeНазвание: Mobile Edge Computing
Автор: Anwesha Mukherjee, Debashis De
Издательство: Springer
Год: 2021
Страниц: 598
Язык: английский
Формат: pdf (true)
Размер: 14.7 MB

Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC.
Разместил: Ingvar16 19-11-2021, 18:57 | Комментарии: 0 | Подробнее
Securing Microsoft 365Название: Securing Microsoft 365
Автор: Joe Stocker
Издательство: Publishing Xpert
Год: 2021
Страниц: 270
Язык: английский
Формат: pdf, epub
Размер: 12.6 MB

Learn how to defend against the top cybersecurity threats targeting Microsoft 365 including attacks on Identity, Email and Devices. Network Firewalls have been the de facto security perimeter since they were invented in the late 1980s. If a firewall blocked all incoming traffic from the internet, then the level of difficulty for the hacker was significant. So, what changed? As organizations began adopting Cloud Computing in general, or Software as a Service (SaaS) in particular, the security perimeter shifted to the credentials used to authenticate to internet-connected systems. More than 80% of breaches in the present era can be traced to a guessed or stolen password. For Microsoft 365, the username is the email address, and for 90 percent of all M365 users, it is protected by a single factor (a password). This is a HUGE problem because anyone with an internet connection can attempt to guess the password of nearly any account.
Разместил: Ingvar16 19-11-2021, 15:30 | Комментарии: 0 | Подробнее
Hacking Exposed: Know the secrets of Network SecurityНазвание: Hacking Exposed: Know the secrets of Network Security
Автор: Soumya Ranjan Behera
Издательство: BPB Publications
Год: 2018
Страниц: 206
Язык: английский
Формат: pdf (true)
Размер: 37.4 MB

Basic Guide learn to save yourself from hacking. Book teaches anyone interested to an in-depth discussion of what hacking is all about and to save yourself. Book provides techniques and tools which are used by both criminals and ethical hackers, all the things that you will find here will show you how information security is compromised and how you can identify an attack in a system that you are trying to protect. Furthermore, you will also learn how you can minimise any damage in your system or stop an ongoing attack. This book is written for the benefits of user to save himself from hacking. This book is intended for those who want to know more about information security. This book helps both beginners and intermediates by allowing them to gain in-depth knowledge.
Разместил: Ingvar16 19-11-2021, 15:08 | Комментарии: 0 | Подробнее

Название: 5G and Beyond Wireless Transport Technologies: Enabling Backhaul, Midhaul, and Fronthaul
Автор: Douglas H Morais
Издательство: Springer
Год: 2021
Страниц: 249
Размер: 10,77 МБ
Формат: PDF
Язык: English

This text covers the key technologies employed in wireless links that enable increased data rates and thus are likely to be employed in support of 5G wireless transport networks, i.e., backhaul, midhaul, and fronthaul networks. The author presents technologies at an introductory level but nonetheless at a level that imparts to the reader a sound understanding of the fundamentals.
Разместил: ak5812 18-11-2021, 17:57 | Комментарии: 0 | Подробнее
Название: Оптические системы передачи и транспортные сети
Автор: Фокин В.Г.
Издательство: Эко-Трендз
Год: 2008
Cтраниц: 271
Формат: pdf
Размер: 15 мб
Язык: русский

Изложены основные принципы построения оптических систем передачи, современное определение моделей оптических транспортных сетей с точки зрения Международного Союза Электросвязи (МСЭ), технологии мультиплексирования и сопряжения транспортных сетей. Рассмотрены различные виды сетевых элементов с оптическими и электрическими компонентами и архитектуры сетей на их основе, включая сети синхронизации и управления. Уделено внимание новейшим направлениям развития транспортных сетей на основе стандартов OTN-OTH, Ethernet, T-MPLS, автоматически коммутируемых сетей (ASON/ASTN) и т.д.
Разместил: rivasss 18-11-2021, 15:15 | Комментарии: 0 | Подробнее
Cloud Computing Security: Foundations and Challenges, 2nd EditionНазвание: Cloud Computing Security: Foundations and Challenges, 2nd Edition
Автор: John R. Vacca
Издательство: CRC Press
Год: 2021
Страниц: 522
Язык: английский
Формат: epub
Размер: 19.1 MB

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.
Разместил: Ingvar16 17-11-2021, 18:44 | Комментарии: 0 | Подробнее
Название: Интеллектуальные интерактивные системы и технологии управления удаленным доступом (Методы и модели управления процессами защиты и сопровождения интеллектуальной собственности в сети Internet/Intranet)
Автор: Ботуз С.П.
Издательство: СОЛОН-ПРЕСС
Год: 2016 - 3-е изд., допол.
Cтраниц: 340
Формат: pdf
Размер: 27 мб
Язык: русский

В учебном пособии рассматриваются методы и модели управления удаленным доступом в процессе идентификации и визуализации основных этапов экспертизы (исследования, разработки и патентования) таких объектов интеллектуальной собственности как, например, электронные базы данных и базы знаний, на всем их жизненном цикле в сети Internet. Подробно рассмотрены графо-аналитические методы визуализации области допустимых решений распределенных в сети динамических процессов, объектно-ориентированная технология экспертизы многорежимных систем интерактивного управления.
Разместил: rivasss 17-11-2021, 09:46 | Комментарии: 0 | Подробнее
5G Networks: Background, Issues and SecurityНазвание: 5G Networks: Background, Issues and Security
Автор: Max Hemmings
Издательство: Nova Science Publishers, Inc.
Год: 2021
Страниц: 432
Язык: английский
Формат: pdf (true)
Размер: 20.1 MB

Since the first mobile phones were made available in the 1980s, telecommunication providers have been investing in mobile networks to expand coverage, improve services, and attract more users. First-generation networks supported mobile voice calls but were limited in coverage and capacity. To address those limitations, providers developed and deployed second-generation (2G) mobile networks, then third-generation (3G), and fourth-generation (4G) networks. Each generation offered improved speeds, greater capacity, and new features and services. This book provides a background on mobile technologies, and addresses the race to 5G, factors affecting 5G deployment, and national security.
Разместил: Ingvar16 15-11-2021, 17:29 | Комментарии: 0 | Подробнее
Название: Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking
Автор: Mohd Sohaib
Издательство: BPB Publications
Год: 2022
Формат: ePUB, PDF
Страниц: 850
Размер: 22 Mb
Язык: English

Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more.
Key Features
Courseware and practice papers with solutions for C.E.H. v11.
Includes hacking tools, social engineering techniques, and live exercises.
Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing.
Разместил: vitvikvas 15-11-2021, 14:36 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности