|
|
|
|
|
|
|
| |
|
Название: Information Security and Optimization Автор: Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta Издательство: CRC Press Год: 2021 Формат: True PDF Страниц: 224 Размер: 23 Mb Язык: English
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. |
Разместил: bomboane 5-10-2020, 09:42 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Hacking Multifactor Authentication Автор: Roger A. Grimes Издательство: Wiley Год: 2021 Формат: PDF Страниц: 576 Размер: 20 Mb Язык: English
Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. |
Разместил: vitvikvas 4-10-2020, 04:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition Автор: Mike Chapple, David Seidl Издательство: Wiley Год: 2020 Формат: true pdf, epub Страниц: 528 Размер: 19.2 Mb, 47.5 Mb Язык: English
Efficiently prepare yourself for the demanding CompTIA CySA+ exam CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practice exams for a total of 1000 practice questions |
Разместил: bomboane 3-10-2020, 23:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: 5G Multimedia Communication: Technology, Multiservices, and Deployment Автор: Edited by Zoran S. Bojkovic, Dragorad A. Milovanovic, and Tulsi Pawan Fowdur Издательство: CRC Press Год: 2021 Формат: PDF Страниц: 357 Размер: 16.17 МБ Язык: English
In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Deployment, the aim is to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The past two decades have witnessed an extremely fast evolution of mobile cellular network technology. The fifth generation of mobile wireless systems has achieved the first milestone toward finalization and deployment by 2020. |
Разместил: ak5812 2-10-2020, 14:52 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Communication Protocols: Principles, Methods and Specifications Автор: Drago Hercog Издательство: Springer Год: 2020 Формат: True PDF Страниц: 382 Размер: 11.4 Mb Язык: English
This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book. |
Разместил: bomboane 1-10-2020, 22:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Введение в вычислительные сети и кибербезопасность Автор: Ву Хван-Хуа [Джон], Ирвинг Дж. Дэвид Издательство: Астана: Холдинг «К?сіп?ор» Год: 2017 Формат: pdf, djvu Страниц: 610 Размер: 18 mb Язык: Русский
Трудно переоценить важность вычислительных сетей и сетевой безопасности в современном мире. Они стали неотъемлемой частью нашего существования, где минутное изображение требует описать множество способов, которые по существу влияют на каждый аспект нашей жизни. |
Разместил: na5ballov 1-10-2020, 16:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain technologies and Crypto-currencies Автор: Jovan Pehcevski Издательство: Arcler Press Год: 2020 Формат: PDF Страниц: 414 Размер: 10 Mb Язык: English
Blockchain Technologies and Crypto-Currencies takes into account the methods and technologies involved in blockchain along with its significant application in the field of finance. It includes the analysis of R & D capability of china’s blockchain technology and implementation of blockchain as a breakthrough in the development of artificial intelligence. This book also discusses about Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys, Blockchain Platform for Industrial Internet of Things, Blockchain Based Credibility Verification Method, Research on a New Signature Scheme on Blockchain and IOV Privacy Protection System Based on Double-Layered Chains. It also provides the reader with the insights of crypto-currencies and blockchain technologies in order to analyze the impact of blockchain technologies in the field of finance and its application to the Internet of things (IoT). |
Разместил: vitvikvas 1-10-2020, 10:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance Автор: Damodar Reddy Edla, Mahesh Chowdary Kongara, Amruta Lipare, Venkatanareshbabu Kuppili, Kannadasan K Издательство: CRC Press Год: 2021 Формат: PDF Страниц: 147 Размер: 10.32 МБ Язык: English
Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance provides an integrative overview of bio-inspired algorithms and their applications in the area of Wireless Sensor Networks (WSN). Along with the usage of the WSN, the number of risks and challenges occurs while deploying any WSN. Therefore, to defeat these challenges some of the bio-inspired algorithms are applied and discussed in this book. |
Разместил: ak5812 30-09-2020, 19:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Я++. Человек, город, сети Автор: Митчелл Уильям Издательство: Strelka Press Год: 2012 Страниц: 328 Формат: pdf Размер: 15,9 мб Качество: хорошее Язык: русский
Одна из последних книг американского теоретика архитектуры и дизайна Уильяма Дж. Митчелла "Я++: Человек, город, сети" посвящена влиянию беспроводных технологий, глобальной коммуникации и миниатюризации техники на повседневную жизнь современного человека. |
Разместил: gol8425 30-09-2020, 12:38 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: GPEN GIAC Certified Penetration Tester All-in-One Exam Guide Автор: Raymond Nutting, William MacCormack Издательство: McGraw-Hill Education Год: 2020 Страниц: 480 Язык: английский Формат: epub Размер: 35.4 MB
This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam. This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference. |
Разместил: Ingvar16 29-09-2020, 19:49 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|