Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Information Security and Optimization
Автор: Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 224
Размер: 23 Mb
Язык: English

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.
Разместил: bomboane 5-10-2020, 09:42 | Комментарии: 0 | Подробнее
Название: Hacking Multifactor Authentication
Автор: Roger A. Grimes
Издательство: Wiley
Год: 2021
Формат: PDF
Страниц: 576
Размер: 20 Mb
Язык: English

Protect your organization from scandalously easy-to-hack MFA security “solutions”
Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually easy to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. Hacking Multifactor Authentication will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised.
Разместил: vitvikvas 4-10-2020, 04:47 | Комментарии: 0 | Подробнее
Название: CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition
Автор: Mike Chapple, David Seidl
Издательство: Wiley
Год: 2020
Формат: true pdf, epub
Страниц: 528
Размер: 19.2 Mb, 47.5 Mb
Язык: English

Efficiently prepare yourself for the demanding CompTIA CySA+ exam
CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practice exams for a total of 1000 practice questions
Разместил: bomboane 3-10-2020, 23:51 | Комментарии: 0 | Подробнее

Название: 5G Multimedia Communication: Technology, Multiservices, and Deployment
Автор: Edited by Zoran S. Bojkovic, Dragorad A. Milovanovic, and Tulsi Pawan Fowdur
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 357
Размер: 16.17 МБ
Язык: English

In bringing to the readers the book 5G Multimedia Communication: Technology, Multiservices and Deployment, the aim is to present current work and direction on the challenging subject of multimedia communications, with theoretical and practical roots. The past two decades have witnessed an extremely fast evolution of mobile cellular network technology. The fifth generation of mobile wireless systems has achieved the first milestone toward finalization and deployment by 2020.
Разместил: ak5812 2-10-2020, 14:52 | Комментарии: 0 | Подробнее
Название: Communication Protocols: Principles, Methods and Specifications
Автор: Drago Hercog
Издательство: Springer
Год: 2020
Формат: True PDF
Страниц: 382
Размер: 11.4 Mb
Язык: English

This book provides comprehensive coverage of the protocols of communication systems. The book is divided into four parts. Part I covers the basic concepts of system and protocol design and specification, overviews the models and languages for informal and formal specification of protocols, and describes the specification language SDL. In the second part, the basic notions and properties of communication protocols and protocol stacks are explained, including the treatment of the logical correctness and the performance of protocols. In the third part, many methods for message transfer, on which specific communication protocols are based, are explained and formally specified in the SDL language. The fourth part provides for short descriptions of some specific protocols, mainly used in IP networks, in order to acquaint a reader with the practical use of communication methods presented in the third part of the book.
Разместил: bomboane 1-10-2020, 22:57 | Комментарии: 0 | Подробнее

Название: Введение в вычислительные сети и кибербезопасность
Автор: Ву Хван-Хуа [Джон], Ирвинг Дж. Дэвид
Издательство: Астана: Холдинг «К?сіп?ор»
Год: 2017
Формат: pdf, djvu
Страниц: 610
Размер: 18 mb
Язык: Русский

Трудно переоценить важность вычислительных сетей и сетевой безопасности в современном мире. Они стали неотъемлемой частью нашего существования, где минутное изображение требует описать множество способов, которые по существу влияют на каждый аспект нашей жизни.
Разместил: na5ballov 1-10-2020, 16:07 | Комментарии: 0 | Подробнее
Название: Blockchain technologies and Crypto-currencies
Автор: Jovan Pehcevski
Издательство: Arcler Press
Год: 2020
Формат: PDF
Страниц: 414
Размер: 10 Mb
Язык: English

Blockchain Technologies and Crypto-Currencies takes into account the methods and technologies involved in blockchain along with its significant application in the field of finance. It includes the analysis of R & D capability of china’s blockchain technology and implementation of blockchain as a breakthrough in the development of artificial intelligence. This book also discusses about Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys, Blockchain Platform for Industrial Internet of Things, Blockchain Based Credibility Verification Method, Research on a New Signature Scheme on Blockchain and IOV Privacy Protection System Based on Double-Layered Chains. It also provides the reader with the insights of crypto-currencies and blockchain technologies in order to analyze the impact of blockchain technologies in the field of finance and its application to the Internet of things (IoT).
Разместил: vitvikvas 1-10-2020, 10:18 | Комментарии: 0 | Подробнее

Название: Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance
Автор: Damodar Reddy Edla, Mahesh Chowdary Kongara, Amruta Lipare, Venkatanareshbabu Kuppili, Kannadasan K
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 147
Размер: 10.32 МБ
Язык: English

Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance provides an integrative overview of bio-inspired algorithms and their applications in the area of Wireless Sensor Networks (WSN). Along with the usage of the WSN, the number of risks and challenges occurs while deploying any WSN. Therefore, to defeat these challenges some of the bio-inspired algorithms are applied and discussed in this book.
Разместил: ak5812 30-09-2020, 19:37 | Комментарии: 0 | Подробнее
Название: Я++. Человек, город, сети
Автор: Митчелл Уильям
Издательство: Strelka Press
Год: 2012
Страниц: 328
Формат: pdf
Размер: 15,9 мб
Качество: хорошее
Язык: русский

Одна из последних книг американского теоретика архитектуры и дизайна Уильяма Дж. Митчелла "Я++: Человек, город, сети" посвящена влиянию беспроводных технологий, глобальной коммуникации и миниатюризации техники на повседневную жизнь современного человека.
Разместил: gol8425 30-09-2020, 12:38 | Комментарии: 0 | Подробнее
GPEN GIAC Certified Penetration Tester All-in-One Exam GuideНазвание: GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Автор: Raymond Nutting, William MacCormack
Издательство: McGraw-Hill Education
Год: 2020
Страниц: 480
Язык: английский
Формат: epub
Размер: 35.4 MB

This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam. This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference.
Разместил: Ingvar16 29-09-2020, 19:49 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности