" "



:





...

.. 1 2 3 4 5 6 7 8 9 10 ... 143

: Cloud Computing and Security: Third International Conference, ICCCS 2017, Part 2
: Xingming Sun and Han-Chieh Chao
: Springer
: 2017
: PDF
: 48
: / English

This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.

The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in topical sections such as: information hiding; cloud computing; IOT applications; information security; multimedia applications; optimization and classification.
: black 13-01-2018, 23:07 | : 0 |

: Himanshu Sharma
: Attribution Modelling in Google Analytics and Beyond
: Blurb
: 2017
ISBN: 9781366694577
: English
: azw3
: 5,6 mb
: 480

Any person who wants to improve the online performance of their business and marketing campaigns should read this book.
: daromir 13-01-2018, 12:07 | : 0 |

: Tolga Soyata
: Enabling Real-Time Mobile Cloud Computing through Emerging Technologies
: IGI Global
: 2015
ISBN: 9781466686625
: Advances in Wireless Technologies and Telecommunication
: English
: pdf
: 32,2 mb
: 399

Enabling Real-Time Mobile Cloud Computing through Emerging Technologies is an authoritative and accessible resource that incorporates surveys, tutorials, and the latest scholarly research on cellular technologies to explore the latest developments in mobile and wireless computing technologies.
: daromir 13-01-2018, 09:40 | : 0 |
: Semantic Web Challenges: 4th SemWebEval Challenge at ESWC 2017
: Mauro Dragoni and Monika Solanki
: Springer
: 2017
: PDF
: 10
: / English

This book constitutes the thoroughly refereed post conference proceedings of the 4th edition of the Semantic Web Evaluation Challenge, SemWebEval 2017, co-located with the 14th European Semantic Web conference, held in Portoroz, Slovenia, in May/June 2017.
: black 12-01-2018, 23:09 | : 0 |
: Mobile Services for Toy Computing
: Patrick C. K. Hung
: Springer
: 2016
: PDF
: 11
: / English

The goal of this book is to crystallize the emerging mobile computing technologies and trends by focusing on the most promising solutions in services computing. The book will provide clear proof that mobile technologies are playing an increasingly important and critical role in supporting toy computing. The goal of this book is to bring together academics and practitioners to describe the use and synergy between the above-mentioned technologies.
: black 12-01-2018, 22:17 | : 0 |

: Ricardo Armentano, Robin Singh Bhadoria, Ganesh Chandra Deka, Parag Chatterjee
: The Internet of Things: Foundation for Smart Cities, eHealth, and Ubiquitous Computing
: Chapman and Hall/CRC
: 2017
ISBN: 9781498789028
: English
: pdf
: 21,8 mb
: 490

This book is a perfect research handbook for young practitioners who are intending to carry out their research in the field of IoT. This book is divided into four major parts that comprise the basic foundation, an architectural perspective, interdisciplinary aspects, and case studies based on IoT and ubiquitous computing.
: daromir 12-01-2018, 20:44 | : 0 |
Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet: Online Danger: How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet
: Dr. Eric Cole
: Morgan James Publishing
ISBN: 1683505336
: 2018
: 185
:
: epub, azw3, pdf
: 10.07 MB

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online.
: Ingvar16 12-01-2018, 20:02 | : 0 |

:
: ..
: .: -
: 2006
: pdf
: 320
: 29 mb
:

, , . , , , B1965 r. 3. , , .
: na5ballov 12-01-2018, 15:52 | : 0 |
: Metro Ethernet Services for LTE Backhaul
: Roman Krzanowski
: Artech House
: 2013
: PDF
: 10
: / English

The backhaul portion of the network is comprised of intermediate links between the core network and the small sub-networks at the "edge" of the entire hierarchical network. This is a critical area because it is the side of the network that communicates with the global Internet. This practical resource serves as a comprehensive guide to designing mobile Ethernet backhauling (MEBH) services in metro areas using carrier Ethernet (CE) architecture.
: black 12-01-2018, 13:22 | : 0 |

: Nazmul Rajib
: Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)
: Cisco Press
: 2017
ISBN: 9781587144806
: Networking Technology: Security
: English
: azw3
: 69,4 mb
: 800

The authoritative visual guide to Cisco Firepower Threat Defense (FTD).
: daromir 12-01-2018, 09:30 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 143

 MirKnig.Su  2018