" "


.. 1 2 3 4 5 6 7 8 9 10 ... 212

: Embedded and Networking Systems: Design, Software, and Implementation
: Gul N. Khan and Krzysztof Iniewski
: CRC Press
: 2017
: 18
: / English

Embedded and Networking Systems: Design, Software, and Implementation explores issues related to the design and synthesis of high-performance embedded computer systems and networks. The emphasis is on the fundamental concepts and analytical techniques that are applicable to a range of embedded and networking applications, rather than on specific embedded architectures, software development, or system-level integration. This system point of view guides designers in dealing with the trade-offs to optimize performance, power, cost, and other system-level non-functional requirements.
: black 19-01-2019, 22:54 | : 0 |
: TIME Cybersecurity: Hacking, the Dark Web and You
: The Editors of TIME
ISBN: 1547842407
: 2018
: 96
: epub
: 21.43 MB

Mysterious and dark, the many dangers of the internet lurk just below the sunny surface of social media, online shopping and cat videos. Now, in a new Special Edition from the Editors of TIME, comes Cybersecurity: Hacking, the Dark Web and You to help you understand the dangers posed by hackers, cyber criminals and other bad actors on the internet. Those potentially at risk include: individuals (your personal photography and communications, your finances and more); businesses and international relations; and our government (think interference in the November 2016 United States elections). Clear and concise, this Special Edition features up-to-the-minute information, graphics, an statistics as well as a hacking glossary to help you better understand the threats that lie in wait behind each keystroke. Cybersecurity is filled with compelling stories about hacks and hackers, the battle against revenge porn, Google's elite guard against rising digital threats, and it also includes a step-by-step guide to help you defend against scammers and viruses.
: Ingvar16 19-01-2019, 20:26 | : 0 |
: The Threat Hunt Process (THP) Roadmap: A Pathway for Advanced Cybersecurity Active Measures
: Mark A. Russo
: Syber Risk LLC
: 2019
: 127
: epub, azw3, pdf (conv)
: 10.1 MB

This book is designed to implement the most extensive Threat Hunt Process (THP) for companies and agencies seeking to proactively determine whether intrusions into their Information Technology (IT) environments are real and malicious. THP is the active ability for businesses or organizations to investigate, mitigate, and stop the "bad guys" in their tracks. How do you select, collect, align, and integrate THP data and information for tracking daily operations and overall organizational security? How do you reduce the effort in THP activities to get problems solved? How can you ensure that plans include every THP task and that every possibility is considered and responded to by the Incident Response Team? How can you save time investigating and responding to strategic and tactical threats with limited resources? This book is designed to help you create an effective and repeatable THP.
: Ingvar16 19-01-2019, 19:44 | : 0 |
: Cisco Networking Essentials, 2nd Edition
: Troy McMillan
: Sybex
: 2015
: 12
: / English

Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and concepts. End-of-chapter review questions and suggested labs help reinforce what you've learned, and show you where you may need to backtrack and brush up before exam day.
: _dmin_ 19-01-2019, 09:41 | : 0 |
: Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P
: Robert W. Gehl, Laura DeNardis, Michael Zimmer PhD
: The MIT Press
ISBN: 0262038269
: 2018
: 288
: pdf (true), djvu
: 10.19 MB

An exploration of the Dark Web?websites accessible only with special routing software?that examines the history of three anonymizing networks, Freenet, Tor, and I2P. The term Dark Web conjures up drug markets, unregulated gun sales, stolen credit cards. But, as Robert Gehl points out in Weaving the Dark Web, for each of these illegitimate uses, there are other, legitimate ones: the New York Times's anonymous whistleblowing system, for example, and the use of encryption by political dissidents. Defining the Dark Web straightforwardly as websites that can be accessed only with special routing software, and noting the frequent use of legitimate and its variations by users, journalists, and law enforcement to describe Dark Web practices (judging them legit or sh!t), Gehl uses the concept of legitimacy as a window into the Dark Web. He does so by examining the history of three Dark Web systems: Freenet, Tor, and I2P.
: Ingvar16 19-01-2019, 04:37 | : 0 |

: Cisco IP Routing Protocols: Trouble Shooting Techniques
: V. AnandandK. Chakrabarty
: Charles River Media
: 2004
: Mirknig.su
: 32.52
: English

Cisco IP Routing Protocols: Troubleshooting Techniques is a comprehensive reference guide for network professionals facing problems with implementing and configuring IP routing protocols. It begins with an explanation of troubleshooting methodologies and tools, including Cisco and TCP/IP diagnostic commands and basic protocol behavior.
: ak5812 18-01-2019, 13:55 | : 0 |
: Delay and Disruption Tolerant Networks: Interplanetary and Earth-Bound - Architecture, Protocols, and Applications
: Aloizio Pereira da Silva, Scott Burleigh
: CRC Press
ISBN: 1138198064
: 2018
: 487
: pdf (true)
: 30.2 MB

Delay- and Disruption Tolerant Networks (DTNs) are networks subject to arbitrarily long-lived disruptions in connectivity and therefore cannot guarantee end-to-end connectivity at all times. Consequently DTNs called for novel core networking protocols since most existing Internet protocols rely on the network's ability to maintain end-to-end communication between participating nodes. This book presents the fundamental principles that underline DTNs. It explains the state-of-the-art on DTNs, their architecture, protocols, and applications. It also explores DTN's future technological trends and applications. Its main goal is to serve as a reference for researchers and practitioners.
: Ingvar16 18-01-2019, 07:19 | : 0 |
: A Practical Guide to Networking, Privacy & Security in iOS 12 version 1.1
: Glenn Fleishman
: Aperiodical LLC
: 2018
: true pdf/epub/mobi
: 199
: 21.9 Mb
: English

This book describes how to use your iPhone, iPod touch, or iPad with iOS 12 on Wi-Fi and cellular/mobile networks securely, making connections with ease while protecting your data and your privacy. It also covers Bluetooth, tracking an iOS device, the Apple Watch, managing passwords,Safaris cookie protections, Personal Hotspot and Instant Hotspot, two-factor authentication with an Apple ID, using AirDrop and AirPlay, and solving connection problems.
: bomboane 18-01-2019, 06:25 | : 0 |
: Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT
: Yushu Zhang, Yong Xiang
: Springer
ISBN: 9811325227
: 2018 (2019 Edition)
: 124
: pdf (true), epub
: 10.17 MB

This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
: Ingvar16 18-01-2019, 05:47 | : 0 |
: Understanding Cybersecurity: Emerging Governance and Strategy
: Gary Schaub Jr.
: Rowman & Littlefield
ISBN: 1786606798
: 2018
: 286
: pdf (true)
: 17.4 MB

Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war. Governments around the globe have started to develop cyber security strategies, governance and operations to consider cyberspace as an increasingly important and contentious international issue. This book provides the reader with the most up-to-date survey of the cyberspace security practices and processes in two accessible parts; governance and operations. Suitable for a wide-ranging audience, from professionals, analysts, military personnel, policy-makers and academics, this collection offers all sides of cyberspace issues, implementation and strategy for the future.
: Ingvar16 17-01-2019, 19:17 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 212

 MirKnig.Su  2018