" "



:





...

.. 1 2 3 4 5 6 7 8 9 10 ... 143

 .   : .
:
:
:
: 2006
: 279
:
: CHM
: 15 Mb

, , , , , , , , , .
: rogas86 2-01-2018, 11:01 | : 0 |
 . , , : . , ,
: .., ..
:
:
: 2000
: 308
:
: pdf
: 28 Mb

, , . , , .
: rogas86 2-01-2018, 10:52 | : 0 |

: Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
: James Forshaw
: No Starch Press
: 2017
: 336
: EPUB
: 28 Mb
: English

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the worlds leading bug hunters. This comprehensive guide looks at networking from an attackers perspective to help you discover, exploit, and ultimately protect vulnerabilities.
: bhaer 1-01-2018, 23:18 | : 0 |

: INTERNET.
:
:
: 2005
: pdf
: 400
: 17 mb
:

, , , , , . , Internet, , .
: na5ballov 1-01-2018, 13:00 | : 0 |

: Guide to Wireless Communications, 4th Edition
: Jorge Olenewa
: Course Technology
: 2016
: 528
: True PDF
: 28 Mb
: English

Learn about the most popular wireless data communications technologies in use today as GUIDE TO WIRELESS COMMUNICATIONS, 4E examines Bluetooth, ZigBee, Wi-Fi, cellular and satellite communications while providing a broad industry perspective. You develop a solid base of knowledge in Wireless Personal Area Networks (WPANs), Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), and Wireless Wide Area Networks (WWANs) to help you better understand the most popular wireless communications available today.
: bhaer 31-12-2017, 00:19 | : 0 |

: Your Right To Privacy: Minimize Your Digital Footprint (Legal Series)
: Jim Bronskill and David McKie
: Self-Counsel Press
: 2016
: 135
: PDF /EPUB
: 5,9 M
: English

Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how information is handled in the digital age, have written a definitive guide to minimize your digital footprint, protect your vital information and prevent it from being misused.
Jim Bronskill and David McKie argue there are steps each of us can take to keep ou
: vitvikvas 30-12-2017, 23:37 | : 0 |
: Wireless Sensor Networks: Security, Coverage, and Localization
: Rastko R. Selmic and Vir V. Phoha
: Springer
: 2016
: AZW3, EPUB, PDF
: 15
: / English

This book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics.
: black 29-12-2017, 20:21 | : 0 |
: Advanced Optical and Wireless Communications Systems
: Ivan B. Djordjevic
: Springer
: 2018
: PDF
: 26
: / English

This textbook introduces the advanced topics of: (i) wireless communications, (ii) free-space optical (FSO) communications, (iii) indoor optical wireless (IR) communications, and (iv) fiber-optics communications and presents these different types of communication systems in a unified fashion for better practical use.
: black 29-12-2017, 19:01 | : 0 |

: Daniel Schall
: Social Network-Based Recommender Systems
: Springer
: 2015
ISBN: 9783319227344
: English
: pdf
: 5,6 mb
: 126

This book introduces novel techniques and algorithms necessary to support the formation of social networks.
: daromir 27-12-2017, 22:27 | : 0 |
: Smart Secure Systems IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017
: Guru Prasadh Venkataramani and Karthik Sankaranarayanan
: Springer
: 2018
: PDF
: 29
: / English

This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017.

The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.
: black 27-12-2017, 19:43 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 143

 MirKnig.Su  2018