" "



:





...

.. 1 ... 53 54 55 56 57 58 59 60 61 ... 172

: Smart Metering Handbook
: Fabio Toledo
: PennWell Corp.
: 2013
: PDF
: 17
: / English

Internationally, more and more utilities, distributors and suppliers are adopting smart metering systems to manage their millions of customers more effectively. The new requirements of these markets demonstrate even more strongly how strategic a metering system becomes for utilities. If these projects are properly deployed and if certain constraints are overcome, customers and various market players can also enjoy the benefits associated with the systems and related services.
: black 4-11-2017, 21:50 | : 0 |
: Wireless Mobile Internet Security, 2 edition
: Man Young Rhee
: Wiley
: 2013
: EPUB
: 22
: / English

The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability.
: black 4-11-2017, 21:08 | : 0 |
: Access, Fronthaul and Backhaul Networks for 5G and Beyond
: Muhammad Ali Imran and Syed Ali Raza Zaidi
: The Institution of Engineering and Technology
: 2017
: PDF
: 28
: / English

The widespread use of mobile internet and smart applications has led to an explosive growth in mobile data traffic, which will continue due to the emerging need to connect people, machines, and applications in an ubiquitous manner through the mobile infrastructure. In achieving these expectations, operators and carriers are planning to improve the user experience and the overall network performance. However, the efficient and satisfactory operation of all these densely-deployed networks hinges on a suitable backhaul and fronthaul provisioning.
: black 4-11-2017, 20:32 | : 0 |
: Internet of Things: Evolutions and Innovations
: Nasreddine Bouhai, Imad Saleh
: Wiley-ISTE
ISBN: 1786301512
: 2017
: 246
:
: pdf
: 11.0 MB

The development of connected, communicating objects is showing no signs of slowing down. With an increasing number of objects available on the market, the evolution of the Internet of Things is leading to more and more fields being explored via information and communication sciences. This book analyzes the ecosystem of the Internet of Things by retracing the historical and technological context of the Internet s evolution from traditional to dynamic, social and semantic, and then towards this ecosystem of connected objects. The evolution of concepts surrounding the Internet of Things is explored via reallife examples of connected objects; both those used for specific functions and for more general everyday objects.
: Ingvar16 4-11-2017, 19:06 | : 0 |

:
:
: . .
: 2013
: 442
:
: pdf
: 12 Mb

: , ( ) , , , , , , .
: Mikong1983 4-11-2017, 10:31 | : 0 |
: Advances on P2P, Parallel, Grid, Cloud and Internet Computing: Proceedings of the 12th International Conference
: Fatos Xhafa and Santi Caball?
: Springer
: 2017
: PDF
: 109
: / English

This book presents the latest, innovative research findings on P2P, Parallel, Grid, Cloud, and Internet Computing. It gathers the Proceedings of the 12th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, held on November 810, 2017 in Barcelona, Spain. These computing technologies have rapidly established themselves as breakthrough paradigms for solving complex problems by enabling the aggregation and sharing of an increasing variety of distributed computational resources at large scale.
: black 3-11-2017, 10:00 | : 0 |
: Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference
: Daphne Tuncer and Robert Koch
: Springer
: 2017
: PDF
: 10
: / English

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.

The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
: black 3-11-2017, 09:02 | : 0 |
: Cyber Attack Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between
: Nick Selby and Heather Vescent
: Weldon Owen
: 2017
: EPUB, AZW3
: 19
: / English

As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.
: black 3-11-2017, 08:43 | : 0 |

: Hong-Chuan Yang
: Introduction to Digital Wireless Communications
: The Institution of Engineering and Technology
: 2017
ISBN: 9781785611605
: English
: pdf
: 12,8 mb
: 288

This book provides an efficient introduction to fundamental and advanced digital transmission technologies in current and future wireless communication systems.
: daromir 2-11-2017, 09:11 | : 0 |
: Data Security in Cloud Computing
: Vimal Kumar (Editor), Sivadon Chaisiri (Editor), Ryan Ko (Editor)
: The Institution of Engineering and Technology
: 2017
: True PDF
: 328
: 11.5 Mb
: English

Cloud Computing has already been embraced by many organizations and individuals due to its benefits of economy, reliability, scalability and guaranteed quality of service among others. But since the data is not stored, analysed or computed on site, this can open security, privacy, trust and compliance issues. This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.
: bomboane 2-11-2017, 06:26 | : 0 |

.. 1 ... 53 54 55 56 57 58 59 60 61 ... 172

 MirKnig.Su  2018