" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 202


: Allocation in Networks
: Jens Leth Hougaard
: The MIT Press
: 2018
: 296
: EPUB
: 10 Mb
: English

A comprehensive overview of networks and economic design, presenting models and results drawn from economics, operations research, and computer science; with examples and exercises.
This book explores networks and economic design, focusing on the role played by allocation rules (revenue and cost-sharing schemes) in creating and sustaining efficient network solutions. It takes a normative approach, seeking economically efficient network solutions sustained by distributional fairness, and considers how different ways of allocating liability affect incentives for network usage and development. The text presents an up-to-date overview of models and results currently scattered over several strands of literature, drawing on economics, operations research, and computer science.
: bhaer 5-11-2018, 10:08 | : 0 |
:
: .., .., ..
:
: 2004
C: 536
: djvu
: 12
:

. , , , .
: rivasss 4-11-2018, 18:51 | : 0 |
: How the Internet Happened: From Netscape to the iPhone
: Brian McCullough
:
: 2018
: EPUB
: 400
: Mirknig.su
: 0.6 Mb
: English
Tech-guru Brian McCullough delivers a rollicking history of the internet, why it exploded, and how it changed everything.
The internet was never intended for you, opines Brian McCullough in this lively narrative of an era that utterly transformed everything we thought we knew about technology. In How the Internet Happened, he chronicles the whole fascinating story for the first time, beginning in a dusty Illinois basement in 1993, when a group of college kids set off a once-in-an-epoch revolution with what would become the first dotcom.
Depicting the lives of now-famous innovators like Netscapes Marc Andreessen and Facebooks Mark Zuckerberg, McCullough also reveals surprising quirks and unknown tales as he tracks both the technology and the culture around the internets rise. Cinematic in detail and unprecedented in scope, the result both enlightens and informs as it draws back the curtain on the new rhythm of disruption and innovation the internet fostered, and helps to redefine an era that changed every part of our lives.
8 pages of photographs
: Ice Zero 4-11-2018, 06:50 | : 0 |
: Internet Architecture and Innovation
: Barbara van Schewick
: The MIT Press
: 2012
: PDF
: 592
: Mirknig.su
: 1.5 Mb
: English
A detailed examination of how the underlying technical structure of the Internet affects the economic environment for innovation and the implications for public policy.
Today?following housing bubbles, bank collapses, and high unemployment?the Internet remains the most reliable mechanism for fostering innovation and creating new wealth. The Internet's remarkable growth has been fueled by innovation. In this pathbreaking book, Barbara van Schewick argues that this explosion of innovation is not an accident, but a consequence of the Internet's architecture?a consequence of technical choices regarding the Internet's inner structure that were made early in its history.
: Ice Zero 3-11-2018, 18:24 | : 0 |
: Next-Generation Internet: Architectures and Protocols
: Byrav Ramamurthy, George N. Rouskas, Krishna Moorthy Sivalingam
: Cambridge University Press
: 2011
: PDF
: 434
: Mirknig.su
: 4 Mb
: English
With ever-increasing demands on capacity, quality of service, speed, and reliability, current Internet systems are under strain and under review. Combining contributions from experts in the field, this book captures the most recent and innovative designs, architectures, protocols, and mechanisms that will enable researchers to successfully build the next-generation Internet. A broad perspective is provided, with topics including innovations at the physical/transmission layer in wired and wireless media, as well as the support for new switching and routing paradigms at the device and sub-system layer. The proposed alternatives to TCP and UDP at the data transport layer for emerging environments are also covered, as are the novel models and theoretical foundations proposed for understanding network complexity. Finally, new approaches for pricing and network economics are discussed, making this ideal for students, researchers, and practitioners who need to know about designing, constructing, and operating the next-generation Internet.
: Ice Zero 3-11-2018, 18:20 | : 0 |
: Kerberos: The Definitive Guide
: Jason Garman
: O'Reilly Media
ISBN: 0596004036
: 2003
: 274
:
: pdf (true), azw3, epub
: 10.15 MB

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.
: Ingvar16 3-11-2018, 14:43 | : 0 |
: Data Analysis for Network Cyber-Security
: Robert Moreno
: Amazon Digital Services LLC
ASIN: B07FLT9N83
: 2018
: 540
:
: epub, pdf (conv)
: 10.1 MB

This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.
: Ingvar16 2-11-2018, 13:59 | : 0 |
: Internet of Things Security: Fundamentals, Techniques and Applications
: Shishir K. Shandilya, Soon Ae Chun
: River Publishers
ISBN: 8793609531
: 2018
: 164
:
: pdf (true)
: 10.1 MB

Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design.
: Ingvar16 2-11-2018, 04:05 | : 0 |
: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
: Tim Mather, Subra Kumaraswamy, Shahed Latif
: O'Reilly Media
: 2009
: PDF
: 338
: Mirknig.su
: 3 Mb
: English

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking.
: Ice Zero 2-11-2018, 03:11 | : 0 |

: Understanding IPv6: Your Essential Guide to IPv6 on Windows Networks, 3rd Edition
: Joseph Davies
: Microsoft Press
: 2012
: 716
: True PDF
: 26 Mb
: English

Your essential guide to deploying IPv6 on Windows networks
Get in-depth technical information to put IPv6 technology to workincluding networks with hardware running Windows 8 and Windows Server 2012. Written by a networking expert, this reference explains IPv6 features and benefits, and provides detailed information to help you implement this protocol. Youll learn best practices for using IPv6 services in your Windows network, whether youre an IT professional, a network administrator, or an IT student.
: bhaer 1-11-2018, 23:43 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 202

 MirKnig.Su  2018