Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Beginner’s Guide to Instructional Design: Identify and Examine Learning Needs, Knowledge Delivery MethodsНазвание: Beginner’s Guide to Instructional Design: Identify and Examine Learning Needs, Knowledge Delivery Methods, and Approaches to Design Learning Material
Автор: Purnima Valiathan
Издательство: BPB Publications
Год: 2022
Страниц: 244
Язык: английский
Формат: pdf, epub (true), mobi
Размер: 10.19 MB

Applying instructional design principles to serve content just right! This book aims to give instructional designers a better understanding of how learning science can be used in their work. Four real-world case studies illustrate educational needs and the associated solution, bridging theory and practice. Professionals can use the book's templates and formats to create job aids, virtual training, and online learning storyboards. The prominent ADDIE methodology for instructional material development is used throughout the book. The ADDIE model's phases are taught and demonstrated using a variety of real-world scenarios. Gagne's Events of Instruction, Kolb's Experiential Model, and Merrill's Principles of Learning are just a few of the foundational frameworks thoroughly presented with the examples. This book provides examples to show assessment strategies for verifying declarative knowledge and assessment tools for evaluating procedural knowledge. Information about authoring tools, LMSs and LXPs are also covered.
Разместил: Ingvar16 5-01-2023, 19:00 | Комментарии: 0 | Подробнее
PKI Implementation and InfrastructuresНазвание: PKI Implementation and Infrastructures
Автор: Julian Ashbourn
Издательство: CRC Press
Год: 2023
Страниц: 188
Язык: английский
Формат: pdf (true)
Размер: 10,2 MB

Концепция PKI (инфраструктура открытых ключей) существует уже несколько десятилетий, но это одна из областей ИТ, которая чрезвычайно долго не находила своего воплощения в жизнь. В основном это связано с тем, что внедрение PKI требует много времени и усилий. Поддержание PKI требует не меньше времени, а в реальном мире слияний и поглощений на фоне постоянно меняющихся технологий это еще сложнее. PKI (Public Key Infrastructure) — это набор средств (технических, материальных, и т. д.), распределённых служб и компонентов, в совокупности используемых для поддержки криптозадач на основе закрытого и открытого ключей. В основе PKI лежит использование криптографической системы с открытым ключом и несколько основных принципов. В этой книге рассматриваются все аспекты внедрения и поддержки PKI, которые, как представляется, упускаются в других книгах на эту тему. В ней отражен десятилетний опыт, накопленный не только в PKI, не только в ИТ, не только в электронике, но и в бизнесе, государственных учреждениях и научных кругах. В книге также рассматривается существование PKI наряду с другими технологиями, такими как биометрия, и на фоне постоянно меняющегося мира методологий разработки.
Разместил: Ingvar16 4-01-2023, 16:18 | Комментарии: 0 | Подробнее
An Insider's Guide to Cloud Computing (Rough Cuts)Название: An Insider's Guide to Cloud Computing (Rough Cuts)
Автор: David Linthicum
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2023
Страниц: 216
Язык: английский
Формат: epub
Размер: 10.08 MB

Many cloud computing initiatives flat-out fail; others limp along, functioning tolerably without ever delivering what they promised. An Insider’s Guide to Cloud Computing reveals why, and shows how to do better. Cloud pioneer and long-time CTO David Linthicum explodes the industry’s secrets, and presents practical ways to optimize cloud for value and performance. Linthicum takes a hard look at aggressively marketed technologies such as cloud-based AI, containers, no-code, serverless computing, and multicloud. He illuminates what works, what absolutely does not work, and how to manage the difficult cost-complexity tradeoffs presented by many offerings. You’ll learn why some workloads and datasets still don’t belong on the cloud, and even discover "game changer" technology that has actually been undersold.
Разместил: Ingvar16 4-01-2023, 12:55 | Комментарии: 0 | Подробнее

Название: Internet of Things: Security and Privacy in Cyberspace
Автор: Saxena Sandeep, Pradhan Ashok.
Издательство:Springer
Год:2022
Формат: PDF
Страниц: 293
Размер: 10,4 МБ
Язык: English

This book covers major areas of device and data security and privacy related to the Internet of Things (IoT). It also provides an overview of light-weight protocols and cryptographic mechanisms to achieve security and privacy in IoT applications. Besides, the book also discusses intrusion detection and firewall mechanisms for IoT. The book also covers topics related to embedded security mechanisms and presents suitable malware detection techniques for IoT. The book also contains a unique presentation on heterogeneous device and data management in IoT applications and showcases the major communication-level attacks and defense mechanisms related to IoT.


Разместил: vikCAT 4-01-2023, 12:14 | Комментарии: 0 | Подробнее
Blockchain in Supply Chain Digital TransformationНазвание: Blockchain in Supply Chain Digital Transformation
Автор: Trevor Clohessy
Издательство: CRC Press
Год: 2023
Страниц: 227
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Blockchain and distributed ledger technology (DLT) have been identified as emerging technologies that can enhance global supply chain management (SCM) processes. Given the embryonic nature of the technology, use cases pertaining to how it can be adopted and deployed in supply chain contexts are scarce. This book shares blockchain supply chain use cases across a range of industries including smart cities, food imports, product traceability, decentralised finance, procurement, energy management, consensus mechanism security, and Industry 4.0. While extant research has focused on how traditional technologies such as cloud computing, Radio Frequency Identification (RFID), Internet of Things (IoT), tracking technologies, and so on have impacted SCM business practices, new technological developments are emerging such as blockchain and distributed ledger technologies (DLT) that are enabling new and innovative SCM business practices. Given its scope, it is primarily intended for academics, students, researchers, and practitioners who want to learn more about how blockchain can digitally transform global supply chains.
Разместил: Ingvar16 4-01-2023, 02:10 | Комментарии: 0 | Подробнее
Wireshark for Network Forensics: An Essential Guide for IT and Cloud ProfessionalsНазвание: Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
Автор: Nagendra Kumar Nainar, Ashish Panda
Издательство: Apress
Год: 2023
Страниц: 283
Язык: английский
Формат: pdf, epub
Размер: 47.5 MB

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.
Разместил: Ingvar16 31-12-2022, 08:02 | Комментарии: 0 | Подробнее
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, 2nd EditionНазвание: Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, 2nd Edition
Автор: George Varghese, Jun Xu
Издательство: Morgan Kaufmann, Elsevier
Год: 2022
Страниц: 596
Язык: английский
Формат: pdf (true), epub (true)
Размер: 33.7 MB

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks. In designing a network device, there are dozens of decisions that affect the speed with which it will perform – sometimes for better, but sometimes for worse. The book provides a complete and coherent methodology for maximizing speed while meeting network design goals. The book is uniquely focused on the seamless integration of data structures, algorithms, operating systems and hardware/software co-designs for high-performance routers/switches and network end systems. Thoroughly updated based on courses taught by the authors over the past decade, the book lays out the bottlenecks most often encountered at four disparate levels of implementation: protocol, OS, hardware and architecture.
Разместил: Ingvar16 28-12-2022, 19:00 | Комментарии: 0 | Подробнее
Blockchain for Teens: With Case Studies and Examples of Blockchain Across Various IndustriesНазвание: Blockchain for Teens: With Case Studies and Examples of Blockchain Across Various Industries
Автор: Brian Wu, Bridget Wu
Издательство: Apress
Год: 2023
Страниц: 444
Язык: английский
Формат: pdf, epub
Размер: 26.1 MB

Similar to the Internet in the 1990s, Blockchain promises to revolutionize the world by reforming current business models. This book is a beginner-friendly guide for teens looking to build a basic foundation in Blockchain technologies. You'll start with an introduction to Blockchain, learn about the main features, and understand decentralization. Additionally, you'll get to know the current monetary system, major concepts in cryptography, and an overview of cryptocurrency. The book then explores various topics in Bitcoin, including its history, the consensus mechanism and the mining process. You'll also be introduced to non-fungible tokens (NFT)s, one of Blockchain’s most well-known technologies, and delve into its different aspects, including the top NFT marketplaces. There is also a chapter about the Metaverse, another groundbreaking technology that will influence society throughout the next decade. You'll see how Crypto and NFTs enhance the Metaverse, and the relationship between Blockchain and the Metaverse.
Разместил: Ingvar16 27-12-2022, 21:58 | Комментарии: 0 | Подробнее
Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional ClassroomНазвание: Teaching Cybersecurity: A Handbook for Teaching the Cybersecurity Body of Knowledge in a Conventional Classroom
Автор: Daniel Shoemaker, Ken Sigler, Tamara Shoemaker
Издательство: CRC Press
Год: 2023
Страниц: 229
Язык: английский
Формат: pdf (true)
Размер: 12.9 MB

Let’s be realistic here. Ordinary K-12 educators don’t know what "cybersecurity" is and could probably care less about incorporating it into their lesson plans. Yet, teaching cybersecurity is a critical national priority. So, this book aims to cut through the usual roadblocks of confusing technical jargon and industry stovepipes and give you, the classroom teacher, a unified understanding of what must be taught. That advice is based on a single authoritative definition of the field. In 2017, the three societies that write the standards for computing, software engineering, and information systems came together to define a single model of the field of cybersecurity. It is based on eight building blocks. That definition is presented here. However, we also understand that secondary school teachers are not experts in arcane subjects like software, component, human, or societal security. Therefore, this book explains cybersecurity through a simple story rather than diving into execution details.
Разместил: Ingvar16 27-12-2022, 19:14 | Комментарии: 0 | Подробнее
Название: Компьютерные сети. Нисходящий подход
Автор: Куроуз Джеймс, Росс Кит
Издательство: Эксмо
Год: 2016
Страниц: 912
Формат: pdf/djvu
Размер: 46 мб
Язык: русский

Книга знакомит читателя с фундаментальными основами построения и функционирования компьютерных сетей на примере пятиуровневой архитектуры сети Интернет. Описаны базовые компоненты компьютерной сети, ключевые подходы к передаче данных в телекоммуникационных сетях, принципы взаимодействия сетей друг с другом, подробно рассмотрены важнейшие службы и протоколы всех уровней сетевой архитектуры. Отдельная глава посвящена беспроводным и мобильным сетям и их особенностям.
Разместил: rivasss 27-12-2022, 16:08 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности