Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


AI and Machine Learning for Network and Security ManagementНазвание: AI and Machine Learning for Network and Security Management
Автор: Jingguo Ge, Tong Li
Издательство: Wiley-IEEE
Год: 2023
Страниц: 283
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

AI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit.
Разместил: Ingvar16 2-11-2022, 13:54 | Комментарии: 0 | Подробнее
Networking Technologies in Smart Healthcare: Innovations and Analytical ApproachesНазвание: Networking Technologies in Smart Healthcare: Innovations and Analytical Approaches
Автор: Pooja Singh, Omprakash Kaiwartya, Nidhi Sindhwani
Издательство: CRC Press
Год: 2023
Страниц: 398
Язык: английский
Формат: pdf (true)
Размер: 38.00 MB

This text provides novel smart network systems, wireless telecommunications infrastructures, and computing capabilities to help healthcare systems using computing techniques like IoT, cloud computing, machine and deep learning Big Data along with smart wireless networks. It discusses important topics, including robotics manipulation and analysis in smart healthcare industries, smart telemedicine framework using Machine Learning and Deep Learning, role of UAV and drones in smart hospitals, virtual reality based on 5G/6G and augmented reality in healthcare systems, data privacy and security, nanomedicine, and cloud-based artificial intelligence in healthcare systems.
Разместил: Ingvar16 2-11-2022, 13:45 | Комментарии: 0 | Подробнее
Cyber Security and Operations Management for Industry 4.0Название: Cyber Security and Operations Management for Industry 4.0
Автор: Ahmed A. Elngar, N. Thillaiarasu, Mohamed Elhoseny
Издательство: CRC Press
Год: 2023
Страниц: 161
Язык: английский
Формат: pdf (true)
Размер: 21.0 MB

This book seamlessly connects the topics of Industry 4.0 and cyber security. It discusses the risks and solutions of using cyber security techniques for Industry 4.0. Cyber Security and Operations Management for Industry 4.0 covers the cyber security risks involved in the integration of Industry 4.0 into businesses and highlights the issues and solutions. The book offers the latest theoretical and practical research in the management of cyber security issues common in Industry 4.0 and also discusses the ethical and legal perspectives of incorporating cyber security techniques and applications into the day-to-day functions of an organization. Industrial management topics related to smart factories, operations research, and value chains are also discussed. Deep Learning method’s role in delivering privacy- and security- related services across various industries has become a hot topic in recent years as the business, governmental, and individual users believe that Deep Learning will protect their physical and logical resources from attackers with less damage or access.
Разместил: Ingvar16 2-11-2022, 06:30 | Комментарии: 0 | Подробнее
Instagram For Dummies, 2nd EditionНазвание: Instagram For Dummies, 2nd Edition
Автор: Jenn Herman, Corey Walker, Eric Butow
Издательство: For Dummies
Год: 2023
Страниц: 275
Язык: английский
Формат: pdf (true)
Размер: 44.4 MB

Are you on Insta? Start sharing pictures and a lot, lot more. Instagram For Dummies helps you navigate Instagram and all the updates coming to the platform. For new and experienced users, this book keeps you in the know, so you can post to your feed, create Reels and Stories, broadcast and watch live video, and so much more. This handy guide covers creating Reels to attract more followers, adding updates and stickers for stories, and the addition of multiple feeds so you can customize your experience. There are so many new features coming to this ever-more-popular social platform, you need a friend like Dummies to help you keep up. Create viral content, or just share cat pics with your close friends and family. We take you through every step of setting up your profile, creating and uploading content to Instagram, writing descriptive captions, finding hashtags that help you get more exposure, adding new followers, and using all the fun features built into Instagram.
Разместил: Ingvar16 1-11-2022, 02:20 | Комментарии: 0 | Подробнее
Making Sense of CybersecurityНазвание: Making Sense of Cybersecurity
Автор: Thomas Kranz
Издательство: Manning Publications
Год: 2022
Страниц: 288
Язык: английский
Формат: epub (true), mobi
Размер: 15.2 MB

A jargon-busting guide to the key concepts, terminology, and technologies of cybersecurity. Perfect for anyone planning or implementing a security strategy. Go behind the headlines of famous attacks and learn lessons from real-world breaches that author Tom Kranz has personally helped to clean up. Making Sense of Cybersecurity is full of clear-headed advice and examples that will help you identify risks in your organization and choose the right path to apply the important security concepts. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
Разместил: Ingvar16 31-10-2022, 21:51 | Комментарии: 0 | Подробнее
Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven ApplicationsНазвание: Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications
Автор: Pethuru Raj, Skylab Vanga
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 354
Язык: английский
Формат: pdf (true)
Размер: 28.1 MB

Explore the cloud-native paradigm for event-driven and service-oriented applications. In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful treatment of cloud-native computing technologies and tools. With a particular emphasis on the Kubernetes platform, as well as service mesh and API gateway solutions, the book demonstrates the need for reliability assurance in any distributed environment.
Разместил: Ingvar16 30-10-2022, 15:28 | Комментарии: 0 | Подробнее
How to Create a Web3 Startup: A Guide for Tomorrow’s Breakout CompaniesНазвание: How to Create a Web3 Startup: A Guide for Tomorrow’s Breakout Companies
Автор: Tom Taulli
Издательство: Apress
Год: 2022
Страниц: 179
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Web3 is the next evolution for the World Wide Web based on Blockchain technology. ?This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum. The Web3 Tech Stack describes the tools for product development. These include libraries, platforms, IDEs, databases, web services, and so on. There are certain types of tech stacks that have become quite common in the startup world. For example, there is MERN, which has the following systems: MongoDb, Express, React, Node.
Разместил: Ingvar16 29-10-2022, 15:21 | Комментарии: 0 | Подробнее
Third Generation Internet Revealed: Reinventing Computer Networks with IPv6Название: Third Generation Internet Revealed: Reinventing Computer Networks with IPv6
Автор: Lawrence E. Hughes
Издательство: Apress
Год: 2022
Страниц: 428
Язык: английский
Формат: pdf (true), epub
Размер: 34.1 MB

This book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space. IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation.
Разместил: Ingvar16 29-10-2022, 14:56 | Комментарии: 0 | Подробнее
MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500Название: MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500
Автор: Shimon Brathwaite
Издательство: Sybex
Год: 2023
Страниц: 352
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

Prepare for the MCA Azure Security Engineer certification exam faster and smarter with help from Sybex. In the MCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500, cybersecurity veteran Shimon Brathwaite walks you through every step you need to take to prepare for the MCA Azure Security Engineer certification exam and a career in Azure cybersecurity. You’ll find coverage of every domain competency tested by the exam, including identity management and access, platform protection implementation, security operations management, and data and application security. The Microsoft Azure Platform is one of the most popular and diverse cloud-computing platforms in existence. It includes a wide range of security features designed to help clients protect their cloud environments.
Разместил: Ingvar16 26-10-2022, 03:33 | Комментарии: 0 | Подробнее
Losing the Cybersecurity War And What We Can Do to Stop ItНазвание: Losing the Cybersecurity War: And What We Can Do to Stop It
Автор: Steve King, Kiren Chaudry
Издательство: CRC Press
Год: 2023
Страниц: 173
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The Internet was created for communication and sharing purposes without security in mind. As it expanded exponentially via cloud and edge and computing, the notion of defending the perimeter has become more challenging. There are more vulnerabilities (and targets) created every day with added devices and users, and attackers are taking advantage of our security predicaments. Zero Trust begins with the premise of implicitly not trusting any devices, assets, services, workflows, or people connected to the network. The next step is to assume everything connected is hostile and needs to be authenticated. Employing a strategy of Zero Trust makes profound sense for improving cybersecurity fortification. It is already being widely adopted by the Pentagon and the Department of Homeland Security, and it is being mandated to other agencies via Presidential orders.
Разместил: Ingvar16 26-10-2022, 02:47 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2021     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности