" "



:





.. 1 ... 4 5 6 7 8 9 10 11 12 ... 214

: IPv6 Address Planning
: Tom Coffeen
: O'Reilly Media
: 2014
: PDF, EPUB
: 30
: / English

If youre ready to join the move to IPv6, this comprehensive guide gets you started by showing you how to create an effective IPv6 address plan. In three example-driven sectionspreparation, design, and maintenanceyoull learn principles and best practices for designing, deploying, and maintaining an address plan far beyond whats possible with IPv4 networks.
: black 10-02-2019, 22:03 | : 0 |
: Mobile Marketing: How Mobile Technology is Revolutionizing Marketing, Communications and Advertising
: Daniel Rowles
: Kogan Page
: 2017
: PDF, EPUB
: 16
: / English

Mobile Marketing is a clear, practical guide to harnessing the mobile consumer and tackling the rising challenges of divided user attention across multiple screens at the same time. It demystifies the vast spectrum of tools and techniques now available and explains how to optimize these dynamics into an innovative and effective mobile marketing strategy. Now that website search rankings take into account mobile optimization, no serious marketer can do without a thorough understanding of mobile.
: black 10-02-2019, 21:44 | : 0 |
: Cisco VPN Configuration Guide
: Harris Andrea
: CreateSpace Independent Publishing Platform
: 2014
: PDF, EPUB
: 22
: / English

Become an expert in Cisco VPN technologies with this practical and comprehensive configuration guide. Learn how to configure IPSEC VPNs (site-to-site, hub-and-spoke, remote access), SSL VPN, DMVPN, GRE, VTI etc. This book is packed with step-by-step configuration tutorials and real world scenarios to implement VPNs on Cisco ASA Firewalls (v8.4 and above and v9.x) and on Cisco Routers. It is filled with raw practical concepts, around 40 network diagrams to explain the scenarios, troubleshooting instructions, 20 complete configurations on actual devices and much more. Both beginners and experts will find some golden nuggets inside this practical guide.
: black 9-02-2019, 16:40 | : 0 |
: Bandwidth Efficient Coding
: John B. Anderson
: Wiley
: 2017
: PDF, EPUB
: 11
: / English

Bandwidth Efficient Coding takes a fresh look at classical information theory and introduces a different point of view for research and development engineers and graduate students in communication engineering and wireless communication.
: black 9-02-2019, 16:20 | : 1 |
: Blockchain Basics: A Non-Technical Introduction in 25 Steps
: Daniel Drescher
: Apress
: 2017
: PDF, EPUB
: 10
: / English

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used.No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.
: black 9-02-2019, 15:52 | : 0 |
: Walling Out the Insiders: Controlling Access to Improve Organizational Security
: Michael Erbschloe
: CRC Press
: 2017
: PDF, EPUB
: 19
: / English

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.
: black 9-02-2019, 14:45 | : 0 |
: Virtual Reality Headsets - A Theoretical and Pragmatic Approach
: Philippe Fuchs
: CRC Press
: 2017
: PDF, EPUB
: 12
: / English

The purpose of virtual reality is to make possible a sensorimotor and cognitive activity for a user in a digitally created artificial world. Recent advances in computer technology have led to a new generation of VR devices such as VR headsets. Accordingly, virtual reality poses many new scientific challenges for researchers and professionals.
: black 9-02-2019, 14:41 | : 0 |
: Network Security and Cryptography
: Sarhan M. Musa
: Mercury Learning & Information
: 2018
: PDF
: 16
: / English

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.
: black 8-02-2019, 22:14 | : 0 |
: The Browser Hacker's Handbook (+code)
: Wade Alcorn, Christian Frichot, Michele Orru
: Wiley
: 2014
: PDF, EPUB
: 42
: / English

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.
: black 8-02-2019, 20:02 | : 0 |
: 5G Enabled Secure Wireless Networks
: Dushantha Nalin K. Jayakody, Kathiravan Srinivasan
: Springer
: 2019
: EPUB, PDF
: 26
: / English

This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers.
: black 8-02-2019, 19:17 | : 0 |

.. 1 ... 4 5 6 7 8 9 10 11 12 ... 214




 MirKnig.Su  2018