" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 405

CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004, 4th Edition: CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004, 4th Edition
: Nadean H. Tanner, Jeff T. Parker
: Sybex
: 2023
: 595
:
: pdf (true),sepub
: 17.5 MB

Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools. The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition, offers invaluable preparation for exam CAS-003. Covering 100 percent of the exam objectives, this book provides expert walk-through of essential security concepts and processes to help you tackle this challenging exam with full confidence. Practical examples and real-world insights illustrate critical topics and show what essential practices look like on the ground, while detailed explanations of technical and business concepts give you the background you need to apply identify and implement appropriate security solutions. End-of-chapter reviews help solidify your understanding of each objective, and cutting-edge exam prep software features electronic flashcards, hands-on lab exercises, and hundreds of practice questions to help you test your knowledge in advance of the exam.
: Ingvar16 , 18:27 | : 0 |
Artificial Intelligence Perspective for Smart Cities: Artificial Intelligence Perspective for Smart Cities
: Vahap Tecim, Sezer Bozkus Kahyaoglu
: CRC Press
: 2023
: 297
:
: pdf (true), epub
: 16.0 MB

The concept of a smart city is used widely in general; however, it is hard to explain because of the complexity and multidimensionality of this notion. However, the essential qualification for being a smart city is to achieve sustainable social, environmental, and economic development and boost the living standards of society based on Information and Communication Technology (ICT) and Artificial intelligence (AI). AI in smart cities has become an important aspect for cities that face great challenges to make smart decisions for social well-being, particularly cybersecurity and corporate sustainability.
: Ingvar16 , 12:02 | : 0 |
: Network Evolution and Applications
: Vikas Kumar Jha, Bishwajeet Pandey, Ciro Rodriguez Rodriguez
: CRC Press
: 2023
: True PDF
: 257
: 14 Mb
: English

Network Evolution and Applications provides a comprehensive, integrative, and easy approach to understanding the technologies, concepts, and milestones in the history of networking. It provides an overview of different aspects involved in the networking arena that includes the core technologies that are essential for communication and important in our day-to-day life. It throws some light on certain past networking concepts and technologies that have been revolutionary in the history of science and technology and have been highly impactful. It expands on various concepts like Artificial Intelligence, Software Defined Networking, Cloud Computing, and Internet of Things, which are very popular at present.
: vitvikvas , 11:01 | : 0 |
Confidential Computing: Hardware based Memory Protection: Confidential Computing: Hardware based Memory Protection
: Vicente Garcia Diaz, Gloria Jeanette Rincon Aponte
: Springer
: 2022
: 216
:
: pdf (true)
: 10.1 MB

Confidential computing is a cloud computing technology that isolates sensitive data during processing in a protected CPU enclave. The contents of the enclavethe data being processed and the techniques used to process itare visible and unknown to anyone or anything else, including the cloud provider. As business leaders increasingly rely on public and hybrid cloud services, data privacy in the cloud is critical. The book consists of 22 chapters, arranged on the basis of their approaches and contributions to the book and theme. The chapters of this textbook present key algorithms and theories that form the core of the technologies and applications concerned, consisting mainly of secure enclave technologies, adopting cloud computing, rise of confidential computing, confidentiality of data, components of a confidential computing architecture, confidential computing matters, IBM Cloud Data Shield vs. Microsoft Azure Confidential Computing, isolating the software and data from the underlying infrastructure, hardware-level encryption, public clouds, secure and private analytics, blockchain, paradigm shift for data security in the cloud, benefits of confidential computing.
: Ingvar16 , 16:05 | : 0 |
Cloud Analytics for Industry 4.0: Cloud Analytics for Industry 4.0
: Sirisha Potluri, Sachi Nandan Mohanty
: De Gruyter
: Smart Computing Applications
: 2022
: 186
:
: pdf (true), epub
: 10.2 MB

This book provides research on the state-of-the-art methods for data management in the fourth industrial revolution, with particular focus on cloud.based data analytics for digital manufacturing infrastructures. Innovative techniques and methods for secure, flexible and profitable cloud manufacturing will be gathered to present advanced and specialized research in the selected area. Big Data, IoT, and the Cloud are digital technologies that help in improving the analytics and decision-making processes. Market leaders all around the world use the symbiotic link between IoT, Big Data, and Cloud computing to profit from innovation and achieve a competitive edge. We now have more gadgets connected to one other through the Internet than ever before, as connectivity becomes more important in our daily working and social life. For systems and communication inside organizations to be simpler, digital transition and the requirement for multiple devices get connected for easier exchange of data. The data supplied by Internet-connected devices is gathered for analysis, and patterns and trends are discovered as a result of this data collection process. The Internet of Things (IoT) is another paradigm that plays a major role in this digital world. Through different sensors, it observes the environment and generates a large quantity of data, which is commonly referred to as Big Data.
: Ingvar16 , 15:36 | : 0 |
Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications
: Sherin Zafar, Mohd Abdul Ahad, Deepa Mehta
: Wiley
: 2022
: 323
:
: pdf (true)
: 10.1 MB

SMART AND SUSTAINABLE APPROACHES FOR OPTIMIZING PERFORMANCE OF WIRELESS NETWORK Explores the intersection of sustainable growth, green computing and automation, and performance optimization of 5G wireless networks. Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks explores how wireless sensing applications, green computing, and Big Data analytics can increase the energy efficiency and environmental sustainability of real-time applications across areas such as healthcare, agriculture, construction, and manufacturing. Bringing together an international team of expert contributors, this authoritative volume highlights the limitations of conventional technologies and provides methodologies and approaches for addressing Quality of Service (QOS) issues and optimizing network performance. In-depth chapters cover topics including blockchain-assisted secure data sharing, smart 5G Internet of Things (IoT) scenarios, intelligent management of ad hoc networks, and the use of Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) techniques in smart healthcare, smart manufacturing, and smart agriculture.
: Ingvar16 24-09-2022, 17:07 | : 0 |
Cyber Security for Microgrids: Cyber Security for Microgrids
: Subham Sahoo, Frede Blaabjerg, Tomislav Dragicevic
: The Institution of Engineering and Technology
: 2022
: 327
:
: pdf (true)
: 20.8 MB

Microgrids use ICT to intelligently deliver energy and integrate clean generation. They can operate independently from a larger grid and can help to strengthen grid resilience. Applications include remote as well as urban areas, hospitals, and manufacturing complexes. Cybersecurity challenges arise, exposing the microgrids to cyber-attacks, possibly resulting in harm to infrastructure and to people. Research has classified attacks based on confidentiality, integrity, and availability, and most countermeasures focus on specific attacks or on protecting specific components. A global approach is needed combining solutions that can secure the entire system and respond in milliseconds.
: Ingvar16 23-09-2022, 12:01 | : 0 |
Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing: Intelligent Network Design Driven by Big Data Analytics, IoT, AI and Cloud Computing
: Sunil Kumar, Glenford Mapp, Korhan Cengiz
: The Institution of Engineering and Technology
: 2022
: 427
:
: pdf (true)
: 10.1 MB

As enterprise access networks evolve with a larger number of mobile users, a wide range of devices and new cloud-based applications, managing user performance on an end-to-end basis has become rather challenging. Recent advances in big data network analytics combined with AI and cloud computing are being leveraged to tackle this growing problem. AI is becoming further integrated with software that manage networks, storage, and can compute. This edited book focuses on how new network analytics, IoTs and Cloud Computing platforms are being used to ingest, analyse and correlate a myriad of big data across the entire network stack in order to increase quality of service and quality of experience (QoS/QoE) and to improve network performance. From big data and AI analytical techniques for handling the huge amount of data generated by IoT devices, the authors cover cloud storage optimization, the design of next generation access protocols and internet architecture, fault tolerance and reliability in intelligent networks, and discuss a range of emerging applications.
: Ingvar16 23-09-2022, 03:35 | : 0 |
Integrating Edge Intelligence and Blockchain: What, Why, and How: Integrating Edge Intelligence and Blockchain: What, Why, and How
: Xiaofei Wang, Chao Qiu, Xiaoxu Ren
: Springer
: Wireless Networks
: 2022
: 118
:
: pdf (true)
: 10.2 MB

This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC. There are a lot of definitions of EI. In general, EI is derived from the combination of EC and AI, which could be explained in two dimensions that are AI in Edge and AI for Edge.
: Ingvar16 22-09-2022, 17:40 | : 0 |
Computing at the EDGE: New Challenges for Service Provision: Computing at the EDGE: New Challenges for Service Provision
: Georgios Karakonstantis, Charles J. Gillan
: Springer
: 2022
: 220
:
: pdf (true), epub
: 33.9 MB

This book describes solutions to the problems of energy efficiency, resiliency and cyber security in the domain of Edge Computing and reports on early deployments of the technology in commercial settings. This book takes a business focused view, relating the technological outcomes to new business opportunities made possible by the edge paradigm. Drawing on the experience of end user deploying prototype edge technology, the authors discuss applications in financial management, wireless management, and social networks. Given the relative geographical remoteness of the traditional cloud data centre in the IoT environment, the seemingly obvious first step is to try to move the computing closer to the data source in order to overcome issues of latency. This is known as edge computing, meaning that significant amounts of processing, but not necessarily all of it, take place close to where the data is collected. Edge computing is in essence a model or a concept.
: Ingvar16 20-09-2022, 11:34 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 405

 MirKnig.Su  2021